From a7454aee08361507d7f1d56bf92e898ccefede0b Mon Sep 17 00:00:00 2001 From: "Matthew C. Morgan" Date: Fri, 6 Sep 2024 22:24:08 -0400 Subject: [PATCH] not these --- lab/us-gov-east-1/vpc/_mcmCluster/apply.log | 3643 ----- lab/us-gov-east-1/vpc/_mcmCluster/destroy.log | 11519 ---------------- 2 files changed, 15162 deletions(-) delete mode 100644 lab/us-gov-east-1/vpc/_mcmCluster/apply.log delete mode 100644 lab/us-gov-east-1/vpc/_mcmCluster/destroy.log diff --git a/lab/us-gov-east-1/vpc/_mcmCluster/apply.log b/lab/us-gov-east-1/vpc/_mcmCluster/apply.log deleted file mode 100644 index 728ae5a..0000000 --- a/lab/us-gov-east-1/vpc/_mcmCluster/apply.log +++ /dev/null @@ -1,3643 +0,0 @@ -20:36:23.829 STDOUT [eks] terraform_current: data.aws_region.current: Reading... -20:36:23.829 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_region.current: Reading... -20:36:23.829 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_region.current: Reading... -20:36:23.829 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_partition.current: Reading... -20:36:23.829 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_partition.current: Reading... -20:36:23.829 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.efs_csi[0]: Reading... -20:36:23.829 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_caller_identity.current[0]: Reading... -20:36:23.829 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_region.current: Reading... -20:36:23.829 STDOUT [eks] terraform_current: module.cluster.data.aws_partition.current: Reading... -20:36:23.830 STDOUT [eks] terraform_current: data.aws_caller_identity.current: Reading... -20:36:23.832 STDOUT [eks] terraform_current: data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -20:36:23.833 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -20:36:23.833 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -20:36:23.833 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -20:36:23.833 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] -20:36:23.833 STDOUT [eks] terraform_current: module.cluster.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] -20:36:23.833 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] -20:36:23.835 STDOUT [eks] terraform_current: data.aws_ebs_default_kms_key.current: Reading... -20:36:23.835 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.efs_csi[0]: Read complete after 0s [id=3064053908] -20:36:23.835 STDOUT [eks] terraform_current: data.aws_iam_roles.roles: Reading... -20:36:23.835 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_partition.current[0]: Reading... -20:36:23.835 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_caller_identity.current: Reading... -20:36:23.835 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_region.current: Reading... -20:36:23.835 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_partition.current: Reading... -20:36:23.838 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_caller_identity.current: Reading... -20:36:23.838 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] -20:36:23.838 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -20:36:23.838 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_partition.current[0]: Read complete after 0s [id=aws-us-gov] -20:36:23.839 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_partition.current: Reading... -20:36:23.839 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_caller_identity.current: Reading... -20:36:23.839 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_policy_document.assume_role_policy[0]: Reading... -20:36:23.840 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] -20:36:23.841 STDOUT [eks] terraform_current: data.aws_vpc.eks_vpc: Reading... -20:36:23.841 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_policy_document.assume_role_policy[0]: Read complete after 0s [id=2764486067] -20:36:23.845 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_caller_identity.current: Reading... -20:36:23.845 STDOUT [eks] terraform_current: module.cluster.data.aws_caller_identity.current: Reading... -20:36:23.864 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_caller_identity.current[0]: Read complete after 0s [id=224384469011] -20:36:23.888 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.ebs_csi[0]: Reading... -20:36:23.894 STDOUT [eks] terraform_current: data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -20:36:23.897 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.vpc_cni[0]: Reading... -20:36:23.898 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.ebs_csi[0]: Read complete after 0s [id=4196553001] -20:36:23.898 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.vpc_cni[0]: Read complete after 0s [id=3004485257] -20:36:23.903 STDOUT [eks] terraform_current: data.aws_arn.current: Reading... -20:36:23.905 STDOUT [eks] terraform_current: data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -20:36:23.924 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -20:36:23.954 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -20:36:23.954 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -20:36:23.959 STDOUT [eks] terraform_current: module.cluster.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -20:36:23.965 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -20:36:23.966 STDOUT [eks] terraform_current: data.aws_ebs_default_kms_key.current: Read complete after 0s [id=us-gov-east-1] -20:36:24.202 STDOUT [eks] terraform_current: data.aws_iam_roles.roles: Read complete after 0s [id=us-gov-east-1] -20:36:24.338 STDOUT [eks] terraform_current: data.aws_vpc.eks_vpc: Read complete after 0s [id=vpc-0280f77b373744eaa] -20:36:24.388 STDOUT [eks] terraform_current: data.aws_kms_key.ebs_key: Reading... -20:36:24.401 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_session_context.current: Reading... -20:36:24.420 STDOUT [eks] terraform_current: data.aws_subnets.container_subnets: Reading... -20:36:24.420 STDOUT [eks] terraform_current: data.aws_subnets.subnets: Reading... -20:36:24.420 STDOUT [eks] terraform_current: data.aws_subnets.lb_subnets: Reading... -20:36:24.516 STDOUT [eks] terraform_current: data.aws_kms_key.ebs_key: Read complete after 1s [id=e0543b2b-c3f1-49a5-bfa7-87eec859be03] -20:36:24.516 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_partition.current: Reading... -20:36:24.520 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_caller_identity.current: Reading... -20:36:24.520 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_partition.current: Read complete after 0s [id=aws-us-gov] -20:36:24.522 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_iam_policy_document.assume_role_policy[0]: Reading... -20:36:24.523 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_iam_policy_document.assume_role_policy[0]: Read complete after 0s [id=2560088296] -20:36:24.524 STDOUT [eks] terraform_current: data.aws_subnets.lb_subnets: Read complete after 1s [id=us-gov-east-1] -20:36:24.529 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_session_context.current: Read complete after 1s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -20:36:24.529 STDOUT [eks] terraform_current: data.aws_subnets.container_subnets: Read complete after 1s [id=us-gov-east-1] -20:36:24.555 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -20:36:24.581 STDOUT [eks] terraform_current: data.aws_subnets.subnets: Read complete after 1s [id=us-gov-east-1] -20:36:24.584 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-07a6339be3670fb41"]: Reading... -20:36:24.584 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-02c2250b9ec2dd6a2"]: Reading... -20:36:24.584 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-078b228071c609a50"]: Reading... -20:36:24.688 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-02c2250b9ec2dd6a2"]: Read complete after 0s [id=subnet-02c2250b9ec2dd6a2] -20:36:24.692 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-078b228071c609a50"]: Read complete after 0s [id=subnet-078b228071c609a50] -20:36:24.694 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-07a6339be3670fb41"]: Read complete after 0s [id=subnet-07a6339be3670fb41] -20:36:26.093 STDOUT [eks] terraform_current: Terraform used the selected providers to generate the following execution -20:36:26.093 STDOUT [eks] terraform_current: plan. Resource actions are indicated with the following symbols: -20:36:26.093 STDOUT [eks] terraform_current:  + create -20:36:26.093 STDOUT [eks] terraform_current:  <= read (data resources) -20:36:26.093 STDOUT [eks] terraform_current: Terraform will perform the following actions: -20:36:26.093 STDOUT [eks] terraform_current:  # data.aws_vpc.dummy_vpc[0] will be read during apply -20:36:26.093 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) -20:36:26.093 STDOUT [eks] terraform_current:  <= data "aws_vpc" "dummy_vpc" { -20:36:26.093 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + cidr_block = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + cidr_block_associations = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + default = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + dhcp_options_id = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + enable_dns_hostnames = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + enable_dns_support = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + enable_network_address_usage_metrics = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + instance_tenancy = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + ipv6_association_id = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + ipv6_cidr_block = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + main_route_table_id = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + owner_id = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + state = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + tags = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + filter { -20:36:26.093 STDOUT [eks] terraform_current:  + name = "tag:Name" -20:36:26.093 STDOUT [eks] terraform_current:  + values = [ -20:36:26.093 STDOUT [eks] terraform_current:  + "vpc0-dummy", -20:36:26.093 STDOUT [eks] terraform_current:  ] -20:36:26.093 STDOUT [eks] terraform_current:  } -20:36:26.093 STDOUT [eks] terraform_current:  + filter { -20:36:26.093 STDOUT [eks] terraform_current:  + name = "tag:eks-cluster-name" -20:36:26.093 STDOUT [eks] terraform_current:  + values = [ -20:36:26.093 STDOUT [eks] terraform_current:  + "platform-eng-eks-mcm", -20:36:26.093 STDOUT [eks] terraform_current:  ] -20:36:26.093 STDOUT [eks] terraform_current:  } -20:36:26.093 STDOUT [eks] terraform_current:  } -20:36:26.093 STDOUT [eks] terraform_current:  # aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"] will be created -20:36:26.093 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "container_subnets" { -20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + key = "kubernetes.io/cluster/platform-eng-eks-mcm" -20:36:26.093 STDOUT [eks] terraform_current:  + resource_id = "subnet-02c2250b9ec2dd6a2" -20:36:26.093 STDOUT [eks] terraform_current:  + value = "shared" -20:36:26.093 STDOUT [eks] terraform_current:  } -20:36:26.093 STDOUT [eks] terraform_current:  # aws_ec2_tag.container_subnets["subnet-078b228071c609a50"] will be created -20:36:26.093 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "container_subnets" { -20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + key = "kubernetes.io/cluster/platform-eng-eks-mcm" -20:36:26.093 STDOUT [eks] terraform_current:  + resource_id = "subnet-078b228071c609a50" -20:36:26.093 STDOUT [eks] terraform_current:  + value = "shared" -20:36:26.093 STDOUT [eks] terraform_current:  } -20:36:26.093 STDOUT [eks] terraform_current:  # aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"] will be created -20:36:26.093 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "container_subnets" { -20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + key = "kubernetes.io/cluster/platform-eng-eks-mcm" -20:36:26.093 STDOUT [eks] terraform_current:  + resource_id = "subnet-07a6339be3670fb41" -20:36:26.093 STDOUT [eks] terraform_current:  + value = "shared" -20:36:26.093 STDOUT [eks] terraform_current:  } -20:36:26.093 STDOUT [eks] terraform_current:  # aws_ec2_tag.lb_subnets["subnet-01e04b945b2bfe1de"] will be created -20:36:26.093 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "lb_subnets" { -20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + key = "kubernetes.io/role/internal-nlb" -20:36:26.093 STDOUT [eks] terraform_current:  + resource_id = "subnet-01e04b945b2bfe1de" -20:36:26.093 STDOUT [eks] terraform_current:  + value = "1" -20:36:26.093 STDOUT [eks] terraform_current:  } -20:36:26.093 STDOUT [eks] terraform_current:  # aws_ec2_tag.lb_subnets["subnet-046047345c5af7fb1"] will be created -20:36:26.093 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "lb_subnets" { -20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + key = "kubernetes.io/role/internal-nlb" -20:36:26.093 STDOUT [eks] terraform_current:  + resource_id = "subnet-046047345c5af7fb1" -20:36:26.093 STDOUT [eks] terraform_current:  + value = "1" -20:36:26.093 STDOUT [eks] terraform_current:  } -20:36:26.093 STDOUT [eks] terraform_current:  # aws_ec2_tag.lb_subnets["subnet-0e3786cf42e38af3d"] will be created -20:36:26.093 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "lb_subnets" { -20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + key = "kubernetes.io/role/internal-nlb" -20:36:26.093 STDOUT [eks] terraform_current:  + resource_id = "subnet-0e3786cf42e38af3d" -20:36:26.093 STDOUT [eks] terraform_current:  + value = "1" -20:36:26.093 STDOUT [eks] terraform_current:  } -20:36:26.093 STDOUT [eks] terraform_current:  # aws_route53_zone.cluster_domain will be created -20:36:26.093 STDOUT [eks] terraform_current:  + resource "aws_route53_zone" "cluster_domain" { -20:36:26.093 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + comment = "platform-eng-eks-mcm EKS Cluster DNS Zone" -20:36:26.093 STDOUT [eks] terraform_current:  + force_destroy = false -20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" -20:36:26.093 STDOUT [eks] terraform_current:  + name_servers = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + primary_name_server = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + tags = { -20:36:26.093 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.093 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" -20:36:26.093 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.093 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.093 STDOUT [eks] terraform_current:  } -20:36:26.093 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.093 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.093 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" -20:36:26.093 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.093 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.093 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.093 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.093 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.093 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.093 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.093 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.093 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.093 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.093 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.093 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.093 STDOUT [eks] terraform_current:  } -20:36:26.093 STDOUT [eks] terraform_current:  + zone_id = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + vpc { -20:36:26.093 STDOUT [eks] terraform_current:  + vpc_id = (known after apply) -20:36:26.093 STDOUT [eks] terraform_current:  + vpc_region = "us-gov-east-1" -20:36:26.093 STDOUT [eks] terraform_current:  } -20:36:26.093 STDOUT [eks] terraform_current:  } -20:36:26.094 STDOUT [eks] terraform_current:  # aws_security_group.additional_eks_cluster_sg will be created -20:36:26.094 STDOUT [eks] terraform_current:  + resource "aws_security_group" "additional_eks_cluster_sg" { -20:36:26.094 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.094 STDOUT [eks] terraform_current:  + description = "Managed by Terraform" -20:36:26.094 STDOUT [eks] terraform_current:  + egress = [ -20:36:26.094 STDOUT [eks] terraform_current:  + { -20:36:26.094 STDOUT [eks] terraform_current:  + cidr_blocks = [ -20:36:26.094 STDOUT [eks] terraform_current:  + "0.0.0.0/0", -20:36:26.094 STDOUT [eks] terraform_current:  ] -20:36:26.094 STDOUT [eks] terraform_current:  + from_port = 0 -20:36:26.094 STDOUT [eks] terraform_current:  + ipv6_cidr_blocks = [] -20:36:26.094 STDOUT [eks] terraform_current:  + prefix_list_ids = [] -20:36:26.094 STDOUT [eks] terraform_current:  + protocol = "-1" -20:36:26.094 STDOUT [eks] terraform_current:  + security_groups = [] -20:36:26.094 STDOUT [eks] terraform_current:  + self = false -20:36:26.094 STDOUT [eks] terraform_current:  + to_port = 0 -20:36:26.094 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -20:36:26.094 STDOUT [eks] terraform_current:  }, -20:36:26.094 STDOUT [eks] terraform_current:  ] -20:36:26.094 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.094 STDOUT [eks] terraform_current:  + ingress = [ -20:36:26.094 STDOUT [eks] terraform_current:  + { -20:36:26.094 STDOUT [eks] terraform_current:  + cidr_blocks = [ -20:36:26.094 STDOUT [eks] terraform_current:  + "148.129.0.0/16", -20:36:26.094 STDOUT [eks] terraform_current:  + "172.16.0.0/12", -20:36:26.094 STDOUT [eks] terraform_current:  + "192.168.0.0/16", -20:36:26.094 STDOUT [eks] terraform_current:  + "10.0.0.0/8", -20:36:26.094 STDOUT [eks] terraform_current:  ] -20:36:26.094 STDOUT [eks] terraform_current:  + from_port = 443 -20:36:26.094 STDOUT [eks] terraform_current:  + ipv6_cidr_blocks = [] -20:36:26.094 STDOUT [eks] terraform_current:  + prefix_list_ids = [] -20:36:26.094 STDOUT [eks] terraform_current:  + protocol = "tcp" -20:36:26.094 STDOUT [eks] terraform_current:  + security_groups = [] -20:36:26.094 STDOUT [eks] terraform_current:  + self = false -20:36:26.094 STDOUT [eks] terraform_current:  + to_port = 443 -20:36:26.094 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -20:36:26.094 STDOUT [eks] terraform_current:  }, -20:36:26.094 STDOUT [eks] terraform_current:  + { -20:36:26.094 STDOUT [eks] terraform_current:  + cidr_blocks = [] -20:36:26.094 STDOUT [eks] terraform_current:  + from_port = 0 -20:36:26.094 STDOUT [eks] terraform_current:  + ipv6_cidr_blocks = [] -20:36:26.094 STDOUT [eks] terraform_current:  + prefix_list_ids = [] -20:36:26.094 STDOUT [eks] terraform_current:  + protocol = "-1" -20:36:26.094 STDOUT [eks] terraform_current:  + security_groups = (known after apply) -20:36:26.094 STDOUT [eks] terraform_current:  + self = false -20:36:26.094 STDOUT [eks] terraform_current:  + to_port = 0 -20:36:26.094 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -20:36:26.094 STDOUT [eks] terraform_current:  }, -20:36:26.094 STDOUT [eks] terraform_current:  ] -20:36:26.094 STDOUT [eks] terraform_current:  + name = "eks-platform-eng-eks-mcm-cluster" -20:36:26.094 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) -20:36:26.094 STDOUT [eks] terraform_current:  + owner_id = (known after apply) -20:36:26.094 STDOUT [eks] terraform_current:  + revoke_rules_on_delete = false -20:36:26.094 STDOUT [eks] terraform_current:  + tags = { -20:36:26.094 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.094 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.094 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-cluster" -20:36:26.094 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.094 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.094 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.094 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.094 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.094 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.094 STDOUT [eks] terraform_current:  } -20:36:26.094 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.094 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.094 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.094 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-cluster" -20:36:26.094 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.094 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.094 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.094 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.094 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.094 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.094 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.094 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.094 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.094 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.094 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.094 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.094 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.094 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.094 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.094 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.094 STDOUT [eks] terraform_current:  } -20:36:26.094 STDOUT [eks] terraform_current:  + vpc_id = "vpc-0280f77b373744eaa" -20:36:26.094 STDOUT [eks] terraform_current:  } -20:36:26.094 STDOUT [eks] terraform_current:  # aws_security_group.all_worker_mgmt will be created -20:36:26.094 STDOUT [eks] terraform_current:  + resource "aws_security_group" "all_worker_mgmt" { -20:36:26.094 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.094 STDOUT [eks] terraform_current:  + description = "Managed by Terraform" -20:36:26.094 STDOUT [eks] terraform_current:  + egress = [ -20:36:26.094 STDOUT [eks] terraform_current:  + { -20:36:26.094 STDOUT [eks] terraform_current:  + cidr_blocks = [ -20:36:26.094 STDOUT [eks] terraform_current:  + "0.0.0.0/0", -20:36:26.094 STDOUT [eks] terraform_current:  ] -20:36:26.094 STDOUT [eks] terraform_current:  + from_port = 0 -20:36:26.094 STDOUT [eks] terraform_current:  + ipv6_cidr_blocks = [] -20:36:26.094 STDOUT [eks] terraform_current:  + prefix_list_ids = [] -20:36:26.094 STDOUT [eks] terraform_current:  + protocol = "-1" -20:36:26.094 STDOUT [eks] terraform_current:  + security_groups = [] -20:36:26.094 STDOUT [eks] terraform_current:  + self = false -20:36:26.094 STDOUT [eks] terraform_current:  + to_port = 0 -20:36:26.094 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -20:36:26.094 STDOUT [eks] terraform_current:  }, -20:36:26.094 STDOUT [eks] terraform_current:  ] -20:36:26.094 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.094 STDOUT [eks] terraform_current:  + ingress = [ -20:36:26.094 STDOUT [eks] terraform_current:  + { -20:36:26.094 STDOUT [eks] terraform_current:  + cidr_blocks = [ -20:36:26.094 STDOUT [eks] terraform_current:  + "10.129.32.0/19", -20:36:26.094 STDOUT [eks] terraform_current:  ] -20:36:26.094 STDOUT [eks] terraform_current:  + from_port = 0 -20:36:26.094 STDOUT [eks] terraform_current:  + ipv6_cidr_blocks = [] -20:36:26.094 STDOUT [eks] terraform_current:  + prefix_list_ids = [] -20:36:26.094 STDOUT [eks] terraform_current:  + protocol = "-1" -20:36:26.094 STDOUT [eks] terraform_current:  + security_groups = [] -20:36:26.094 STDOUT [eks] terraform_current:  + self = false -20:36:26.094 STDOUT [eks] terraform_current:  + to_port = 0 -20:36:26.094 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -20:36:26.094 STDOUT [eks] terraform_current:  }, -20:36:26.094 STDOUT [eks] terraform_current:  ] -20:36:26.094 STDOUT [eks] terraform_current:  + name = "eks-platform-eng-eks-mcm-all-worker-mgmt" -20:36:26.094 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) -20:36:26.094 STDOUT [eks] terraform_current:  + owner_id = (known after apply) -20:36:26.094 STDOUT [eks] terraform_current:  + revoke_rules_on_delete = false -20:36:26.094 STDOUT [eks] terraform_current:  + tags = { -20:36:26.094 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.094 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.094 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-all-worker-mgmt" -20:36:26.094 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.094 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.094 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.094 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.094 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.094 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.094 STDOUT [eks] terraform_current:  } -20:36:26.094 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.094 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.094 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.094 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-all-worker-mgmt" -20:36:26.094 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.094 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.094 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.094 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.095 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.095 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.095 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.095 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.095 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.095 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.095 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.095 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.095 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.095 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.095 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.095 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.095 STDOUT [eks] terraform_current:  } -20:36:26.095 STDOUT [eks] terraform_current:  + vpc_id = "vpc-0280f77b373744eaa" -20:36:26.095 STDOUT [eks] terraform_current:  } -20:36:26.095 STDOUT [eks] terraform_current:  # aws_security_group_rule.allow_sidecar_injection will be created -20:36:26.095 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "allow_sidecar_injection" { -20:36:26.095 STDOUT [eks] terraform_current:  + description = "Webhook container port, from Control Plane" -20:36:26.095 STDOUT [eks] terraform_current:  + from_port = 15017 -20:36:26.095 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + protocol = "tcp" -20:36:26.095 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + self = false -20:36:26.095 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + to_port = 15017 -20:36:26.095 STDOUT [eks] terraform_current:  + type = "ingress" -20:36:26.095 STDOUT [eks] terraform_current:  } -20:36:26.095 STDOUT [eks] terraform_current:  # aws_vpc.vpc will be created -20:36:26.095 STDOUT [eks] terraform_current:  + resource "aws_vpc" "vpc" { -20:36:26.095 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + cidr_block = "192.168.0.0/24" -20:36:26.095 STDOUT [eks] terraform_current:  + default_network_acl_id = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + default_route_table_id = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + default_security_group_id = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + dhcp_options_id = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + enable_dns_hostnames = false -20:36:26.095 STDOUT [eks] terraform_current:  + enable_dns_support = false -20:36:26.095 STDOUT [eks] terraform_current:  + enable_network_address_usage_metrics = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + instance_tenancy = "default" -20:36:26.095 STDOUT [eks] terraform_current:  + ipv6_association_id = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + ipv6_cidr_block = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + ipv6_cidr_block_network_border_group = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + main_route_table_id = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + owner_id = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + tags = { -20:36:26.095 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.095 STDOUT [eks] terraform_current:  + "Name" = "vpc0-dummy" -20:36:26.095 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.095 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.095 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.095 STDOUT [eks] terraform_current:  } -20:36:26.095 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.095 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.095 STDOUT [eks] terraform_current:  + "Name" = "vpc0-dummy" -20:36:26.095 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.095 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.095 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.095 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.095 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.095 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.095 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.095 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.095 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.095 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.095 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.095 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.095 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.095 STDOUT [eks] terraform_current:  } -20:36:26.095 STDOUT [eks] terraform_current:  } -20:36:26.095 STDOUT [eks] terraform_current:  # null_resource.kube_config_create will be created -20:36:26.095 STDOUT [eks] terraform_current:  + resource "null_resource" "kube_config_create" { -20:36:26.095 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  } -20:36:26.095 STDOUT [eks] terraform_current:  # module.cloudwatch_observability_irsa_role.data.aws_iam_policy_document.this[0] will be read during apply -20:36:26.095 STDOUT [eks] terraform_current:  # (config refers to values not yet known) -20:36:26.095 STDOUT [eks] terraform_current:  <= data "aws_iam_policy_document" "this" { -20:36:26.095 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + json = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + minified_json = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  + statement { -20:36:26.095 STDOUT [eks] terraform_current:  + actions = [ -20:36:26.095 STDOUT [eks] terraform_current:  + "sts:AssumeRoleWithWebIdentity", -20:36:26.095 STDOUT [eks] terraform_current:  ] -20:36:26.095 STDOUT [eks] terraform_current:  + effect = "Allow" -20:36:26.095 STDOUT [eks] terraform_current:  + condition { -20:36:26.095 STDOUT [eks] terraform_current:  + test = "StringEquals" -20:36:26.095 STDOUT [eks] terraform_current:  + values = [ -20:36:26.095 STDOUT [eks] terraform_current:  + "sts.amazonaws.com", -20:36:26.095 STDOUT [eks] terraform_current:  ] -20:36:26.095 STDOUT [eks] terraform_current:  + variable = (known after apply) -20:36:26.095 STDOUT [eks] terraform_current:  } -20:36:26.095 STDOUT [eks] terraform_current:  + condition { -20:36:26.095 STDOUT [eks] terraform_current:  + test = "StringEquals" -20:36:26.096 STDOUT [eks] terraform_current:  + values = [ -20:36:26.096 STDOUT [eks] terraform_current:  + "system:serviceaccount:amazon-cloudwatch:cloudwatch-agent", -20:36:26.096 STDOUT [eks] terraform_current:  ] -20:36:26.096 STDOUT [eks] terraform_current:  + variable = (known after apply) -20:36:26.096 STDOUT [eks] terraform_current:  } -20:36:26.096 STDOUT [eks] terraform_current:  + principals { -20:36:26.096 STDOUT [eks] terraform_current:  + identifiers = [ -20:36:26.096 STDOUT [eks] terraform_current:  + (known after apply), -20:36:26.096 STDOUT [eks] terraform_current:  ] -20:36:26.096 STDOUT [eks] terraform_current:  + type = "Federated" -20:36:26.096 STDOUT [eks] terraform_current:  } -20:36:26.096 STDOUT [eks] terraform_current:  } -20:36:26.096 STDOUT [eks] terraform_current:  } -20:36:26.096 STDOUT [eks] terraform_current:  # module.cloudwatch_observability_irsa_role.aws_iam_role.this[0] will be created -20:36:26.096 STDOUT [eks] terraform_current:  + resource "aws_iam_role" "this" { -20:36:26.096 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.096 STDOUT [eks] terraform_current:  + assume_role_policy = (known after apply) -20:36:26.096 STDOUT [eks] terraform_current:  + create_date = (known after apply) -20:36:26.096 STDOUT [eks] terraform_current:  + force_detach_policies = true -20:36:26.096 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.096 STDOUT [eks] terraform_current:  + managed_policy_arns = (known after apply) -20:36:26.096 STDOUT [eks] terraform_current:  + max_session_duration = 3600 -20:36:26.096 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-cloudwatch-observability" -20:36:26.096 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) -20:36:26.096 STDOUT [eks] terraform_current:  + path = "/" -20:36:26.096 STDOUT [eks] terraform_current:  + tags = { -20:36:26.096 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.096 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.096 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.096 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.096 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.096 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.096 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.096 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.096 STDOUT [eks] terraform_current:  } -20:36:26.096 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.097 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.097 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.097 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.097 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.097 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.097 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.097 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.097 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.097 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.097 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.097 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.097 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.097 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.097 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.097 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.097 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.097 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.097 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.097 STDOUT [eks] terraform_current:  } -20:36:26.097 STDOUT [eks] terraform_current:  + unique_id = (known after apply) -20:36:26.097 STDOUT [eks] terraform_current:  + inline_policy (known after apply) -20:36:26.097 STDOUT [eks] terraform_current:  } -20:36:26.097 STDOUT [eks] terraform_current:  # module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["AWSXrayWriteOnlyAccess"] will be created -20:36:26.097 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "amazon_cloudwatch_observability" { -20:36:26.097 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.097 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess" -20:36:26.097 STDOUT [eks] terraform_current:  + role = "platform-eng-eks-mcm-cloudwatch-observability" -20:36:26.097 STDOUT [eks] terraform_current:  } -20:36:26.097 STDOUT [eks] terraform_current:  # module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["CloudWatchAgentServerPolicy"] will be created -20:36:26.097 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "amazon_cloudwatch_observability" { -20:36:26.097 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.097 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:iam::aws:policy/CloudWatchAgentServerPolicy" -20:36:26.097 STDOUT [eks] terraform_current:  + role = "platform-eng-eks-mcm-cloudwatch-observability" -20:36:26.097 STDOUT [eks] terraform_current:  } -20:36:26.097 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["amazon-cloudwatch-observability"] will be read during apply -20:36:26.097 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) -20:36:26.097 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { -20:36:26.097 STDOUT [eks] terraform_current:  + addon_name = "amazon-cloudwatch-observability" -20:36:26.097 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.097 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" -20:36:26.097 STDOUT [eks] terraform_current:  + most_recent = true -20:36:26.097 STDOUT [eks] terraform_current:  + version = (known after apply) -20:36:26.097 STDOUT [eks] terraform_current:  } -20:36:26.097 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["aws-ebs-csi-driver"] will be read during apply -20:36:26.097 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) -20:36:26.097 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { -20:36:26.097 STDOUT [eks] terraform_current:  + addon_name = "aws-ebs-csi-driver" -20:36:26.097 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.097 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" -20:36:26.097 STDOUT [eks] terraform_current:  + most_recent = true -20:36:26.098 STDOUT [eks] terraform_current:  + version = (known after apply) -20:36:26.098 STDOUT [eks] terraform_current:  } -20:36:26.098 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["aws-efs-csi-driver"] will be read during apply -20:36:26.098 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) -20:36:26.098 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { -20:36:26.098 STDOUT [eks] terraform_current:  + addon_name = "aws-efs-csi-driver" -20:36:26.098 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.098 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" -20:36:26.098 STDOUT [eks] terraform_current:  + most_recent = true -20:36:26.098 STDOUT [eks] terraform_current:  + version = (known after apply) -20:36:26.098 STDOUT [eks] terraform_current:  } -20:36:26.098 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["coredns"] will be read during apply -20:36:26.098 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) -20:36:26.098 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { -20:36:26.098 STDOUT [eks] terraform_current:  + addon_name = "coredns" -20:36:26.098 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.098 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" -20:36:26.098 STDOUT [eks] terraform_current:  + most_recent = true -20:36:26.098 STDOUT [eks] terraform_current:  + version = (known after apply) -20:36:26.098 STDOUT [eks] terraform_current:  } -20:36:26.098 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["eks-pod-identity-agent"] will be read during apply -20:36:26.098 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) -20:36:26.098 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { -20:36:26.098 STDOUT [eks] terraform_current:  + addon_name = "eks-pod-identity-agent" -20:36:26.098 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.098 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" -20:36:26.098 STDOUT [eks] terraform_current:  + most_recent = true -20:36:26.098 STDOUT [eks] terraform_current:  + version = (known after apply) -20:36:26.098 STDOUT [eks] terraform_current:  } -20:36:26.098 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["kube-proxy"] will be read during apply -20:36:26.098 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) -20:36:26.098 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { -20:36:26.098 STDOUT [eks] terraform_current:  + addon_name = "kube-proxy" -20:36:26.098 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.098 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" -20:36:26.098 STDOUT [eks] terraform_current:  + most_recent = true -20:36:26.098 STDOUT [eks] terraform_current:  + version = (known after apply) -20:36:26.098 STDOUT [eks] terraform_current:  } -20:36:26.098 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["snapshot-controller"] will be read during apply -20:36:26.098 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) -20:36:26.098 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { -20:36:26.098 STDOUT [eks] terraform_current:  + addon_name = "snapshot-controller" -20:36:26.098 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.098 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" -20:36:26.098 STDOUT [eks] terraform_current:  + most_recent = true -20:36:26.099 STDOUT [eks] terraform_current:  + version = (known after apply) -20:36:26.099 STDOUT [eks] terraform_current:  } -20:36:26.099 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["vpc-cni"] will be read during apply -20:36:26.099 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) -20:36:26.099 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { -20:36:26.099 STDOUT [eks] terraform_current:  + addon_name = "vpc-cni" -20:36:26.099 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.099 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" -20:36:26.099 STDOUT [eks] terraform_current:  + most_recent = true -20:36:26.099 STDOUT [eks] terraform_current:  + version = (known after apply) -20:36:26.099 STDOUT [eks] terraform_current:  } -20:36:26.099 STDOUT [eks] terraform_current:  # module.cluster.data.tls_certificate.this[0] will be read during apply -20:36:26.099 STDOUT [eks] terraform_current:  # (config refers to values not yet known) -20:36:26.099 STDOUT [eks] terraform_current:  <= data "tls_certificate" "this" { -20:36:26.099 STDOUT [eks] terraform_current:  + certificates = (known after apply) -20:36:26.099 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.099 STDOUT [eks] terraform_current:  + url = (known after apply) -20:36:26.099 STDOUT [eks] terraform_current:  } -20:36:26.099 STDOUT [eks] terraform_current:  # module.cluster.aws_cloudwatch_log_group.this[0] will be created -20:36:26.099 STDOUT [eks] terraform_current:  + resource "aws_cloudwatch_log_group" "this" { -20:36:26.099 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.099 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.099 STDOUT [eks] terraform_current:  + log_group_class = (known after apply) -20:36:26.099 STDOUT [eks] terraform_current:  + name = "/aws/eks/platform-eng-eks-mcm/cluster" -20:36:26.099 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) -20:36:26.099 STDOUT [eks] terraform_current:  + retention_in_days = 90 -20:36:26.099 STDOUT [eks] terraform_current:  + skip_destroy = false -20:36:26.099 STDOUT [eks] terraform_current:  + tags = { -20:36:26.099 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.099 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.099 STDOUT [eks] terraform_current:  + "Name" = "/aws/eks/platform-eng-eks-mcm/cluster" -20:36:26.099 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.099 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.099 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.099 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.099 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.099 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.099 STDOUT [eks] terraform_current:  } -20:36:26.099 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.099 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.099 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.099 STDOUT [eks] terraform_current:  + "Name" = "/aws/eks/platform-eng-eks-mcm/cluster" -20:36:26.099 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.099 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.099 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.099 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.099 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.099 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.099 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.099 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.099 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.099 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.099 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.099 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.099 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.099 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.099 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.099 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.099 STDOUT [eks] terraform_current:  } -20:36:26.099 STDOUT [eks] terraform_current:  } -20:36:26.099 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["CostAllocation"] will be created -20:36:26.099 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { -20:36:26.099 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.099 STDOUT [eks] terraform_current:  + key = "CostAllocation" -20:36:26.099 STDOUT [eks] terraform_current:  + resource_id = (known after apply) -20:36:26.099 STDOUT [eks] terraform_current:  + value = "csvd:infrastructure" -20:36:26.099 STDOUT [eks] terraform_current:  } -20:36:26.099 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["Environment"] will be created -20:36:26.099 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { -20:36:26.099 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.099 STDOUT [eks] terraform_current:  + key = "Environment" -20:36:26.099 STDOUT [eks] terraform_current:  + resource_id = (known after apply) -20:36:26.101 STDOUT [eks] terraform_current:  + value = "dev" -20:36:26.101 STDOUT [eks] terraform_current:  } -20:36:26.101 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:created_by"] will be created -20:36:26.101 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { -20:36:26.101 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.101 STDOUT [eks] terraform_current:  + key = "boc:created_by" -20:36:26.101 STDOUT [eks] terraform_current:  + resource_id = (known after apply) -20:36:26.101 STDOUT [eks] terraform_current:  + value = "terraform" -20:36:26.101 STDOUT [eks] terraform_current:  } -20:36:26.101 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_name"] will be created -20:36:26.101 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { -20:36:26.101 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.101 STDOUT [eks] terraform_current:  + key = "boc:tf_module_name" -20:36:26.101 STDOUT [eks] terraform_current:  + resource_id = (known after apply) -20:36:26.101 STDOUT [eks] terraform_current:  + value = "tfmod-eks" -20:36:26.101 STDOUT [eks] terraform_current:  } -20:36:26.101 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_version"] will be created -20:36:26.101 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { -20:36:26.101 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.101 STDOUT [eks] terraform_current:  + key = "boc:tf_module_version" -20:36:26.101 STDOUT [eks] terraform_current:  + resource_id = (known after apply) -20:36:26.101 STDOUT [eks] terraform_current:  + value = "0.1.0" -20:36:26.101 STDOUT [eks] terraform_current:  } -20:36:26.101 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["cluster:size"] will be created -20:36:26.101 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { -20:36:26.101 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.101 STDOUT [eks] terraform_current:  + key = "cluster:size" -20:36:26.101 STDOUT [eks] terraform_current:  + resource_id = (known after apply) -20:36:26.101 STDOUT [eks] terraform_current:  + value = "min:2-max:10-desired:2" -20:36:26.101 STDOUT [eks] terraform_current:  } -20:36:26.101 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["eks-cluster-name"] will be created -20:36:26.101 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { -20:36:26.101 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.101 STDOUT [eks] terraform_current:  + key = "eks-cluster-name" -20:36:26.101 STDOUT [eks] terraform_current:  + resource_id = (known after apply) -20:36:26.101 STDOUT [eks] terraform_current:  + value = "platform-eng-eks-mcm" -20:36:26.101 STDOUT [eks] terraform_current:  } -20:36:26.101 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["slim:schedule"] will be created -20:36:26.101 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { -20:36:26.101 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.101 STDOUT [eks] terraform_current:  + key = "slim:schedule" -20:36:26.101 STDOUT [eks] terraform_current:  + resource_id = (known after apply) -20:36:26.101 STDOUT [eks] terraform_current:  + value = "8:00-17:00" -20:36:26.101 STDOUT [eks] terraform_current:  } -20:36:26.101 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["cluster_creator"] will be created -20:36:26.102 STDOUT [eks] terraform_current:  + resource "aws_eks_access_entry" "this" { -20:36:26.102 STDOUT [eks] terraform_current:  + access_entry_arn = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + kubernetes_groups = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/r-inf-terraform" -20:36:26.102 STDOUT [eks] terraform_current:  + tags = { -20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.102 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.102 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.102 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.102 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.102 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.102 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.102 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.102 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.102 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  + type = "STANDARD" -20:36:26.102 STDOUT [eks] terraform_current:  + user_name = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t1"] will be created -20:36:26.102 STDOUT [eks] terraform_current:  + resource "aws_eks_access_entry" "this" { -20:36:26.102 STDOUT [eks] terraform_current:  + access_entry_arn = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + kubernetes_groups = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c" -20:36:26.102 STDOUT [eks] terraform_current:  + tags = { -20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.102 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.102 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.102 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.102 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.102 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.102 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.102 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.102 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.102 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  + type = "STANDARD" -20:36:26.102 STDOUT [eks] terraform_current:  + user_name = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t2"] will be created -20:36:26.102 STDOUT [eks] terraform_current:  + resource "aws_eks_access_entry" "this" { -20:36:26.102 STDOUT [eks] terraform_current:  + access_entry_arn = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + kubernetes_groups = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa" -20:36:26.102 STDOUT [eks] terraform_current:  + tags = { -20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.102 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.102 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.102 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.102 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.102 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.102 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.102 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.102 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.102 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  + type = "STANDARD" -20:36:26.102 STDOUT [eks] terraform_current:  + user_name = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t3"] will be created -20:36:26.102 STDOUT [eks] terraform_current:  + resource "aws_eks_access_entry" "this" { -20:36:26.102 STDOUT [eks] terraform_current:  + access_entry_arn = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + kubernetes_groups = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8" -20:36:26.102 STDOUT [eks] terraform_current:  + tags = { -20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.102 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.102 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.102 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.102 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.102 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.102 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.102 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.102 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.102 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  + type = "STANDARD" -20:36:26.102 STDOUT [eks] terraform_current:  + user_name = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t4"] will be created -20:36:26.102 STDOUT [eks] terraform_current:  + resource "aws_eks_access_entry" "this" { -20:36:26.102 STDOUT [eks] terraform_current:  + access_entry_arn = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + kubernetes_groups = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06" -20:36:26.102 STDOUT [eks] terraform_current:  + tags = { -20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.102 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.102 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.102 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.102 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.102 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.102 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.102 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.102 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.102 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  + type = "STANDARD" -20:36:26.102 STDOUT [eks] terraform_current:  + user_name = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["cluster_creator_admin"] will be created -20:36:26.102 STDOUT [eks] terraform_current:  + resource "aws_eks_access_policy_association" "this" { -20:36:26.102 STDOUT [eks] terraform_current:  + associated_at = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.102 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.102 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -20:36:26.102 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/r-inf-terraform" -20:36:26.102 STDOUT [eks] terraform_current:  + access_scope { -20:36:26.102 STDOUT [eks] terraform_current:  + type = "cluster" -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  } -20:36:26.102 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t1_admin"] will be created -20:36:26.103 STDOUT [eks] terraform_current:  + resource "aws_eks_access_policy_association" "this" { -20:36:26.103 STDOUT [eks] terraform_current:  + associated_at = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.103 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -20:36:26.103 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c" -20:36:26.103 STDOUT [eks] terraform_current:  + access_scope { -20:36:26.103 STDOUT [eks] terraform_current:  + type = "cluster" -20:36:26.103 STDOUT [eks] terraform_current:  } -20:36:26.103 STDOUT [eks] terraform_current:  } -20:36:26.103 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t2_admin"] will be created -20:36:26.103 STDOUT [eks] terraform_current:  + resource "aws_eks_access_policy_association" "this" { -20:36:26.103 STDOUT [eks] terraform_current:  + associated_at = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.103 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -20:36:26.103 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa" -20:36:26.103 STDOUT [eks] terraform_current:  + access_scope { -20:36:26.103 STDOUT [eks] terraform_current:  + type = "cluster" -20:36:26.103 STDOUT [eks] terraform_current:  } -20:36:26.103 STDOUT [eks] terraform_current:  } -20:36:26.103 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t3_admin"] will be created -20:36:26.103 STDOUT [eks] terraform_current:  + resource "aws_eks_access_policy_association" "this" { -20:36:26.103 STDOUT [eks] terraform_current:  + associated_at = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.103 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -20:36:26.103 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8" -20:36:26.103 STDOUT [eks] terraform_current:  + access_scope { -20:36:26.103 STDOUT [eks] terraform_current:  + type = "cluster" -20:36:26.103 STDOUT [eks] terraform_current:  } -20:36:26.103 STDOUT [eks] terraform_current:  } -20:36:26.103 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t4_admin"] will be created -20:36:26.103 STDOUT [eks] terraform_current:  + resource "aws_eks_access_policy_association" "this" { -20:36:26.103 STDOUT [eks] terraform_current:  + associated_at = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.103 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -20:36:26.103 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06" -20:36:26.103 STDOUT [eks] terraform_current:  + access_scope { -20:36:26.103 STDOUT [eks] terraform_current:  + type = "cluster" -20:36:26.103 STDOUT [eks] terraform_current:  } -20:36:26.103 STDOUT [eks] terraform_current:  } -20:36:26.103 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"] will be created -20:36:26.103 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { -20:36:26.103 STDOUT [eks] terraform_current:  + addon_name = "amazon-cloudwatch-observability" -20:36:26.103 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.103 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.103 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.103 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.103 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + tags = { -20:36:26.103 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.103 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.103 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.103 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.103 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.103 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.103 STDOUT [eks] terraform_current:  } -20:36:26.103 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.103 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.103 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.103 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.103 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.103 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.103 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.103 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.103 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.103 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.103 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.103 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.103 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.103 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.103 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.103 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.103 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.103 STDOUT [eks] terraform_current:  } -20:36:26.103 STDOUT [eks] terraform_current:  + timeouts {} -20:36:26.103 STDOUT [eks] terraform_current:  } -20:36:26.103 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"] will be created -20:36:26.103 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { -20:36:26.103 STDOUT [eks] terraform_current:  + addon_name = "aws-ebs-csi-driver" -20:36:26.103 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.103 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.103 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.103 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.103 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + tags = { -20:36:26.103 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.103 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.103 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.103 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.103 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.103 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.103 STDOUT [eks] terraform_current:  } -20:36:26.103 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.103 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.103 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.103 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.103 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.103 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.103 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.103 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.103 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.103 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.103 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.103 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.103 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.103 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.103 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.103 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.103 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.103 STDOUT [eks] terraform_current:  } -20:36:26.103 STDOUT [eks] terraform_current:  + timeouts {} -20:36:26.103 STDOUT [eks] terraform_current:  } -20:36:26.103 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["aws-efs-csi-driver"] will be created -20:36:26.103 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { -20:36:26.103 STDOUT [eks] terraform_current:  + addon_name = "aws-efs-csi-driver" -20:36:26.103 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.103 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.103 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.103 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.103 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) -20:36:26.103 STDOUT [eks] terraform_current:  + tags = { -20:36:26.103 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.103 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.103 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.104 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.104 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.104 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.104 STDOUT [eks] terraform_current:  } -20:36:26.104 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.104 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.104 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.104 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.104 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.104 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.104 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.104 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.104 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.104 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.104 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.104 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.104 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.104 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.104 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.104 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.104 STDOUT [eks] terraform_current:  } -20:36:26.104 STDOUT [eks] terraform_current:  + timeouts {} -20:36:26.104 STDOUT [eks] terraform_current:  } -20:36:26.104 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["coredns"] will be created -20:36:26.104 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { -20:36:26.104 STDOUT [eks] terraform_current:  + addon_name = "coredns" -20:36:26.104 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.104 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.104 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.104 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.104 STDOUT [eks] terraform_current:  + tags = { -20:36:26.104 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.104 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.104 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.104 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.104 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.104 STDOUT [eks] terraform_current:  } -20:36:26.104 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.104 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.104 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.104 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.104 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.104 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.104 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.104 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.104 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.104 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.104 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.104 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.104 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.104 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.104 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.104 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.104 STDOUT [eks] terraform_current:  } -20:36:26.104 STDOUT [eks] terraform_current:  + timeouts {} -20:36:26.104 STDOUT [eks] terraform_current:  } -20:36:26.104 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["eks-pod-identity-agent"] will be created -20:36:26.104 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { -20:36:26.104 STDOUT [eks] terraform_current:  + addon_name = "eks-pod-identity-agent" -20:36:26.104 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.104 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.104 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.104 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.104 STDOUT [eks] terraform_current:  + tags = { -20:36:26.104 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.104 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.104 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.104 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.104 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.104 STDOUT [eks] terraform_current:  } -20:36:26.104 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.104 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.104 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.104 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.104 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.104 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.104 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.104 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.104 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.104 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.104 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.104 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.104 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.104 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.104 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.104 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.104 STDOUT [eks] terraform_current:  } -20:36:26.104 STDOUT [eks] terraform_current:  + timeouts {} -20:36:26.104 STDOUT [eks] terraform_current:  } -20:36:26.104 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["kube-proxy"] will be created -20:36:26.104 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { -20:36:26.104 STDOUT [eks] terraform_current:  + addon_name = "kube-proxy" -20:36:26.104 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.104 STDOUT [eks] terraform_current:  + configuration_values = (known after ap -20:36:26.104 STDOUT [eks] terraform_current: ply) -20:36:26.104 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.104 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.104 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.104 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.104 STDOUT [eks] terraform_current:  + tags = { -20:36:26.104 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.104 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.104 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.104 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.104 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.104 STDOUT [eks] terraform_current:  } -20:36:26.104 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.104 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.105 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.105 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.105 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.105 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.105 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.105 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  + timeouts {} -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["snapshot-controller"] will be created -20:36:26.105 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { -20:36:26.105 STDOUT [eks] terraform_current:  + addon_name = "snapshot-controller" -20:36:26.105 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.105 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.105 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.105 STDOUT [eks] terraform_current:  + tags = { -20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.105 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.105 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.105 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.105 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.105 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.105 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  + timeouts {} -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["vpc-cni"] will be created -20:36:26.105 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { -20:36:26.105 STDOUT [eks] terraform_current:  + addon_name = "vpc-cni" -20:36:26.105 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.105 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.105 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.105 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + tags = { -20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.105 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.105 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.105 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.105 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.105 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.105 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  + timeouts {} -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_cluster.this[0] will be created -20:36:26.105 STDOUT [eks] terraform_current:  + resource "aws_eks_cluster" "this" { -20:36:26.105 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + bootstrap_self_managed_addons = true -20:36:26.105 STDOUT [eks] terraform_current:  + certificate_authority = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + cluster_id = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + enabled_cluster_log_types = [ -20:36:26.105 STDOUT [eks] terraform_current:  + "api", -20:36:26.105 STDOUT [eks] terraform_current:  + "audit", -20:36:26.105 STDOUT [eks] terraform_current:  + "authenticator", -20:36:26.105 STDOUT [eks] terraform_current:  + "controllerManager", -20:36:26.105 STDOUT [eks] terraform_current:  + "scheduler", -20:36:26.105 STDOUT [eks] terraform_current:  ] -20:36:26.105 STDOUT [eks] terraform_current:  + endpoint = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + identity = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + platform_version = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + role_arn = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + status = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + tags = { -20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.105 STDOUT [eks] terraform_current:  + "terraform-aws-modules" = "eks" -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.105 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.105 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.105 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.105 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.105 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.105 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.105 STDOUT [eks] terraform_current:  + "terraform-aws-modules" = "eks" -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  + version = "1.30" -20:36:26.105 STDOUT [eks] terraform_current:  + access_config { -20:36:26.105 STDOUT [eks] terraform_current:  + authentication_mode = "API_AND_CONFIG_MAP" -20:36:26.105 STDOUT [eks] terraform_current:  + bootstrap_cluster_creator_admin_permissions = false -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  + encryption_config { -20:36:26.105 STDOUT [eks] terraform_current:  + resources = [ -20:36:26.105 STDOUT [eks] terraform_current:  + "secrets", -20:36:26.105 STDOUT [eks] terraform_current:  ] -20:36:26.105 STDOUT [eks] terraform_current:  + provider { -20:36:26.105 STDOUT [eks] terraform_current:  + key_arn = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  + kubernetes_network_config { -20:36:26.105 STDOUT [eks] terraform_current:  + ip_family = "ipv4" -20:36:26.105 STDOUT [eks] terraform_current:  + service_ipv4_cidr = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + service_ipv6_cidr = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  + timeouts {} -20:36:26.105 STDOUT [eks] terraform_current:  + upgrade_policy (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + vpc_config { -20:36:26.105 STDOUT [eks] terraform_current:  + cluster_security_group_id = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + endpoint_private_access = true -20:36:26.105 STDOUT [eks] terraform_current:  + endpoint_public_access = true -20:36:26.105 STDOUT [eks] terraform_current:  + public_access_cidrs = [ -20:36:26.105 STDOUT [eks] terraform_current:  + "0.0.0.0/0", -20:36:26.105 STDOUT [eks] terraform_current:  ] -20:36:26.105 STDOUT [eks] terraform_current:  + security_group_ids = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + subnet_ids = [ -20:36:26.105 STDOUT [eks] terraform_current:  + "subnet-02c2250b9ec2dd6a2", -20:36:26.105 STDOUT [eks] terraform_current:  + "subnet-078b228071c609a50", -20:36:26.105 STDOUT [eks] terraform_current:  + "subnet-07a6339be3670fb41", -20:36:26.105 STDOUT [eks] terraform_current:  ] -20:36:26.105 STDOUT [eks] terraform_current:  + vpc_id = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_openid_connect_provider.oidc_provider[0] will be created -20:36:26.105 STDOUT [eks] terraform_current:  + resource "aws_iam_openid_connect_provider" "oidc_provider" { -20:36:26.105 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + client_id_list = [ -20:36:26.105 STDOUT [eks] terraform_current:  + "sts.amazonaws.com", -20:36:26.105 STDOUT [eks] terraform_current:  ] -20:36:26.105 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + tags = { -20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.105 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm-eks-irsa" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.105 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm-eks-irsa" -20:36:26.105 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.105 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.105 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.105 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.105 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.105 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  + thumbprint_list = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + url = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_policy.cluster_encryption[0] will be created -20:36:26.105 STDOUT [eks] terraform_current:  + resource "aws_iam_policy" "cluster_encryption" { -20:36:26.105 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + attachment_count = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + description = "Cluster encryption policy to allow cluster role to utilize CMK provided" -20:36:26.105 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + name = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + name_prefix = "platform-eng-eks-mcm-cluster-ClusterEncryption" -20:36:26.105 STDOUT [eks] terraform_current:  + path = "/" -20:36:26.105 STDOUT [eks] terraform_current:  + policy = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + policy_id = (known after apply) -20:36:26.105 STDOUT [eks] terraform_current:  + tags = { -20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.105 STDOUT [eks] terraform_current:  } -20:36:26.105 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.105 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.105 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.105 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.106 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.106 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.106 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.106 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.106 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.106 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.106 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.106 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role.this[0] will be created -20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_iam_role" "this" { -20:36:26.106 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + assume_role_policy = jsonencode( -20:36:26.106 STDOUT [eks] terraform_current:  { -20:36:26.106 STDOUT [eks] terraform_current:  + Statement = [ -20:36:26.106 STDOUT [eks] terraform_current:  + { -20:36:26.106 STDOUT [eks] terraform_current:  + Action = "sts:AssumeRole" -20:36:26.106 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.106 STDOUT [eks] terraform_current:  + Principal = { -20:36:26.106 STDOUT [eks] terraform_current:  + Service = "eks.amazonaws.com" -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  + Sid = "EKSClusterAssumeRole" -20:36:26.106 STDOUT [eks] terraform_current:  }, -20:36:26.106 STDOUT [eks] terraform_current:  ] -20:36:26.106 STDOUT [eks] terraform_current:  + Version = "2012-10-17" -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  ) -20:36:26.106 STDOUT [eks] terraform_current:  + create_date = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + force_detach_policies = true -20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + managed_policy_arns = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + max_session_duration = 3600 -20:36:26.106 STDOUT [eks] terraform_current:  + name = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + name_prefix = "platform-eng-eks-mcm-cluster-" -20:36:26.106 STDOUT [eks] terraform_current:  + path = "/" -20:36:26.106 STDOUT [eks] terraform_current:  + tags = { -20:36:26.106 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.106 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.106 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.106 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.106 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.106 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.106 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.106 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.106 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.106 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.106 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.106 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.106 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.106 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.106 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.106 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.106 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.106 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.106 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.106 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  + unique_id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + inline_policy { -20:36:26.106 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-cluster" -20:36:26.106 STDOUT [eks] terraform_current:  + policy = jsonencode( -20:36:26.106 STDOUT [eks] terraform_current:  { -20:36:26.106 STDOUT [eks] terraform_current:  + Statement = [ -20:36:26.106 STDOUT [eks] terraform_current:  + { -20:36:26.106 STDOUT [eks] terraform_current:  + Action = [ -20:36:26.106 STDOUT [eks] terraform_current:  + "logs:CreateLogGroup", -20:36:26.106 STDOUT [eks] terraform_current:  ] -20:36:26.106 STDOUT [eks] terraform_current:  + Effect = "Deny" -20:36:26.106 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.106 STDOUT [eks] terraform_current:  }, -20:36:26.106 STDOUT [eks] terraform_current:  ] -20:36:26.106 STDOUT [eks] terraform_current:  + Version = "2012-10-17" -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  ) -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role_policy_attachment.cluster_encryption[0] will be created -20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "cluster_encryption" { -20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + policy_arn = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + role = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"] will be created -20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "this" { -20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKSClusterPolicy" -20:36:26.106 STDOUT [eks] terraform_current:  + role = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"] will be created -20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "this" { -20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKSVPCResourceController" -20:36:26.106 STDOUT [eks] terraform_current:  + role = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group.cluster[0] will be created -20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_security_group" "cluster" { -20:36:26.106 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + description = "EKS cluster security group" -20:36:26.106 STDOUT [eks] terraform_current:  + egress = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + ingress = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + name = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + name_prefix = "platform-eng-eks-mcm-cluster-" -20:36:26.106 STDOUT [eks] terraform_current:  + owner_id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + revoke_rules_on_delete = false -20:36:26.106 STDOUT [eks] terraform_current:  + tags = { -20:36:26.106 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.106 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.106 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm-cluster" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.106 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.106 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.106 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.106 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.106 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.106 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm-cluster" -20:36:26.106 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.106 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.106 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.106 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.106 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.106 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.106 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.106 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.106 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.106 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.106 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.106 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.106 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  + vpc_id = "vpc-0280f77b373744eaa" -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group.node[0] will be created -20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_security_group" "node" { -20:36:26.106 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + description = "EKS node shared security group" -20:36:26.106 STDOUT [eks] terraform_current:  + egress = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + ingress = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + name = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + name_prefix = "platform-eng-eks-mcm-node-" -20:36:26.106 STDOUT [eks] terraform_current:  + owner_id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + revoke_rules_on_delete = false -20:36:26.106 STDOUT [eks] terraform_current:  + tags = { -20:36:26.106 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.106 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.106 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm-node" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.106 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.106 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.106 STDOUT [eks] terraform_current:  + "kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" -20:36:26.106 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.106 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.106 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.106 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm-node" -20:36:26.106 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.106 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.106 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.106 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.106 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.106 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.106 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.106 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.106 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.106 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.106 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.106 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.106 STDOUT [eks] terraform_current:  + "kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" -20:36:26.106 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  + vpc_id = "vpc-0280f77b373744eaa" -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.cluster["ingress_nodes_443"] will be created -20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "cluster" { -20:36:26.106 STDOUT [eks] terraform_current:  + description = "Node groups to cluster API" -20:36:26.106 STDOUT [eks] terraform_current:  + from_port = 443 -20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + protocol = "tcp" -20:36:26.106 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + self = false -20:36:26.106 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + to_port = 443 -20:36:26.106 STDOUT [eks] terraform_current:  + type = "ingress" -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["egress_all"] will be created -20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { -20:36:26.106 STDOUT [eks] terraform_current:  + cidr_blocks = [ -20:36:26.106 STDOUT [eks] terraform_current:  + "0.0.0.0/0", -20:36:26.106 STDOUT [eks] terraform_current:  ] -20:36:26.106 STDOUT [eks] terraform_current:  + description = "Allow all egress" -20:36:26.106 STDOUT [eks] terraform_current:  + from_port = 0 -20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + prefix_list_ids = [] -20:36:26.106 STDOUT [eks] terraform_current:  + protocol = "-1" -20:36:26.106 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + self = false -20:36:26.106 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + to_port = 0 -20:36:26.106 STDOUT [eks] terraform_current:  + type = "egress" -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_443"] will be created -20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { -20:36:26.106 STDOUT [eks] terraform_current:  + description = "Cluster API to node groups" -20:36:26.106 STDOUT [eks] terraform_current:  + from_port = 443 -20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + prefix_list_ids = [] -20:36:26.106 STDOUT [eks] terraform_current:  + protocol = "tcp" -20:36:26.106 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + self = false -20:36:26.106 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) -20:36:26.106 STDOUT [eks] terraform_current:  + to_port = 443 -20:36:26.106 STDOUT [eks] terraform_current:  + type = "ingress" -20:36:26.106 STDOUT [eks] terraform_current:  } -20:36:26.106 STDOUT [eks] terraform_current:  # module.clu -20:36:26.108 STDOUT [eks] terraform_current: ster.aws_security_group_rule.node["ingress_cluster_4443_webhook"] will be created -20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { -20:36:26.108 STDOUT [eks] terraform_current:  + description = "Cluster API to node 4443/tcp webhook" -20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 4443 -20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] -20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "tcp" -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + self = false -20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 4443 -20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_6443_webhook"] will be created -20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { -20:36:26.108 STDOUT [eks] terraform_current:  + description = "Cluster API to node 6443/tcp webhook" -20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 6443 -20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] -20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "tcp" -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + self = false -20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 6443 -20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_8443_webhook"] will be created -20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { -20:36:26.108 STDOUT [eks] terraform_current:  + description = "Cluster API to node 8443/tcp webhook" -20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 8443 -20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] -20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "tcp" -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + self = false -20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 8443 -20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_9443_webhook"] will be created -20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { -20:36:26.108 STDOUT [eks] terraform_current:  + description = "Cluster API to node 9443/tcp webhook" -20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 9443 -20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] -20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "tcp" -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + self = false -20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 9443 -20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_kubelet"] will be created -20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { -20:36:26.108 STDOUT [eks] terraform_current:  + description = "Cluster API to node kubelets" -20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 10250 -20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] -20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "tcp" -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + self = false -20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 10250 -20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_nodes_ephemeral"] will be created -20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { -20:36:26.108 STDOUT [eks] terraform_current:  + description = "Node to node ingress on ephemeral ports" -20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 80 -20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] -20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "tcp" -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + self = true -20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 65535 -20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_self_coredns_tcp"] will be created -20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { -20:36:26.108 STDOUT [eks] terraform_current:  + description = "Node to node CoreDNS" -20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 53 -20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] -20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "tcp" -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + self = true -20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 53 -20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_self_coredns_udp"] will be created -20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { -20:36:26.108 STDOUT [eks] terraform_current:  + description = "Node to node CoreDNS UDP" -20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 53 -20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] -20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "udp" -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + self = true -20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 53 -20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.time_sleep.this[0] will be created -20:36:26.108 STDOUT [eks] terraform_current:  + resource "time_sleep" "this" { -20:36:26.108 STDOUT [eks] terraform_current:  + create_duration = "30s" -20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + triggers = { -20:36:26.108 STDOUT [eks] terraform_current:  + "cluster_certificate_authority_data" = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + "cluster_endpoint" = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + "cluster_name" = "platform-eng-eks-mcm" -20:36:26.108 STDOUT [eks] terraform_current:  + "cluster_service_cidr" = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + "cluster_version" = "1.30" -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  # module.ebs_csi_irsa_role.data.aws_iam_policy_document.this[0] will be read during apply -20:36:26.108 STDOUT [eks] terraform_current:  # (config refers to values not yet known) -20:36:26.108 STDOUT [eks] terraform_current:  <= data "aws_iam_policy_document" "this" { -20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + json = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + minified_json = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + statement { -20:36:26.108 STDOUT [eks] terraform_current:  + actions = [ -20:36:26.108 STDOUT [eks] terraform_current:  + "sts:AssumeRoleWithWebIdentity", -20:36:26.108 STDOUT [eks] terraform_current:  ] -20:36:26.108 STDOUT [eks] terraform_current:  + effect = "Allow" -20:36:26.108 STDOUT [eks] terraform_current:  + condition { -20:36:26.108 STDOUT [eks] terraform_current:  + test = "StringEquals" -20:36:26.108 STDOUT [eks] terraform_current:  + values = [ -20:36:26.108 STDOUT [eks] terraform_current:  + "sts.amazonaws.com", -20:36:26.108 STDOUT [eks] terraform_current:  ] -20:36:26.108 STDOUT [eks] terraform_current:  + variable = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  + condition { -20:36:26.108 STDOUT [eks] terraform_current:  + test = "StringEquals" -20:36:26.108 STDOUT [eks] terraform_current:  + values = [ -20:36:26.108 STDOUT [eks] terraform_current:  + "system:serviceaccount:kube-system:ebs-csi-controller-sa", -20:36:26.108 STDOUT [eks] terraform_current:  ] -20:36:26.108 STDOUT [eks] terraform_current:  + variable = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  + principals { -20:36:26.108 STDOUT [eks] terraform_current:  + identifiers = [ -20:36:26.108 STDOUT [eks] terraform_current:  + (known after apply), -20:36:26.108 STDOUT [eks] terraform_current:  ] -20:36:26.108 STDOUT [eks] terraform_current:  + type = "Federated" -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  # module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0] will be created -20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_iam_policy" "ebs_csi" { -20:36:26.108 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + attachment_count = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + description = "Provides permissions to manage EBS volumes via the container storage interface driver" -20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + name = (known after apply) -20:36:26.108 STDOUT [eks] terraform_current:  + name_prefix = "AmazonEKS_EBS_CSI_Policy-" -20:36:26.108 STDOUT [eks] terraform_current:  + path = "/" -20:36:26.108 STDOUT [eks] terraform_current:  + policy = jsonencode( -20:36:26.108 STDOUT [eks] terraform_current:  { -20:36:26.108 STDOUT [eks] terraform_current:  + Statement = [ -20:36:26.108 STDOUT [eks] terraform_current:  + { -20:36:26.108 STDOUT [eks] terraform_current:  + Action = [ -20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:ModifyVolume", -20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:EnableFastSnapshotRestores", -20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:DetachVolume", -20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:DescribeVolumesModifications", -20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:DescribeVolumes", -20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:DescribeTags", -20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:DescribeSnapshots", -20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:DescribeInstances", -20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:DescribeAvailabilityZones", -20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:CreateSnapshot", -20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:AttachVolume", -20:36:26.108 STDOUT [eks] terraform_current:  ] -20:36:26.108 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.108 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.108 STDOUT [eks] terraform_current:  }, -20:36:26.108 STDOUT [eks] terraform_current:  + { -20:36:26.108 STDOUT [eks] terraform_current:  + Action = "ec2:CreateTags" -20:36:26.108 STDOUT [eks] terraform_current:  + Condition = { -20:36:26.108 STDOUT [eks] terraform_current:  + StringEquals = { -20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:CreateAction" = [ -20:36:26.108 STDOUT [eks] terraform_current:  + "CreateVolume", -20:36:26.108 STDOUT [eks] terraform_current:  + "CreateSnapshot", -20:36:26.108 STDOUT [eks] terraform_current:  ] -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  } -20:36:26.108 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.108 STDOUT [eks] terraform_current:  + Resource = [ -20:36:26.108 STDOUT [eks] terraform_current:  + "arn:aws-us-gov:ec2:*:*:volume/*", -20:36:26.108 STDOUT [eks] terraform_current:  + "arn:aws-us-gov:ec2:*:*:snapshot/*", -20:36:26.108 STDOUT [eks] terraform_current:  ] -20:36:26.108 STDOUT [eks] terraform_current:  }, -20:36:26.108 STDOUT [eks] terraform_current:  + { -20:36:26.108 STDOUT [eks] terraform_current:  + Action = "ec2:DeleteTags" -20:36:26.108 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.108 STDOUT [eks] terraform_current:  + Resource = [ -20:36:26.108 STDOUT [eks] terraform_current:  + "arn:aws-us-gov:ec2:*:*:volume/*", -20:36:26.108 STDOUT [eks] terraform_current:  + "arn:aws-us-gov:ec2:*:*:snapshot/*", -20:36:26.108 STDOUT [eks] terraform_current:  ] -20:36:26.108 STDOUT [eks] terraform_current:  }, -20:36:26.109 STDOUT [eks] terraform_current:  + { -20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:CreateVolume" -20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { -20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { -20:36:26.109 STDOUT [eks] terraform_current:  + "aws:RequestTag/ebs.csi.aws.com/cluster" = "true" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.109 STDOUT [eks] terraform_current:  }, -20:36:26.109 STDOUT [eks] terraform_current:  + { -20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:CreateVolume" -20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { -20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { -20:36:26.109 STDOUT [eks] terraform_current:  + "aws:RequestTag/CSIVolumeName" = "*" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.109 STDOUT [eks] terraform_current:  }, -20:36:26.109 STDOUT [eks] terraform_current:  + { -20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:CreateVolume" -20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { -20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { -20:36:26.109 STDOUT [eks] terraform_current:  + "aws:RequestTag/kubernetes.io/cluster/*" = "owned" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.109 STDOUT [eks] terraform_current:  }, -20:36:26.109 STDOUT [eks] terraform_current:  + { -20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:DeleteVolume" -20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { -20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { -20:36:26.109 STDOUT [eks] terraform_current:  + "ec2:ResourceTag/ebs.csi.aws.com/cluster" = "true" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.109 STDOUT [eks] terraform_current:  }, -20:36:26.109 STDOUT [eks] terraform_current:  + { -20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:DeleteVolume" -20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { -20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { -20:36:26.109 STDOUT [eks] terraform_current:  + "ec2:ResourceTag/CSIVolumeName" = "*" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.109 STDOUT [eks] terraform_current:  }, -20:36:26.109 STDOUT [eks] terraform_current:  + { -20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:DeleteVolume" -20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { -20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { -20:36:26.109 STDOUT [eks] terraform_current:  + "ec2:ResourceTag/kubernetes.io/cluster/*" = "owned" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.109 STDOUT [eks] terraform_current:  }, -20:36:26.109 STDOUT [eks] terraform_current:  + { -20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:DeleteVolume" -20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { -20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { -20:36:26.109 STDOUT [eks] terraform_current:  + "ec2:ResourceTag/kubernetes.io/created-for/pvc/name" = "*" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.109 STDOUT [eks] terraform_current:  }, -20:36:26.109 STDOUT [eks] terraform_current:  + { -20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:DeleteSnapshot" -20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { -20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { -20:36:26.109 STDOUT [eks] terraform_current:  + "ec2:ResourceTag/CSIVolumeSnapshotName" = "*" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.109 STDOUT [eks] terraform_current:  }, -20:36:26.109 STDOUT [eks] terraform_current:  + { -20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:DeleteSnapshot" -20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { -20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { -20:36:26.109 STDOUT [eks] terraform_current:  + "ec2:ResourceTag/ebs.csi.aws.com/cluster" = "true" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.109 STDOUT [eks] terraform_current:  }, -20:36:26.109 STDOUT [eks] terraform_current:  ] -20:36:26.109 STDOUT [eks] terraform_current:  + Version = "2012-10-17" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  ) -20:36:26.109 STDOUT [eks] terraform_current:  + policy_id = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + tags = { -20:36:26.109 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.109 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.109 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.109 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.109 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.109 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.109 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.109 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.109 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.109 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.109 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.109 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.109 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.109 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.109 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.109 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.109 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.109 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.109 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.109 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.109 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.109 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  # module.ebs_csi_irsa_role.aws_iam_role.this[0] will be created -20:36:26.109 STDOUT [eks] terraform_current:  + resource "aws_iam_role" "this" { -20:36:26.109 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + assume_role_policy = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + create_date = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + force_detach_policies = true -20:36:26.109 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + managed_policy_arns = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + max_session_duration = 3600 -20:36:26.109 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-ebs-csi-driver" -20:36:26.109 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + path = "/" -20:36:26.109 STDOUT [eks] terraform_current:  + tags = { -20:36:26.109 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.109 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.109 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.109 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.109 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.109 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.109 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.109 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.109 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.109 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.109 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.109 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.109 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.109 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.109 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.109 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.109 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.109 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.109 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.109 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.109 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.109 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + unique_id = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + inline_policy (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  # module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0] will be created -20:36:26.109 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "ebs_csi" { -20:36:26.109 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + policy_arn = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + role = "platform-eng-eks-mcm-ebs-csi-driver" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  # module.efs_csi_irsa_role.data.aws_iam_policy_document.this[0] will be read during apply -20:36:26.109 STDOUT [eks] terraform_current:  # (config refers to values not yet known) -20:36:26.109 STDOUT [eks] terraform_current:  <= data "aws_iam_policy_document" "this" { -20:36:26.109 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + json = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + minified_json = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + statement { -20:36:26.109 STDOUT [eks] terraform_current:  + actions = [ -20:36:26.109 STDOUT [eks] terraform_current:  + "sts:AssumeRoleWithWebIdentity", -20:36:26.109 STDOUT [eks] terraform_current:  ] -20:36:26.109 STDOUT [eks] terraform_current:  + effect = "Allow" -20:36:26.109 STDOUT [eks] terraform_current:  + condition { -20:36:26.109 STDOUT [eks] terraform_current:  + test = "StringEquals" -20:36:26.109 STDOUT [eks] terraform_current:  + values = [ -20:36:26.109 STDOUT [eks] terraform_current:  + "sts.amazonaws.com", -20:36:26.109 STDOUT [eks] terraform_current:  ] -20:36:26.109 STDOUT [eks] terraform_current:  + variable = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + condition { -20:36:26.109 STDOUT [eks] terraform_current:  + test = "StringEquals" -20:36:26.109 STDOUT [eks] terraform_current:  + values = [ -20:36:26.109 STDOUT [eks] terraform_current:  + "system:serviceaccount:kube-system:efs-csi-controller-sa", -20:36:26.109 STDOUT [eks] terraform_current:  ] -20:36:26.109 STDOUT [eks] terraform_current:  + variable = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + principals { -20:36:26.109 STDOUT [eks] terraform_current:  + identifiers = [ -20:36:26.109 STDOUT [eks] terraform_current:  + (known after apply), -20:36:26.109 STDOUT [eks] terraform_current:  ] -20:36:26.109 STDOUT [eks] terraform_current:  + type = "Federated" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  # module.efs_csi_irsa_role.aws_iam_policy.efs_csi[0] will be created -20:36:26.109 STDOUT [eks] terraform_current:  + resource "aws_iam_policy" "efs_csi" { -20:36:26.109 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + attachment_count = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + description = "Provides permissions to manage EFS volumes via the container storage interface driver" -20:36:26.109 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + name = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + name_prefix = "AmazonEKS_EFS_CSI_Policy-" -20:36:26.109 STDOUT [eks] terraform_current:  + path = "/" -20:36:26.109 STDOUT [eks] terraform_current:  + policy = jsonencode( -20:36:26.109 STDOUT [eks] terraform_current:  { -20:36:26.109 STDOUT [eks] terraform_current:  + Statement = [ -20:36:26.109 STDOUT [eks] terraform_current:  + { -20:36:26.109 STDOUT [eks] terraform_current:  + Action = [ -20:36:26.109 STDOUT [eks] terraform_current:  + "elasticfilesystem:DescribeMountTargets", -20:36:26.109 STDOUT [eks] terraform_current:  + "elasticfilesystem:DescribeFileSystems", -20:36:26.109 STDOUT [eks] terraform_current:  + "elasticfilesystem:DescribeAccessPoints", -20:36:26.109 STDOUT [eks] terraform_current:  + "ec2:DescribeAvailabilityZones", -20:36:26.109 STDOUT [eks] terraform_current:  ] -20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.109 STDOUT [eks] terraform_current:  }, -20:36:26.109 STDOUT [eks] terraform_current:  + { -20:36:26.109 STDOUT [eks] terraform_current:  + Action = "elasticfilesystem:CreateAccessPoint" -20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { -20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { -20:36:26.109 STDOUT [eks] terraform_current:  + "aws:RequestTag/efs.csi.aws.com/cluster" = "true" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.109 STDOUT [eks] terraform_current:  }, -20:36:26.109 STDOUT [eks] terraform_current:  + { -20:36:26.109 STDOUT [eks] terraform_current:  + Action = "elasticfilesystem:TagResource" -20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { -20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { -20:36:26.109 STDOUT [eks] terraform_current:  + "aws:RequestTag/efs.csi.aws.com/cluster" = "true" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.109 STDOUT [eks] terraform_current:  }, -20:36:26.109 STDOUT [eks] terraform_current:  + { -20:36:26.109 STDOUT [eks] terraform_current:  + Action = "elasticfilesystem:DeleteAccessPoint" -20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { -20:36:26.109 STDOUT [eks] terraform_current:  + StringEquals = { -20:36:26.109 STDOUT [eks] terraform_current:  + "aws:ResourceTag/efs.csi.aws.com/cluster" = "true" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.109 STDOUT [eks] terraform_current:  }, -20:36:26.109 STDOUT [eks] terraform_current:  ] -20:36:26.109 STDOUT [eks] terraform_current:  + Version = "2012-10-17" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  ) -20:36:26.109 STDOUT [eks] terraform_current:  + policy_id = (known after apply) -20:36:26.109 STDOUT [eks] terraform_current:  + tags = { -20:36:26.109 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.109 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.109 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.109 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.109 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.109 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.109 STDOUT [eks] terraform_current:  } -20:36:26.109 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.109 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.109 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.109 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.110 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.110 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.110 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.110 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.110 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.110 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.110 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.110 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.110 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.110 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.110 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.110 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  # module.efs_csi_irsa_role.aws_iam_role.this[0] will be created -20:36:26.110 STDOUT [eks] terraform_current:  + resource "aws_iam_role" "this" { -20:36:26.110 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + assume_role_policy = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + create_date = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + force_detach_policies = true -20:36:26.110 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + managed_policy_arns = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + max_session_duration = 3600 -20:36:26.110 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-efs-csi-driver" -20:36:26.110 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + path = "/" -20:36:26.110 STDOUT [eks] terraform_current:  + tags = { -20:36:26.110 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.110 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.110 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.110 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.110 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.110 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.110 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.110 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.110 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.110 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.110 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.110 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.110 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.110 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.110 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.110 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.110 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.110 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.110 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.110 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  + unique_id = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + inline_policy (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  # module.efs_csi_irsa_role.aws_iam_role_policy_attachment.efs_csi[0] will be created -20:36:26.110 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "efs_csi" { -20:36:26.110 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + policy_arn = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + role = "platform-eng-eks-mcm-efs-csi-driver" -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  # module.vpc_cni_irsa_role.data.aws_iam_policy_document.this[0] will be read during apply -20:36:26.110 STDOUT [eks] terraform_current:  # (config refers to values not yet known) -20:36:26.110 STDOUT [eks] terraform_current:  <= data "aws_iam_policy_document" "this" { -20:36:26.110 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + json = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + minified_json = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + statement { -20:36:26.110 STDOUT [eks] terraform_current:  + actions = [ -20:36:26.110 STDOUT [eks] terraform_current:  + "sts:AssumeRoleWithWebIdentity", -20:36:26.110 STDOUT [eks] terraform_current:  ] -20:36:26.110 STDOUT [eks] terraform_current:  + effect = "Allow" -20:36:26.110 STDOUT [eks] terraform_current:  + condition { -20:36:26.110 STDOUT [eks] terraform_current:  + test = "StringEquals" -20:36:26.110 STDOUT [eks] terraform_current:  + values = [ -20:36:26.110 STDOUT [eks] terraform_current:  + "sts.amazonaws.com", -20:36:26.110 STDOUT [eks] terraform_current:  ] -20:36:26.110 STDOUT [eks] terraform_current:  + variable = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  + condition { -20:36:26.110 STDOUT [eks] terraform_current:  + test = "StringEquals" -20:36:26.110 STDOUT [eks] terraform_current:  + values = [ -20:36:26.110 STDOUT [eks] terraform_current:  + "system:serviceaccount:kube-system:aws-node", -20:36:26.110 STDOUT [eks] terraform_current:  ] -20:36:26.110 STDOUT [eks] terraform_current:  + variable = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  + principals { -20:36:26.110 STDOUT [eks] terraform_current:  + identifiers = [ -20:36:26.110 STDOUT [eks] terraform_current:  + (known after apply), -20:36:26.110 STDOUT [eks] terraform_current:  ] -20:36:26.110 STDOUT [eks] terraform_current:  + type = "Federated" -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  # module.vpc_cni_irsa_role.aws_iam_policy.vpc_cni[0] will be created -20:36:26.110 STDOUT [eks] terraform_current:  + resource "aws_iam_policy" "vpc_cni" { -20:36:26.110 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + attachment_count = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + description = "Provides the Amazon VPC CN -20:36:26.110 STDOUT [eks] terraform_current: I Plugin (amazon-vpc-cni-k8s) the permissions it requires to modify the IPv4/IPv6 address configuration on your EKS worker nodes" -20:36:26.110 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + name = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + name_prefix = "AmazonEKS_CNI_Policy-" -20:36:26.110 STDOUT [eks] terraform_current:  + path = "/" -20:36:26.110 STDOUT [eks] terraform_current:  + policy = jsonencode( -20:36:26.110 STDOUT [eks] terraform_current:  { -20:36:26.110 STDOUT [eks] terraform_current:  + Statement = [ -20:36:26.110 STDOUT [eks] terraform_current:  + { -20:36:26.110 STDOUT [eks] terraform_current:  + Action = [ -20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:UnassignPrivateIpAddresses", -20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:ModifyNetworkInterfaceAttribute", -20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:DetachNetworkInterface", -20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:DescribeTags", -20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:DescribeSubnets", -20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:DescribeNetworkInterfaces", -20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:DescribeInstances", -20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:DescribeInstanceTypes", -20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:DeleteNetworkInterface", -20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:CreateNetworkInterface", -20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:AttachNetworkInterface", -20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:AssignPrivateIpAddresses", -20:36:26.110 STDOUT [eks] terraform_current:  ] -20:36:26.110 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.110 STDOUT [eks] terraform_current:  + Resource = "*" -20:36:26.110 STDOUT [eks] terraform_current:  + Sid = "IPV4" -20:36:26.110 STDOUT [eks] terraform_current:  }, -20:36:26.110 STDOUT [eks] terraform_current:  + { -20:36:26.110 STDOUT [eks] terraform_current:  + Action = "ec2:CreateTags" -20:36:26.110 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.110 STDOUT [eks] terraform_current:  + Resource = "arn:aws-us-gov:ec2:*:*:network-interface/*" -20:36:26.110 STDOUT [eks] terraform_current:  + Sid = "CreateTags" -20:36:26.110 STDOUT [eks] terraform_current:  }, -20:36:26.110 STDOUT [eks] terraform_current:  ] -20:36:26.110 STDOUT [eks] terraform_current:  + Version = "2012-10-17" -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  ) -20:36:26.110 STDOUT [eks] terraform_current:  + policy_id = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + tags = { -20:36:26.110 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.110 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.110 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.110 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.110 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.110 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.110 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.110 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.110 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.110 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.110 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.110 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.110 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.110 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.110 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.110 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.110 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.110 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.110 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.110 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  # module.vpc_cni_irsa_role.aws_iam_role.this[0] will be created -20:36:26.110 STDOUT [eks] terraform_current:  + resource "aws_iam_role" "this" { -20:36:26.110 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + assume_role_policy = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + create_date = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + force_detach_policies = true -20:36:26.110 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + managed_policy_arns = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + max_session_duration = 3600 -20:36:26.110 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-vpc-cni" -20:36:26.110 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + path = "/" -20:36:26.110 STDOUT [eks] terraform_current:  + tags = { -20:36:26.110 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.110 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.110 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.110 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.110 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.110 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.110 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.110 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.110 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.110 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.110 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.110 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.110 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.110 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.110 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.110 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.110 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.110 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.110 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.110 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  + unique_id = (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  + inline_policy (known after apply) -20:36:26.110 STDOUT [eks] terraform_current:  } -20:36:26.110 STDOUT [eks] terraform_current:  # module.vpc_cni_irsa_role.aws_iam_role_policy_attachment.vpc_cni[0] will be created -20:36:26.110 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "vpc_cni" { -20:36:26.110 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + policy_arn = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + role = "platform-eng-eks-mcm-vpc-cni" -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0] will be created -20:36:26.111 STDOUT [eks] terraform_current:  + resource "aws_eks_node_group" "this" { -20:36:26.111 STDOUT [eks] terraform_current:  + ami_type = "BOTTLEROCKET_x86_64" -20:36:26.111 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + capacity_type = "ON_DEMAND" -20:36:26.111 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.111 STDOUT [eks] terraform_current:  + disk_size = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + instance_types = [ -20:36:26.111 STDOUT [eks] terraform_current:  + "t3.xlarge", -20:36:26.111 STDOUT [eks] terraform_current:  ] -20:36:26.111 STDOUT [eks] terraform_current:  + node_group_name = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + node_group_name_prefix = "eks-platform-eng-eks-mcm-nodegroup-" -20:36:26.111 STDOUT [eks] terraform_current:  + node_role_arn = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + release_version = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + resources = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + status = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + subnet_ids = [ -20:36:26.111 STDOUT [eks] terraform_current:  + "subnet-02c2250b9ec2dd6a2", -20:36:26.111 STDOUT [eks] terraform_current:  + "subnet-078b228071c609a50", -20:36:26.111 STDOUT [eks] terraform_current:  + "subnet-07a6339be3670fb41", -20:36:26.111 STDOUT [eks] terraform_current:  ] -20:36:26.111 STDOUT [eks] terraform_current:  + tags = { -20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.111 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-nodegroup" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.111 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-nodegroup" -20:36:26.111 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.111 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.111 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.111 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.111 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.111 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.111 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.111 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.111 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.111 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + version = "1.30" -20:36:26.111 STDOUT [eks] terraform_current:  + launch_template { -20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + name = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + version = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + scaling_config { -20:36:26.111 STDOUT [eks] terraform_current:  + desired_size = 2 -20:36:26.111 STDOUT [eks] terraform_current:  + max_size = 10 -20:36:26.111 STDOUT [eks] terraform_current:  + min_size = 2 -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + timeouts {} -20:36:26.111 STDOUT [eks] terraform_current:  + update_config { -20:36:26.111 STDOUT [eks] terraform_current:  + max_unavailable_percentage = 33 -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role.this[0] will be created -20:36:26.111 STDOUT [eks] terraform_current:  + resource "aws_iam_role" "this" { -20:36:26.111 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + assume_role_policy = jsonencode( -20:36:26.111 STDOUT [eks] terraform_current:  { -20:36:26.111 STDOUT [eks] terraform_current:  + Statement = [ -20:36:26.111 STDOUT [eks] terraform_current:  + { -20:36:26.111 STDOUT [eks] terraform_current:  + Action = "sts:AssumeRole" -20:36:26.111 STDOUT [eks] terraform_current:  + Effect = "Allow" -20:36:26.111 STDOUT [eks] terraform_current:  + Principal = { -20:36:26.111 STDOUT [eks] terraform_current:  + Service = "ec2.amazonaws.com" -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + Sid = "EKSNodeAssumeRole" -20:36:26.111 STDOUT [eks] terraform_current:  }, -20:36:26.111 STDOUT [eks] terraform_current:  ] -20:36:26.111 STDOUT [eks] terraform_current:  + Version = "2012-10-17" -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  ) -20:36:26.111 STDOUT [eks] terraform_current:  + create_date = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + description = "EKS managed node group IAM role" -20:36:26.111 STDOUT [eks] terraform_current:  + force_detach_policies = true -20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + managed_policy_arns = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + max_session_duration = 3600 -20:36:26.111 STDOUT [eks] terraform_current:  + name = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + name_prefix = "eks-platform-eng-eks-mcm-nodegroup-" -20:36:26.111 STDOUT [eks] terraform_current:  + path = "/" -20:36:26.111 STDOUT [eks] terraform_current:  + tags = { -20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.111 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.111 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.111 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.111 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.111 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.111 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.111 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.111 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.111 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.111 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + unique_id = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + inline_policy (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"] will be created -20:36:26.111 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "this" { -20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly" -20:36:26.111 STDOUT [eks] terraform_current:  + role = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"] will be created -20:36:26.111 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "this" { -20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKSWorkerNodePolicy" -20:36:26.111 STDOUT [eks] terraform_current:  + role = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"] will be created -20:36:26.111 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "this" { -20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKS_CNI_Policy" -20:36:26.111 STDOUT [eks] terraform_current:  + role = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_launch_template.this[0] will be created -20:36:26.111 STDOUT [eks] terraform_current:  + resource "aws_launch_template" "this" { -20:36:26.111 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + default_version = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + description = "Custom launch template for eks-platform-eng-eks-mcm-nodegroup EKS managed node group" -20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + latest_version = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + name = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + name_prefix = "node_group-" -20:36:26.111 STDOUT [eks] terraform_current:  + tags = { -20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.111 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.111 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.111 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.111 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.111 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.111 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.111 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.111 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.111 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.111 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + update_default_version = true -20:36:26.111 STDOUT [eks] terraform_current:  + vpc_security_group_ids = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) -20:36:26.111 STDOUT [eks] terraform_current:  + block_device_mappings { -20:36:26.111 STDOUT [eks] terraform_current:  + device_name = "/dev/xvda" -20:36:26.111 STDOUT [eks] terraform_current:  + ebs { -20:36:26.111 STDOUT [eks] terraform_current:  + delete_on_termination = "true" -20:36:26.111 STDOUT [eks] terraform_current:  + encrypted = "true" -20:36:26.111 STDOUT [eks] terraform_current:  + iops = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + kms_key_id = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/e0543b2b-c3f1-49a5-bfa7-87eec859be03" -20:36:26.111 STDOUT [eks] terraform_current:  + throughput = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + volume_size = 100 -20:36:26.111 STDOUT [eks] terraform_current:  + volume_type = "gp3" -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + metadata_options { -20:36:26.111 STDOUT [eks] terraform_current:  + http_endpoint = "enabled" -20:36:26.111 STDOUT [eks] terraform_current:  + http_protocol_ipv6 = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + http_put_response_hop_limit = 2 -20:36:26.111 STDOUT [eks] terraform_current:  + http_tokens = "required" -20:36:26.111 STDOUT [eks] terraform_current:  + instance_metadata_tags = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + monitoring { -20:36:26.111 STDOUT [eks] terraform_current:  + enabled = true -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + tag_specifications { -20:36:26.111 STDOUT [eks] terraform_current:  + resource_type = "instance" -20:36:26.111 STDOUT [eks] terraform_current:  + tags = { -20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.111 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-nodegroup" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + tag_specifications { -20:36:26.111 STDOUT [eks] terraform_current:  + resource_type = "network-interface" -20:36:26.111 STDOUT [eks] terraform_current:  + tags = { -20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.111 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-nodegroup" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + tag_specifications { -20:36:26.111 STDOUT [eks] terraform_current:  + resource_type = "volume" -20:36:26.111 STDOUT [eks] terraform_current:  + tags = { -20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.111 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-nodegroup" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  # module.cluster.module.kms.data.aws_iam_policy_document.this[0] will be read during apply -20:36:26.111 STDOUT [eks] terraform_current:  # (config refers to values not yet known) -20:36:26.111 STDOUT [eks] terraform_current:  <= data "aws_iam_policy_document" "this" { -20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + json = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + minified_json = (known after apply) -20:36:26.111 STDOUT [eks] terraform_current:  + override_policy_documents = [] -20:36:26.111 STDOUT [eks] terraform_current:  + source_policy_documents = [] -20:36:26.111 STDOUT [eks] terraform_current:  + statement { -20:36:26.111 STDOUT [eks] terraform_current:  + actions = [ -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:*", -20:36:26.111 STDOUT [eks] terraform_current:  ] -20:36:26.111 STDOUT [eks] terraform_current:  + resources = [ -20:36:26.111 STDOUT [eks] terraform_current:  + "*", -20:36:26.111 STDOUT [eks] terraform_current:  ] -20:36:26.111 STDOUT [eks] terraform_current:  + sid = "Default" -20:36:26.111 STDOUT [eks] terraform_current:  + principals { -20:36:26.111 STDOUT [eks] terraform_current:  + identifiers = [ -20:36:26.111 STDOUT [eks] terraform_current:  + "arn:aws-us-gov:iam::224384469011:root", -20:36:26.111 STDOUT [eks] terraform_current:  ] -20:36:26.111 STDOUT [eks] terraform_current:  + type = "AWS" -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + statement { -20:36:26.111 STDOUT [eks] terraform_current:  + actions = [ -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:CancelKeyDeletion", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Create*", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Delete*", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Describe*", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Disable*", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Enable*", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Get*", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:ImportKeyMaterial", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:List*", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Put*", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:ReplicateKey", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Revoke*", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:ScheduleKeyDeletion", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:TagResource", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:UntagResource", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Update*", -20:36:26.111 STDOUT [eks] terraform_current:  ] -20:36:26.111 STDOUT [eks] terraform_current:  + resources = [ -20:36:26.111 STDOUT [eks] terraform_current:  + "*", -20:36:26.111 STDOUT [eks] terraform_current:  ] -20:36:26.111 STDOUT [eks] terraform_current:  + sid = "KeyAdministration" -20:36:26.111 STDOUT [eks] terraform_current:  + principals { -20:36:26.111 STDOUT [eks] terraform_current:  + identifiers = [ -20:36:26.111 STDOUT [eks] terraform_current:  + "arn:aws-us-gov:iam::224384469011:role/r-inf-terraform", -20:36:26.111 STDOUT [eks] terraform_current:  ] -20:36:26.111 STDOUT [eks] terraform_current:  + type = "AWS" -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  } -20:36:26.111 STDOUT [eks] terraform_current:  + statement { -20:36:26.111 STDOUT [eks] terraform_current:  + actions = [ -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Decrypt", -20:36:26.111 STDOUT [eks] terraform_current:  + "kms:DescribeKey", -20:36:26.112 STDOUT [eks] terraform_current:  + "kms:Encrypt", -20:36:26.112 STDOUT [eks] terraform_current:  + "kms:GenerateDataKey*", -20:36:26.112 STDOUT [eks] terraform_current:  + "kms:ReEncrypt*", -20:36:26.112 STDOUT [eks] terraform_current:  ] -20:36:26.112 STDOUT [eks] terraform_current:  + resources = [ -20:36:26.112 STDOUT [eks] terraform_current:  + "*", -20:36:26.112 STDOUT [eks] terraform_current:  ] -20:36:26.112 STDOUT [eks] terraform_current:  + sid = "KeyUsage" -20:36:26.112 STDOUT [eks] terraform_current:  + principals { -20:36:26.112 STDOUT [eks] terraform_current:  + identifiers = [ -20:36:26.112 STDOUT [eks] terraform_current:  + (known after apply), -20:36:26.112 STDOUT [eks] terraform_current:  ] -20:36:26.112 STDOUT [eks] terraform_current:  + type = "AWS" -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  # module.cluster.module.kms.aws_kms_alias.this["cluster"] will be created -20:36:26.112 STDOUT [eks] terraform_current:  + resource "aws_kms_alias" "this" { -20:36:26.112 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.112 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.112 STDOUT [eks] terraform_current:  + name = "alias/eks/platform-eng-eks-mcm" -20:36:26.112 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) -20:36:26.112 STDOUT [eks] terraform_current:  + target_key_arn = (known after apply) -20:36:26.112 STDOUT [eks] terraform_current:  + target_key_id = (known after apply) -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  # module.cluster.module.kms.aws_kms_key.this[0] will be created -20:36:26.112 STDOUT [eks] terraform_current:  + resource "aws_kms_key" "this" { -20:36:26.112 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.112 STDOUT [eks] terraform_current:  + bypass_policy_lockout_safety_check = false -20:36:26.112 STDOUT [eks] terraform_current:  + customer_master_key_spec = "SYMMETRIC_DEFAULT" -20:36:26.112 STDOUT [eks] terraform_current:  + description = "platform-eng-eks-mcm cluster encryption key" -20:36:26.112 STDOUT [eks] terraform_current:  + enable_key_rotation = true -20:36:26.112 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.112 STDOUT [eks] terraform_current:  + is_enabled = true -20:36:26.112 STDOUT [eks] terraform_current:  + key_id = (known after apply) -20:36:26.112 STDOUT [eks] terraform_current:  + key_usage = "ENCRYPT_DECRYPT" -20:36:26.112 STDOUT [eks] terraform_current:  + multi_region = false -20:36:26.112 STDOUT [eks] terraform_current:  + policy = (known after apply) -20:36:26.112 STDOUT [eks] terraform_current:  + rotation_period_in_days = (known after apply) -20:36:26.112 STDOUT [eks] terraform_current:  + tags = { -20:36:26.112 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.112 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.112 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.112 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.112 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.112 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.112 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.112 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.112 STDOUT [eks] terraform_current:  + "terraform-aws-modules" = "eks" -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.112 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" -20:36:26.112 STDOUT [eks] terraform_current:  + "Environment" = "dev" -20:36:26.112 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" -20:36:26.112 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.112 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.112 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.112 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" -20:36:26.112 STDOUT [eks] terraform_current:  + "Terraform" = "true" -20:36:26.112 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" -20:36:26.112 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.112 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.112 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.112 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.112 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" -20:36:26.112 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" -20:36:26.112 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.112 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" -20:36:26.112 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.112 STDOUT [eks] terraform_current:  + "terraform-aws-modules" = "eks" -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].module.user_data.null_resource.validate_cluster_service_cidr will be created -20:36:26.112 STDOUT [eks] terraform_current:  + resource "null_resource" "validate_cluster_service_cidr" { -20:36:26.112 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current: Plan: 81 to add, 0 to change, 0 to destroy. -20:36:26.112 STDOUT [eks] terraform_current:  -20:36:26.112 STDOUT [eks] terraform_current: Changes to Outputs: -20:36:26.112 STDOUT [eks] terraform_current:  + access_entries = { -20:36:26.112 STDOUT [eks] terraform_current:  + inf-terraform-t1 = { -20:36:26.112 STDOUT [eks] terraform_current:  + kubernetes_groups = [] -20:36:26.112 STDOUT [eks] terraform_current:  + policy_associations = { -20:36:26.112 STDOUT [eks] terraform_current:  + admin = { -20:36:26.112 STDOUT [eks] terraform_current:  + access_scope = { -20:36:26.112 STDOUT [eks] terraform_current:  + type = "cluster" -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c" -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  + inf-terraform-t2 = { -20:36:26.112 STDOUT [eks] terraform_current:  + kubernetes_groups = [] -20:36:26.112 STDOUT [eks] terraform_current:  + policy_associations = { -20:36:26.112 STDOUT [eks] terraform_current:  + admin = { -20:36:26.112 STDOUT [eks] terraform_current:  + access_scope = { -20:36:26.112 STDOUT [eks] terraform_current:  + type = "cluster" -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa" -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  + inf-terraform-t3 = { -20:36:26.112 STDOUT [eks] terraform_current:  + kubernetes_groups = [] -20:36:26.112 STDOUT [eks] terraform_current:  + policy_associations = { -20:36:26.112 STDOUT [eks] terraform_current:  + admin = { -20:36:26.112 STDOUT [eks] terraform_current:  + access_scope = { -20:36:26.112 STDOUT [eks] terraform_current:  + type = "cluster" -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8" -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  + inf-terraform-t4 = { -20:36:26.112 STDOUT [eks] terraform_current:  + kubernetes_groups = [] -20:36:26.112 STDOUT [eks] terraform_current:  + policy_associations = { -20:36:26.112 STDOUT [eks] terraform_current:  + admin = { -20:36:26.112 STDOUT [eks] terraform_current:  + access_scope = { -20:36:26.112 STDOUT [eks] terraform_current:  + type = "cluster" -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06" -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  } -20:36:26.112 STDOUT [eks] terraform_current:  + cloudwatch_log_group_arn = (known after apply) -20:36:26.112 STDOUT [eks] terraform_current:  + cloudwatch_log_group_name = "/aws/eks/platform-eng-eks-mcm/cluster" -20:36:26.112 STDOUT [eks] terraform_current:  + cluster_addons = { -20:36:26.112 STDOUT [eks] terraform_current:  + amazon-cloudwatch-observability = { -20:36:26.112 STDOUT [eks] terraform_current:  + addon_name = "amazon-cloudwatch-observability" -20:36:26.112 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.112 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.112 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.112 STDOUT [eks] terraform_current:  + configuration_values -20:36:26.114 STDOUT [eks] terraform_current:  = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts = null -20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.114 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + tags = { -20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.114 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.114 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.114 STDOUT [eks] terraform_current:  } -20:36:26.114 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.114 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" -20:36:26.114 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.114 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.114 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.114 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" -20:36:26.114 STDOUT [eks] terraform_current:  + Terraform = "true" -20:36:26.114 STDOUT [eks] terraform_current:  + Terragrunt = "true" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.114 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" -20:36:26.114 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" -20:36:26.114 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.114 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.114 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.114 STDOUT [eks] terraform_current:  } -20:36:26.114 STDOUT [eks] terraform_current:  + timeouts = { -20:36:26.114 STDOUT [eks] terraform_current:  + create = null -20:36:26.114 STDOUT [eks] terraform_current:  + delete = null -20:36:26.114 STDOUT [eks] terraform_current:  + update = null -20:36:26.114 STDOUT [eks] terraform_current:  } -20:36:26.114 STDOUT [eks] terraform_current:  } -20:36:26.114 STDOUT [eks] terraform_current:  + aws-ebs-csi-driver = { -20:36:26.114 STDOUT [eks] terraform_current:  + addon_name = "aws-ebs-csi-driver" -20:36:26.114 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.114 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts = null -20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.114 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + tags = { -20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.114 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.114 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.114 STDOUT [eks] terraform_current:  } -20:36:26.114 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.114 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" -20:36:26.114 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.114 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.114 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.114 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" -20:36:26.114 STDOUT [eks] terraform_current:  + Terraform = "true" -20:36:26.114 STDOUT [eks] terraform_current:  + Terragrunt = "true" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.114 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" -20:36:26.114 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" -20:36:26.114 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.114 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.114 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.114 STDOUT [eks] terraform_current:  } -20:36:26.114 STDOUT [eks] terraform_current:  + timeouts = { -20:36:26.114 STDOUT [eks] terraform_current:  + create = null -20:36:26.114 STDOUT [eks] terraform_current:  + delete = null -20:36:26.114 STDOUT [eks] terraform_current:  + update = null -20:36:26.114 STDOUT [eks] terraform_current:  } -20:36:26.114 STDOUT [eks] terraform_current:  } -20:36:26.114 STDOUT [eks] terraform_current:  + aws-efs-csi-driver = { -20:36:26.114 STDOUT [eks] terraform_current:  + addon_name = "aws-efs-csi-driver" -20:36:26.114 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.114 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts = null -20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.114 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + tags = { -20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.114 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.114 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.114 STDOUT [eks] terraform_current:  } -20:36:26.114 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.114 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" -20:36:26.114 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.114 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.114 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.114 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" -20:36:26.114 STDOUT [eks] terraform_current:  + Terraform = "true" -20:36:26.114 STDOUT [eks] terraform_current:  + Terragrunt = "true" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.114 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" -20:36:26.114 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" -20:36:26.114 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.114 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.114 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.114 STDOUT [eks] terraform_current:  } -20:36:26.114 STDOUT [eks] terraform_current:  + timeouts = { -20:36:26.114 STDOUT [eks] terraform_current:  + create = null -20:36:26.114 STDOUT [eks] terraform_current:  + delete = null -20:36:26.114 STDOUT [eks] terraform_current:  + update = null -20:36:26.114 STDOUT [eks] terraform_current:  } -20:36:26.114 STDOUT [eks] terraform_current:  } -20:36:26.114 STDOUT [eks] terraform_current:  + coredns = { -20:36:26.114 STDOUT [eks] terraform_current:  + addon_name = "coredns" -20:36:26.114 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.114 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.114 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts = null -20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.114 STDOUT [eks] terraform_current:  + service_account_role_arn = null -20:36:26.114 STDOUT [eks] terraform_current:  + tags = { -20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.114 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.114 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.114 STDOUT [eks] terraform_current:  } -20:36:26.114 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.114 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" -20:36:26.114 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.114 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.114 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.114 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" -20:36:26.114 STDOUT [eks] terraform_current:  + Terraform = "true" -20:36:26.114 STDOUT [eks] terraform_current:  + Terragrunt = "true" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.114 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" -20:36:26.114 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" -20:36:26.114 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + timeouts = { -20:36:26.115 STDOUT [eks] terraform_current:  + create = null -20:36:26.115 STDOUT [eks] terraform_current:  + delete = null -20:36:26.115 STDOUT [eks] terraform_current:  + update = null -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + eks-pod-identity-agent = { -20:36:26.115 STDOUT [eks] terraform_current:  + addon_name = "eks-pod-identity-agent" -20:36:26.115 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts = null -20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.115 STDOUT [eks] terraform_current:  + service_account_role_arn = null -20:36:26.115 STDOUT [eks] terraform_current:  + tags = { -20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.115 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" -20:36:26.115 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.115 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.115 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" -20:36:26.115 STDOUT [eks] terraform_current:  + Terraform = "true" -20:36:26.115 STDOUT [eks] terraform_current:  + Terragrunt = "true" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.115 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" -20:36:26.115 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" -20:36:26.115 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + timeouts = { -20:36:26.115 STDOUT [eks] terraform_current:  + create = null -20:36:26.115 STDOUT [eks] terraform_current:  + delete = null -20:36:26.115 STDOUT [eks] terraform_current:  + update = null -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + kube-proxy = { -20:36:26.115 STDOUT [eks] terraform_current:  + addon_name = "kube-proxy" -20:36:26.115 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts = null -20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.115 STDOUT [eks] terraform_current:  + service_account_role_arn = null -20:36:26.115 STDOUT [eks] terraform_current:  + tags = { -20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.115 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" -20:36:26.115 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.115 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.115 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" -20:36:26.115 STDOUT [eks] terraform_current:  + Terraform = "true" -20:36:26.115 STDOUT [eks] terraform_current:  + Terragrunt = "true" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.115 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" -20:36:26.115 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" -20:36:26.115 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + timeouts = { -20:36:26.115 STDOUT [eks] terraform_current:  + create = null -20:36:26.115 STDOUT [eks] terraform_current:  + delete = null -20:36:26.115 STDOUT [eks] terraform_current:  + update = null -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + snapshot-controller = { -20:36:26.115 STDOUT [eks] terraform_current:  + addon_name = "snapshot-controller" -20:36:26.115 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts = null -20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.115 STDOUT [eks] terraform_current:  + service_account_role_arn = null -20:36:26.115 STDOUT [eks] terraform_current:  + tags = { -20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.115 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" -20:36:26.115 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.115 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.115 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" -20:36:26.115 STDOUT [eks] terraform_current:  + Terraform = "true" -20:36:26.115 STDOUT [eks] terraform_current:  + Terragrunt = "true" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.115 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" -20:36:26.115 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" -20:36:26.115 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + timeouts = { -20:36:26.115 STDOUT [eks] terraform_current:  + create = null -20:36:26.115 STDOUT [eks] terraform_current:  + delete = null -20:36:26.115 STDOUT [eks] terraform_current:  + update = null -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + vpc-cni = { -20:36:26.115 STDOUT [eks] terraform_current:  + addon_name = "vpc-cni" -20:36:26.115 STDOUT [eks] terraform_current:  + addon_version = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + created_at = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + modified_at = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + preserve = true -20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts = null -20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" -20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" -20:36:26.115 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + tags = { -20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + tags_all = { -20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" -20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" -20:36:26.115 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" -20:36:26.115 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" -20:36:26.115 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" -20:36:26.115 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" -20:36:26.115 STDOUT [eks] terraform_current:  + Terraform = "true" -20:36:26.115 STDOUT [eks] terraform_current:  + Terragrunt = "true" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" -20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" -20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" -20:36:26.115 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" -20:36:26.115 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" -20:36:26.115 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + timeouts = { -20:36:26.115 STDOUT [eks] terraform_current:  + create = null -20:36:26.115 STDOUT [eks] terraform_current:  + delete = null -20:36:26.115 STDOUT [eks] terraform_current:  + update = null -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_certificate_authority_data = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_endpoint = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_fqdn = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_iam_role = { -20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + name = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + unique_id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_identity_providers = {} -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_oidc_issuer_url = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_platform_version = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_primary_security_group_id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_security_group_arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_security_group_id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_status = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_tls_certificate_sha1_fingerprint = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + cluster_version = "1.30" -20:36:26.115 STDOUT [eks] terraform_current:  + ebs_csi_irsa_role = { -20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-ebs-csi-driver" -20:36:26.115 STDOUT [eks] terraform_current:  + unique_id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + efs_csi_irsa_role = { -20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-efs-csi-driver" -20:36:26.115 STDOUT [eks] terraform_current:  + unique_id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + eks_managed_node_groups = { -20:36:26.115 STDOUT [eks] terraform_current:  + node_group = { -20:36:26.115 STDOUT [eks] terraform_current:  + autoscaling_group_schedule_arns = {} -20:36:26.115 STDOUT [eks] terraform_current:  + iam_role_arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + iam_role_name = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + iam_role_unique_id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + launch_template_arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + launch_template_id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + launch_template_latest_version = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + launch_template_name = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + node_group_arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + node_group_autoscaling_group_names = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + node_group_id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + node_group_labels = null -20:36:26.115 STDOUT [eks] terraform_current:  + node_group_resources = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + node_group_status = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + node_group_taints = [] -20:36:26.115 STDOUT [eks] terraform_current:  + platform = "bottlerocket" -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + eks_managed_node_groups_autoscaling_group_names = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + fargate_profiles = {} -20:36:26.115 STDOUT [eks] terraform_current:  + kms_key_arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + kms_key_id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + kms_key_policy = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + module_name = "tfmod-eks" -20:36:26.115 STDOUT [eks] terraform_current:  + module_version = "0.1.0" -20:36:26.115 STDOUT [eks] terraform_current:  + node_group_name = "eks-platform-eng-eks-mcm-nodegroup" -20:36:26.115 STDOUT [eks] terraform_current:  + node_security_group_arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + node_security_group_id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + oidc_provider = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + oidc_provider_arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + security_group_all_worker_mgmt_id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + self_managed_node_groups = {} -20:36:26.115 STDOUT [eks] terraform_current:  + self_managed_node_groups_autoscaling_group_names = [] -20:36:26.115 STDOUT [eks] terraform_current:  + subnets = [ -20:36:26.115 STDOUT [eks] terraform_current:  + "subnet-02c2250b9ec2dd6a2", -20:36:26.115 STDOUT [eks] terraform_current:  + "subnet-078b228071c609a50", -20:36:26.115 STDOUT [eks] terraform_current:  + "subnet-07a6339be3670fb41", -20:36:26.115 STDOUT [eks] terraform_current:  ] -20:36:26.115 STDOUT [eks] terraform_current:  + vpc_cidr_block = "10.129.32.0/19" -20:36:26.115 STDOUT [eks] terraform_current:  + vpc_cni_irsa_role = { -20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-vpc-cni" -20:36:26.115 STDOUT [eks] terraform_current:  + unique_id = (known after apply) -20:36:26.115 STDOUT [eks] terraform_current:  } -20:36:26.115 STDOUT [eks] terraform_current:  + vpc_id = "vpc-0280f77b373744eaa" -20:36:27.630 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_policy.efs_csi[0]: Creating... -20:36:27.631 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-0e3786cf42e38af3d"]: Creating... -20:36:27.631 STDOUT [eks] terraform_current: module.cluster.aws_iam_role.this[0]: Creating... -20:36:27.631 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Creating... -20:36:27.631 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]: Creating... -20:36:27.631 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Creating... -20:36:27.633 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Creating... -20:36:27.633 STDOUT [eks] terraform_current: module.cluster.aws_cloudwatch_log_group.this[0]: Creating... -20:36:27.633 STDOUT [eks] terraform_current: aws_vpc.vpc: Creating... -20:36:27.633 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_policy.vpc_cni[0]: Creating... -20:36:27.941 STDOUT [eks] terraform_current: module.cluster.aws_cloudwatch_log_group.this[0]: Creation complete after 0s [id=/aws/eks/platform-eng-eks-mcm/cluster] -20:36:27.947 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-01e04b945b2bfe1de"]: Creating... -20:36:27.958 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Creation complete after 0s [id=subnet-078b228071c609a50,kubernetes.io/cluster/platform-eng-eks-mcm] -20:36:27.958 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-0e3786cf42e38af3d"]: Creation complete after 0s [id=subnet-0e3786cf42e38af3d,kubernetes.io/role/internal-nlb] -20:36:27.961 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-046047345c5af7fb1"]: Creating... -20:36:27.969 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Creation complete after 0s [id=subnet-07a6339be3670fb41,kubernetes.io/cluster/platform-eng-eks-mcm] -20:36:27.972 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Creation complete after 0s [id=subnet-02c2250b9ec2dd6a2,kubernetes.io/cluster/platform-eng-eks-mcm] -20:36:27.979 STDOUT [eks] terraform_current: aws_security_group.all_worker_mgmt: Creating... -20:36:27.979 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Creating... -20:36:27.979 STDOUT [eks] terraform_current: module.cluster.aws_security_group.cluster[0]: Creating... -20:36:28.186 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-01e04b945b2bfe1de"]: Creation complete after 0s [id=subnet-01e04b945b2bfe1de,kubernetes.io/role/internal-nlb] -20:36:28.194 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role.this[0]: Creating... -20:36:28.198 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-046047345c5af7fb1"]: Creation complete after 0s [id=subnet-046047345c5af7fb1,kubernetes.io/role/internal-nlb] -20:36:28.256 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_policy.vpc_cni[0]: Creation complete after 0s [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_CNI_Policy-20240907003627635100000003] -20:36:28.267 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]: Creation complete after 0s [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EBS_CSI_Policy-20240907003627635200000004] -20:36:28.300 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_policy.efs_csi[0]: Creation complete after 0s [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EFS_CSI_Policy-20240907003627632900000001] -20:36:28.589 STDOUT [eks] terraform_current: module.cluster.aws_iam_role.this[0]: Creation complete after 1s [id=platform-eng-eks-mcm-cluster-20240907003627634600000002] -20:36:28.592 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"]: Creating... -20:36:28.592 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"]: Creating... -20:36:28.594 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_iam_policy_document.this[0]: Reading... -20:36:28.598 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=1934007884] -20:36:28.618 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_key.this[0]: Creating... -20:36:28.702 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role.this[0]: Creation complete after 1s [id=eks-platform-eng-eks-mcm-nodegroup-20240907003628196300000007] -20:36:28.705 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"]: Creating... -20:36:28.705 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"]: Creating... -20:36:28.706 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"]: Creating... -20:36:28.816 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"]: Creation complete after 0s [id=platform-eng-eks-mcm-cluster-20240907003627634600000002-20240907003628712500000008] -20:36:28.837 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"]: Creation complete after 0s [id=platform-eng-eks-mcm-cluster-20240907003627634600000002-20240907003628723100000009] -20:36:28.929 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"]: Creation complete after 0s [id=eks-platform-eng-eks-mcm-nodegroup-20240907003628196300000007-2024090700362882530000000a] -20:36:28.942 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"]: Creation complete after 0s [id=eks-platform-eng-eks-mcm-nodegroup-20240907003628196300000007-2024090700362883730000000b] -20:36:28.979 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"]: Creation complete after 0s [id=eks-platform-eng-eks-mcm-nodegroup-20240907003628196300000007-2024090700362887610000000c] -20:36:29.062 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Creation complete after 1s [id=sg-0fd55e5058cd2677d] -20:36:29.074 STDOUT [eks] terraform_current: module.cluster.aws_security_group.cluster[0]: Creation complete after 1s [id=sg-0f3ca09ad07865927] -20:36:29.089 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.cluster["ingress_nodes_443"]: Creating... -20:36:29.093 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_9443_webhook"]: Creating... -20:36:29.093 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_6443_webhook"]: Creating... -20:36:29.093 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_kubelet"]: Creating... -20:36:29.093 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_tcp"]: Creating... -20:36:29.093 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_8443_webhook"]: Creating... -20:36:29.093 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_nodes_ephemeral"]: Creating... -20:36:29.410 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_6443_webhook"]: Creation complete after 0s [id=sgrule-2299018117] -20:36:29.413 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_443"]: Creating... -20:36:29.428 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.cluster["ingress_nodes_443"]: Creation complete after 0s [id=sgrule-191202013] -20:36:29.430 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["egress_all"]: Creating... -20:36:29.435 STDOUT [eks] terraform_current: aws_security_group.all_worker_mgmt: Creation complete after 1s [id=sg-00833fe3577afbae0] -20:36:29.438 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_4443_webhook"]: Creating... -20:36:29.742 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_9443_webhook"]: Creation complete after 1s [id=sgrule-4277482607] -20:36:29.748 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_udp"]: Creating... -20:36:30.084 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_kubelet"]: Creation complete after 1s [id=sgrule-859369245] -20:36:30.093 STDOUT [eks] terraform_current: aws_security_group.additional_eks_cluster_sg: Creating... -20:36:30.410 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_8443_webhook"]: Creation complete after 1s [id=sgrule-2589198244] -20:36:30.744 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_tcp"]: Creation complete after 2s [id=sgrule-2966606245] -20:36:31.079 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_nodes_ephemeral"]: Creation complete after 2s [id=sgrule-1685007660] -20:36:31.407 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_443"]: Creation complete after 2s [id=sgrule-2042941422] -20:36:31.525 STDOUT [eks] terraform_current: aws_security_group.additional_eks_cluster_sg: Creation complete after 2s [id=sg-06757ae44cebc7fd7] -20:36:31.774 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["egress_all"]: Creation complete after 3s [id=sgrule-463651738] -20:36:32.101 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_4443_webhook"]: Creation complete after 3s [id=sgrule-1078615059] -20:36:32.443 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_udp"]: Creation complete after 2s [id=sgrule-344814154] -20:36:37.634 STDOUT [eks] terraform_current: aws_vpc.vpc: Still creating... [10s elapsed] -20:36:38.618 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_key.this[0]: Still creating... [10s elapsed] -20:36:38.877 STDOUT [eks] terraform_current: aws_vpc.vpc: Creation complete after 11s [id=vpc-07a5a7a13612a5565] -20:36:38.880 STDOUT [eks] terraform_current: data.aws_vpc.dummy_vpc[0]: Reading... -20:36:39.200 STDOUT [eks] terraform_current: data.aws_vpc.dummy_vpc[0]: Read complete after 0s [id=vpc-07a5a7a13612a5565] -20:36:39.204 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Creating... -20:36:48.618 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_key.this[0]: Still creating... [20s elapsed] -20:36:49.205 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Still creating... [10s elapsed] -20:36:57.177 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_key.this[0]: Creation complete after 28s [id=0d6f9045-d0cc-46f3-b042-590989aefffb] -20:36:57.528 STDOUT [eks] terraform_current: module.cluster.aws_iam_policy.cluster_encryption[0]: Creating... -20:36:57.528 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_alias.this["cluster"]: Creating... -20:36:57.533 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Creating... -20:36:57.599 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_alias.this["cluster"]: Creation complete after 0s [id=alias/eks/platform-eng-eks-mcm] -20:36:57.901 STDOUT [eks] terraform_current: module.cluster.aws_iam_policy.cluster_encryption[0]: Creation complete after 0s [id=arn:aws-us-gov:iam::224384469011:policy/platform-eng-eks-mcm-cluster-ClusterEncryption2024090700365752970000000e] -20:36:57.904 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.cluster_encryption[0]: Creating... -20:36:58.150 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.cluster_encryption[0]: Creation complete after 0s [id=platform-eng-eks-mcm-cluster-20240907003627634600000002-2024090700365802610000000f] -20:36:59.206 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Still creating... [20s elapsed] -20:37:00.832 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Creation complete after 22s [id=Z00602022QKF5QYJB3EHW] -20:37:07.534 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [10s elapsed] -20:37:17.535 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [20s elapsed] -20:37:27.536 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [30s elapsed] -20:37:37.537 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [40s elapsed] -20:37:47.537 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [50s elapsed] -20:37:57.537 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [1m0s elapsed] -20:38:07.537 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [1m10s elapsed] -20:38:17.537 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [1m20s elapsed] -20:38:27.538 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [1m30s elapsed] -20:38:37.539 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [1m40s elapsed] -20:38:47.539 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [1m50s elapsed] -20:38:57.539 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [2m0s elapsed] -20:39:07.539 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [2m10s elapsed] -20:39:17.539 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [2m20s elapsed] -20:39:27.539 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [2m30s elapsed] -20:39:37.540 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [2m40s elapsed] -20:39:47.540 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [2m50s elapsed] -20:39:57.541 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [3m0s elapsed] -20:40:07.541 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [3m10s elapsed] -20:40:17.542 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [3m20s elapsed] -20:40:27.542 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [3m30s elapsed] -20:40:37.542 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [3m40s elapsed] -20:40:47.542 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [3m50s elapsed] -20:40:57.543 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [4m0s elapsed] -20:41:07.543 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [4m10s elapsed] -20:41:17.544 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [4m20s elapsed] -20:41:27.545 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [4m30s elapsed] -20:41:37.546 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [4m40s elapsed] -20:41:47.546 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [4m50s elapsed] -20:41:57.547 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [5m0s elapsed] -20:42:07.547 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [5m10s elapsed] -20:42:17.548 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [5m20s elapsed] -20:42:27.548 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [5m30s elapsed] -20:42:37.549 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [5m40s elapsed] -20:42:47.550 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [5m50s elapsed] -20:42:57.550 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [6m0s elapsed] -20:43:07.550 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [6m10s elapsed] -20:43:17.551 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [6m20s elapsed] -20:43:27.552 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [6m30s elapsed] -20:43:37.553 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [6m40s elapsed] -20:43:47.553 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [6m50s elapsed] -20:43:49.449 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Creation complete after 6m51s [id=platform-eng-eks-mcm] -20:43:49.860 STDOUT [eks] terraform_current: module.cluster.data.tls_certificate.this[0]: Reading... -20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_name"]: Creating... -20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t4"]: Creating... -20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t1"]: Creating... -20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t3"]: Creating... -20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["cluster_creator"]: Creating... -20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["eks-cluster-name"]: Creating... -20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t2"]: Creating... -20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["CostAllocation"]: Creating... -20:43:49.863 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["Environment"]: Creating... -20:43:50.005 STDOUT [eks] terraform_current: module.cluster.data.tls_certificate.this[0]: Read complete after 0s [id=a7b75161712f0d7327a9fabac7ee5068c8ef141d] -20:43:50.011 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:created_by"]: Creating... -20:43:50.224 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["Environment"]: Creation complete after 0s [id=sg-00878a7372f72223b,Environment] -20:43:50.228 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_version"]: Creating... -20:43:50.245 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["CostAllocation"]: Creation complete after 0s [id=sg-00878a7372f72223b,CostAllocation] -20:43:50.249 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["slim:schedule"]: Creating... -20:43:50.256 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:created_by"]: Creation complete after 0s [id=sg-00878a7372f72223b,boc:created_by] -20:43:50.257 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_name"]: Creation complete after 0s [id=sg-00878a7372f72223b,boc:tf_module_name] -20:43:50.258 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["cluster:size"]: Creating... -20:43:50.267 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Creating... -20:43:50.296 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["eks-cluster-name"]: Creation complete after 0s [id=sg-00878a7372f72223b,eks-cluster-name] -20:43:50.305 STDOUT [eks] terraform_current: aws_security_group_rule.allow_sidecar_injection: Creating... -20:43:50.405 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_version"]: Creation complete after 0s [id=sg-00878a7372f72223b,boc:tf_module_version] -20:43:50.411 STDOUT [eks] terraform_current: module.cluster.aws_iam_openid_connect_provider.oidc_provider[0]: Creating... -20:43:50.418 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["slim:schedule"]: Creation complete after 0s [id=sg-00878a7372f72223b,slim:schedule] -20:43:50.429 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["cluster:size"]: Creation complete after 0s [id=sg-00878a7372f72223b,cluster:size] -20:43:50.686 STDOUT [eks] terraform_current: aws_security_group_rule.allow_sidecar_injection: Creation complete after 1s [id=sgrule-571632456] -20:43:50.759 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t4"]: Creation complete after 1s [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06] -20:43:50.935 STDOUT [eks] terraform_current: module.cluster.aws_iam_openid_connect_provider.oidc_provider[0]: Creation complete after 1s [id=arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/C36794D61CFC51D01D74FBFF97A44D38] -20:43:50.940 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.this[0]: Reading... -20:43:50.940 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_iam_policy_document.this[0]: Reading... -20:43:50.942 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Reading... -20:43:50.942 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Reading... -20:43:50.942 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=419231759] -20:43:50.943 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=518548488] -20:43:50.943 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=2245877119] -20:43:50.943 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=465870769] -20:43:50.950 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role.this[0]: Creating... -20:43:50.950 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role.this[0]: Creating... -20:43:50.952 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role.this[0]: Creating... -20:43:50.952 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role.this[0]: Creating... -20:43:51.285 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["cluster_creator"]: Creation complete after 1s [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/r-inf-terraform] -20:43:51.360 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t1"]: Creation complete after 1s [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c] -20:43:51.514 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role.this[0]: Creation complete after 1s [id=platform-eng-eks-mcm-cloudwatch-observability] -20:43:51.518 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["CloudWatchAgentServerPolicy"]: Creating... -20:43:51.519 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["AWSXrayWriteOnlyAccess"]: Creating... -20:43:51.587 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role.this[0]: Creation complete after 1s [id=platform-eng-eks-mcm-vpc-cni] -20:43:51.593 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role_policy_attachment.vpc_cni[0]: Creating... -20:43:51.659 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role.this[0]: Creation complete after 1s [id=platform-eng-eks-mcm-efs-csi-driver] -20:43:51.666 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role_policy_attachment.efs_csi[0]: Creating... -20:43:51.681 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t3"]: Creation complete after 2s [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8] -20:43:51.697 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role.this[0]: Creation complete after 1s [id=platform-eng-eks-mcm-ebs-csi-driver] -20:43:51.705 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0]: Creating... -20:43:51.705 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["kube-proxy"]: Reading... -20:43:51.705 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-ebs-csi-driver"]: Reading... -20:43:51.705 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["vpc-cni"]: Reading... -20:43:51.767 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["AWSXrayWriteOnlyAccess"]: Creation complete after 0s [id=platform-eng-eks-mcm-cloudwatch-observability-20240907004351648000000010] -20:43:51.768 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["CloudWatchAgentServerPolicy"]: Creation complete after 0s [id=platform-eng-eks-mcm-cloudwatch-observability-20240907004351667600000011] -20:43:51.769 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["eks-pod-identity-agent"]: Reading... -20:43:51.770 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["snapshot-controller"]: Reading... -20:43:51.802 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t2"]: Creation complete after 2s [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa] -20:43:51.804 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["coredns"]: Reading... -20:43:51.820 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role_policy_attachment.vpc_cni[0]: Creation complete after 0s [id=platform-eng-eks-mcm-vpc-cni-20240907004351718200000012] -20:43:51.822 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-efs-csi-driver"]: Reading... -20:43:51.885 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["vpc-cni"]: Read complete after 0s [id=vpc-cni] -20:43:51.888 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["amazon-cloudwatch-observability"]: Reading... -20:43:51.901 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role_policy_attachment.efs_csi[0]: Creation complete after 0s [id=platform-eng-eks-mcm-efs-csi-driver-20240907004351800300000013] -20:43:51.906 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["cluster_creator_admin"]: Creating... -20:43:51.965 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0]: Creation complete after 0s [id=platform-eng-eks-mcm-ebs-csi-driver-20240907004351856300000014] -20:43:51.968 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t3_admin"]: Creating... -20:43:51.971 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-efs-csi-driver"]: Read complete after 0s [id=aws-efs-csi-driver] -20:43:51.974 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t2_admin"]: Creating... -20:43:51.985 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-ebs-csi-driver"]: Read complete after 0s [id=aws-ebs-csi-driver] -20:43:51.988 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t1_admin"]: Creating... -20:43:51.998 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["snapshot-controller"]: Read complete after 0s [id=snapshot-controller] -20:43:52.001 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t4_admin"]: Creating... -20:43:52.083 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["amazon-cloudwatch-observability"]: Read complete after 0s [id=amazon-cloudwatch-observability] -20:43:52.223 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["kube-proxy"]: Read complete after 0s [id=kube-proxy] -20:43:52.258 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["eks-pod-identity-agent"]: Read complete after 0s [id=eks-pod-identity-agent] -20:43:52.314 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["coredns"]: Read complete after 0s [id=coredns] -20:43:52.856 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t1_admin"]: Creation complete after 1s [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] -20:43:52.872 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t3_admin"]: Creation complete after 1s [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] -20:43:52.931 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t2_admin"]: Creation complete after 1s [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] -20:43:53.148 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["cluster_creator_admin"]: Creation complete after 1s [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/r-inf-terraform#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] -20:43:53.441 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t4_admin"]: Creation complete after 1s [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] -20:44:00.267 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Still creating... [10s elapsed] -20:44:10.269 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Still creating... [20s elapsed] -20:44:20.271 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Still creating... [30s elapsed] -20:44:20.300 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Creation complete after 30s [id=2024-09-07T00:44:20Z] -20:44:20.658 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].module.user_data.null_resource.validate_cluster_service_cidr: Creating... -20:44:20.660 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].module.user_data.null_resource.validate_cluster_service_cidr: Creation complete after 0s [id=2664883768492982935] -20:44:20.672 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_launch_template.this[0]: Creating... -20:44:20.921 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_launch_template.this[0]: Creation complete after 0s [id=lt-0e12d0e62cc58bc63] -20:44:20.930 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Creating... -20:44:30.929 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [10s elapsed] -20:44:40.929 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [20s elapsed] -20:44:50.930 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [30s elapsed] -20:45:00.931 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [40s elapsed] -20:45:10.931 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [50s elapsed] -20:45:20.932 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [1m0s elapsed] -20:45:30.933 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [1m10s elapsed] -20:45:40.933 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [1m20s elapsed] -20:45:50.934 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [1m30s elapsed] -20:46:00.935 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [1m40s elapsed] -20:46:08.647 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Creation complete after 1m48s [id=platform-eng-eks-mcm:eks-platform-eng-eks-mcm-nodegroup-20240907004420932200000017] -20:46:09.137 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Creating... -20:46:09.137 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Creating... -20:46:09.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Creating... -20:46:09.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Creating... -20:46:09.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Creating... -20:46:09.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Creating... -20:46:09.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Creating... -20:46:09.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Creating... -20:46:19.139 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Still creating... [10s elapsed] -20:46:19.139 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Still creating... [10s elapsed] -20:46:19.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Still creating... [10s elapsed] -20:46:19.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Still creating... [10s elapsed] -20:46:19.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Still creating... [10s elapsed] -20:46:19.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Still creating... [10s elapsed] -20:46:19.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Still creating... [10s elapsed] -20:46:19.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Still creating... [10s elapsed] -20:46:29.139 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Still creating... [20s elapsed] -20:46:29.139 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Still creating... [20s elapsed] -20:46:29.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Still creating... [20s elapsed] -20:46:29.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Still creating... [20s elapsed] -20:46:29.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Still creating... [20s elapsed] -20:46:29.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Still creating... [20s elapsed] -20:46:29.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Still creating... [20s elapsed] -20:46:29.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Still creating... [20s elapsed] -20:46:39.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Still creating... [30s elapsed] -20:46:39.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Still creating... [30s elapsed] -20:46:39.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Still creating... [30s elapsed] -20:46:39.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Still creating... [30s elapsed] -20:46:39.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Still creating... [30s elapsed] -20:46:39.142 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Still creating... [30s elapsed] -20:46:39.142 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Still creating... [30s elapsed] -20:46:39.142 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Still creating... [30s elapsed] -20:46:49.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Still creating... [40s elapsed] -20:46:49.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Still creating... [40s elapsed] -20:46:49.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Still creating... [40s elapsed] -20:46:49.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Still creating... [40s elapsed] -20:46:49.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Still creating... [40s elapsed] -20:46:49.143 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Still creating... [40s elapsed] -20:46:49.143 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Still creating... [40s elapsed] -20:46:49.143 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Still creating... [40s elapsed] -20:46:53.750 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Creation complete after 45s [id=platform-eng-eks-mcm:aws-efs-csi-driver] -20:46:54.180 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Creation complete after 45s [id=platform-eng-eks-mcm:eks-pod-identity-agent] -20:46:54.180 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Creation complete after 45s [id=platform-eng-eks-mcm:kube-proxy] -20:46:54.181 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Creation complete after 45s [id=platform-eng-eks-mcm:vpc-cni] -20:46:54.181 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Creation complete after 45s [id=platform-eng-eks-mcm:amazon-cloudwatch-observability] -20:46:59.142 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Still creating... [50s elapsed] -20:46:59.143 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Still creating... [50s elapsed] -20:46:59.143 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Still creating... [50s elapsed] -20:47:03.841 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Creation complete after 55s [id=platform-eng-eks-mcm:snapshot-controller] -20:47:03.985 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Creation complete after 55s [id=platform-eng-eks-mcm:aws-ebs-csi-driver] -20:47:04.170 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Creation complete after 55s [id=platform-eng-eks-mcm:coredns] -20:47:04.186 STDOUT [eks] terraform_current: null_resource.kube_config_create: Creating... -20:47:04.189 STDOUT [eks] terraform_current: null_resource.kube_config_create: Provisioning with 'local-exec'... -20:47:04.189 STDOUT [eks] terraform_current: null_resource.kube_config_create (local-exec): Executing: ["/bin/bash" "-c" "aws eks --region us-gov-east-1 update-kubeconfig --name platform-eng-eks-mcm --profile=224384469011-lab-dev-gov && export KUBE_CONFIG_PATH=~/.kube/config && export KUBERNETES_MASTER=~/.kube/config"] -20:47:04.962 STDOUT [eks] terraform_current: null_resource.kube_config_create (local-exec): The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session run aws sso login with the corresponding profile. diff --git a/lab/us-gov-east-1/vpc/_mcmCluster/destroy.log b/lab/us-gov-east-1/vpc/_mcmCluster/destroy.log deleted file mode 100644 index aff791b..0000000 --- a/lab/us-gov-east-1/vpc/_mcmCluster/destroy.log +++ /dev/null @@ -1,11519 +0,0 @@ -19:53:39.458 STDOUT [eks-metrics-server] terraform_current: data.kubernetes_namespace.kube_system: Reading... -19:53:40.209 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... -19:53:40.209 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_caller_identity.current: Reading... -19:53:40.219 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... -19:53:40.219 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_region.current: Reading... -19:53:40.230 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zones.zones: Reading... -19:53:40.230 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... -19:53:40.243 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:53:40.245 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s -19:53:40.245 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:53:40.252 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_arn.current: Reading... -19:53:40.264 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -19:53:40.264 STDOUT [eks-metrics-server] terraform_current: module.images.aws_ecr_repository.image_repos["metrics-server"]: Refreshing state... [id=platform-eng-eks-mcm/metrics-server] -19:53:40.374 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 0s [id=us-gov-east-1] -19:53:40.392 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 0s [id=us-gov-east-1] -19:53:40.395 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... -19:53:40.396 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... -19:53:40.396 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... -19:53:40.422 STDOUT [eks-metrics-server] terraform_current: data.kubernetes_namespace.kube_system: Read complete after 1s [id=kube-system] -19:53:40.452 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] -19:53:40.499 STDOUT [eks-metrics-server] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["metrics-server"]: Refreshing state... [id=platform-eng-eks-mcm/metrics-server] -19:53:40.499 STDOUT [eks-metrics-server] terraform_current: module.images.null_resource.copy_images["metrics-server#v0.7.1"]: Refreshing state... [id=7262007232490788094] -19:53:40.506 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 1s [id=us-gov-east-1c] -19:53:40.557 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 1s [id=us-gov-east-1b] -19:53:40.584 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 1s [id=lab-dev-gov] -19:53:40.607 STDOUT [eks-metrics-server] terraform_current: helm_release.metrics_server: Refreshing state... [id=metrics-server] -19:53:41.083 STDOUT [eks-karpenter] terraform_current: data.aws_caller_identity.current: Reading... -19:53:41.083 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... -19:53:41.095 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_region.current: Reading... -19:53:41.095 STDOUT [eks-karpenter] terraform_current: data.aws_subnets.container_subnets: Reading... -19:53:41.095 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... -19:53:41.095 STDOUT [eks-karpenter] terraform_current: data.aws_iam_roles.roles: Reading... -19:53:41.095 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_caller_identity.current: Reading... -19:53:41.095 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... -19:53:41.095 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_partition.current: Reading... -19:53:41.095 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_region.current: Reading... -19:53:41.106 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:53:41.106 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:53:41.106 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] -19:53:41.117 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.controller_assume_role[0]: Reading... -19:53:41.117 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s -19:53:41.117 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zones.zones: Reading... -19:53:41.117 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_caller_identity.current: Reading... -19:53:41.128 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.controller_assume_role[0]: Read complete after 0s [id=3815944313] -19:53:41.128 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["health_event"]: Refreshing state... [id=KarpenterHealthEvent-20240906232348266800000006] -19:53:41.128 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_rebalance"]: Refreshing state... [id=KarpenterInstanceRebalance-20240906232348258700000004] -19:53:41.128 STDOUT [eks-karpenter] terraform_current: data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:53:41.139 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_state_change"]: Refreshing state... [id=KarpenterInstanceStateChange-20240906232348256000000001] -19:53:41.159 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:53:41.159 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["spot_interrupt"]: Refreshing state... [id=KarpenterSpotInterrupt-20240906232348258200000003] -19:53:41.188 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:53:41.190 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue.this[0]: Refreshing state... [id=https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm] -19:53:41.225 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 0s [id=us-gov-east-1] -19:53:41.226 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.node_assume_role[0]: Reading... -19:53:41.229 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.node_assume_role[0]: Read complete after 0s [id=2560088296] -19:53:41.231 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role.controller[0]: Refreshing state... [id=KarpenterController-20240906232348260000000005] -19:53:41.282 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 0s [id=us-gov-east-1] -19:53:41.290 STDOUT [eks-karpenter] terraform_current: data.aws_arn.current: Reading... -19:53:41.298 STDOUT [eks-karpenter] terraform_current: data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -19:53:41.305 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_arn.current: Reading... -19:53:41.308 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -19:53:41.344 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role.node[0]: Refreshing state... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002] -19:53:41.344 STDOUT [eks-karpenter] terraform_current: data.aws_subnets.container_subnets: Read complete after 0s [id=us-gov-east-1] -19:53:41.354 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... -19:53:41.354 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... -19:53:41.363 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... -19:53:41.363 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Refreshing state... [id=subnet-07a6339be3670fb41,karpenter.sh/discovery] -19:53:41.369 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Refreshing state... [id=subnet-02c2250b9ec2dd6a2,karpenter.sh/discovery] -19:53:41.384 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Refreshing state... [id=subnet-078b228071c609a50,karpenter.sh/discovery] -19:53:41.409 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] -19:53:41.409 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["spot_interrupt"]: Refreshing state... [id=KarpenterSpotInterrupt-20240906232348258200000003-KarpenterInterruptionQueueTarget] -19:53:41.409 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] -19:53:41.409 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.queue[0]: Reading... -19:53:41.421 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.queue[0]: Read complete after 0s [id=2362613586] -19:53:41.430 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["health_event"]: Refreshing state... [id=KarpenterHealthEvent-20240906232348266800000006-KarpenterInterruptionQueueTarget] -19:53:41.454 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] -19:53:41.466 STDOUT [eks-karpenter] terraform_current: data.aws_iam_roles.roles: Read complete after 0s [id=us-gov-east-1] -19:53:41.466 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["instance_rebalance"]: Refreshing state... [id=KarpenterInstanceRebalance-20240906232348258700000004-KarpenterInterruptionQueueTarget] -19:53:41.466 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["instance_state_change"]: Refreshing state... [id=KarpenterInstanceStateChange-20240906232348256000000001-KarpenterInterruptionQueueTarget] -19:53:41.477 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 0s [id=lab-dev-gov] -19:53:41.477 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue_policy.this[0]: Refreshing state... [id=https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm] -19:53:41.477 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_repository.image_repos["karpenter/controller"]: Refreshing state... [id=platform-eng-eks-mcm/karpenter/controller] -19:53:41.477 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_repository.image_repos["bitnami/kubectl"]: Refreshing state... [id=platform-eng-eks-mcm/bitnami/kubectl] -19:53:41.680 STDOUT [eks-karpenter] terraform_current: module.images.null_resource.copy_images["karpenter/controller#1.0.1"]: Refreshing state... [id=7033227500110577822] -19:53:41.680 STDOUT [eks-karpenter] terraform_current: module.images.null_resource.copy_images["bitnami/kubectl#1.30.4"]: Refreshing state... [id=8319382030182575774] -19:53:41.680 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["karpenter/controller"]: Refreshing state... [id=platform-eng-eks-mcm/karpenter/controller] -19:53:41.680 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["bitnami/kubectl"]: Refreshing state... [id=platform-eng-eks-mcm/bitnami/kubectl] -19:53:41.755 STDOUT [eks-karpenter] terraform_current: data.aws_ecr_image.kubectl_image: Reading... -19:53:41.755 STDOUT [eks-karpenter] terraform_current: data.aws_ecr_image.karpenter_image: Reading... -19:53:41.800 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_eks_pod_identity_association.karpenter[0]: Refreshing state... [id=a-eswqyfnqnzveqqrv9] -19:53:41.854 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.v033[0]: Reading... -19:53:41.854 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKS_CNI_Policy"]: Refreshing state... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-20240906232349108100000008] -19:53:41.854 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKSWorkerNodePolicy"]: Refreshing state... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-2024090623234923000000000a] -19:53:41.854 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.v1[0]: Reading... -19:53:41.854 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node_additional["AmazonSSMManagedInstanceCore"]: Refreshing state... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-2024090623234923830000000b] -19:53:41.854 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_eks_access_entry.node[0]: Refreshing state... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/Karpenter-platform-eng-eks-mcm-20240906232348257500000002] -19:53:41.854 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEC2ContainerRegistryReadOnly"]: Refreshing state... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-20240906232349117600000009] -19:53:41.886 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.v1[0]: Read complete after 0s [id=1075048438] -19:53:41.886 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.v033[0]: Read complete after 0s [id=312113173] -19:53:41.899 STDOUT [eks-karpenter] terraform_current: data.aws_ecr_image.kubectl_image: Read complete after 0s [id=sha256:da695e26c8b3db7b9c8ae4159a55cfc2e55fc1608da5469b06d34ba20a8a0951] -19:53:41.910 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.controller[0]: Reading... -19:53:41.914 STDOUT [eks-karpenter] terraform_current: aws_iam_instance_profile.karpenter_node_instance_profile: Refreshing state... [id=platform-eng-eks-mcm-karpenter-instance-profile] -19:53:41.919 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.controller[0]: Read complete after 0s [id=312113173] -19:53:41.919 STDOUT [eks-karpenter] terraform_current: data.aws_ecr_image.karpenter_image: Read complete after 0s [id=sha256:63f98949a9a89707ec45e48f39ae216c6833140a2401e958e18e641488b9ba02] -19:53:41.921 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_policy.controller[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/KarpenterController-2024090623241372970000000c] -19:53:41.950 STDOUT [eks-karpenter] terraform_current: helm_release.karpenter: Refreshing state... [id=karpenter] -19:53:42.232 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.controller[0]: Refreshing state... [id=KarpenterController-20240906232348260000000005-2024090623241427070000000d] -19:53:44.215 STDOUT [eks-karpenter] terraform_current: kubectl_manifest.karpenter_ec2_node_class: Refreshing state... [id=/apis/karpenter.k8s.aws/v1/ec2nodeclasses/platform-eng-eks-mcm-karpenter-node-class] -19:53:44.349 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Refreshing state... [id=loki] -19:53:45.225 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_region.current: Reading... -19:53:45.225 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_caller_identity.current: Reading... -19:53:45.225 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_caller_identity.current: Reading... -19:53:45.225 STDOUT [eks-loki] terraform_current: module.images.data.aws_caller_identity.current: Reading... -19:53:45.225 STDOUT [eks-loki] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... -19:53:45.225 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.empty: Reading... -19:53:45.225 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zones.zones: Reading... -19:53:45.225 STDOUT [eks-loki] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... -19:53:45.225 STDOUT [eks-loki] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... -19:53:45.230 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.empty: Read complete after 0s [id=1132004489] -19:53:45.241 STDOUT [eks-loki] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s -19:53:45.241 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:53:45.241 STDOUT [eks-loki] terraform_current: module.images.data.aws_region.current: Reading... -19:53:45.241 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_region.current: Reading... -19:53:45.241 STDOUT [eks-loki] terraform_current: data.aws_caller_identity.current: Reading... -19:53:45.257 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:53:45.257 STDOUT [eks-loki] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:53:45.263 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:53:45.263 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_partition.current: Reading... -19:53:45.265 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] -19:53:45.268 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_iam_policy_document.this[0]: Reading... -19:53:45.278 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=1893037846] -19:53:45.278 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role.this[0]: Refreshing state... [id=platform-eng-eks-mcm-loki] -19:53:45.293 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:53:45.314 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_arn.current: Reading... -19:53:45.325 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki] -19:53:45.327 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -19:53:45.353 STDOUT [eks-loki] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:53:45.353 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.key_admin: Reading... -19:53:45.373 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/enterprise-logs-provisioner"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/enterprise-logs-provisioner] -19:53:45.373 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.key_admin: Read complete after 0s [id=2059337135] -19:53:45.373 STDOUT [eks-loki] terraform_current: module.images.data.aws_arn.current: Reading... -19:53:45.373 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/loki"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/loki] -19:53:45.373 STDOUT [eks-loki] terraform_current: data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:53:45.373 STDOUT [eks-loki] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -19:53:45.377 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/nginx-unprivileged"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/nginx-unprivileged] -19:53:45.377 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/loki-canary"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/loki-canary] -19:53:45.388 STDOUT [eks-loki] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 0s [id=us-gov-east-1] -19:53:45.400 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["kiwigrid/k8s-sidecar"]: Refreshing state... [id=platform-eng-eks-mcm/kiwigrid/k8s-sidecar] -19:53:45.400 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 0s [id=us-gov-east-1] -19:53:45.411 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["memcached"]: Refreshing state... [id=platform-eng-eks-mcm/memcached] -19:53:45.534 STDOUT [eks-metrics-server] terraform_current: Terraform used the selected providers to generate the following execution -19:53:45.534 STDOUT [eks-metrics-server] terraform_current: plan. Resource actions are indicated with the following symbols: -19:53:45.534 STDOUT [eks-metrics-server] terraform_current:  - destroy -19:53:45.534 STDOUT [eks-metrics-server] terraform_current: Terraform will perform the following actions: -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  # helm_release.metrics_server will be destroyed -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - resource "helm_release" "metrics_server" { -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - atomic = false -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - chart = "metrics-server" -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - cleanup_on_fail = false -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - create_namespace = false -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - dependency_update = false -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - disable_crd_hooks = false -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - disable_openapi_validation = false -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - disable_webhooks = false -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - force_update = false -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - id = "metrics-server" -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - lint = false -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - max_history = 0 -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - metadata = [ -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - { -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - app_version = "0.7.1" -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - chart = "metrics-server" -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - first_deployed = 1725664959 -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - last_deployed = 1725664959 -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - name = "metrics-server" -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - namespace = "kube-system" -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - notes = <<-EOT -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  *********************************************************************** -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  * Metrics Server * -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  *********************************************************************** -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  Chart version: 3.12.1 -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  App version: 0.7.1 -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  Image tag: 224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/metrics-server:v0.7.1 -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  *********************************************************************** -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  EOT -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - revision = 1 -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - values = jsonencode( -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  { -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - apiService = { -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - create = true -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - extraArgs = [ -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - "--kubelet-preferred-address-types=InternalIP", -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  ] -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - image = { -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/metrics-server" -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - tag = "v0.7.1" -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  ) -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - version = "3.12.1" -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  }, -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  ] -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - name = "metrics-server" -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - namespace = "kube-system" -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - pass_credentials = false -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - recreate_pods = false -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - render_subchart_notes = true -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - replace = false -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - repository = "https://kubernetes-sigs.github.io/metrics-server" -> null -19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - reset_values = false -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - reuse_values = false -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - skip_crds = false -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - status = "deployed" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - timeout = 300 -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - verify = false -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - version = "3.12.1" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - wait = true -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - wait_for_jobs = false -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - set { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - name = "apiService.create" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - value = "true" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  # (1 unchanged attribute hidden) -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - set { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - name = "extraArgs[0]" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - value = "--kubelet-preferred-address-types=InternalIP" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  # (1 unchanged attribute hidden) -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - set { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - name = "image.repository" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/metrics-server" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  # (1 unchanged attribute hidden) -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - set { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - name = "image.tag" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - value = "v0.7.1" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  # (1 unchanged attribute hidden) -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["metrics-server"] will be destroyed -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - id = "platform-eng-eks-mcm/metrics-server" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - policy = jsonencode( -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - rules = [ -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - action = { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - type = "expire" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - description = "keep 5 images" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - rulePriority = 1 -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - selection = { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - countNumber = 5 -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - countType = "imageCountMoreThan" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - tagStatus = "any" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  }, -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  ] -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  ) -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - registry_id = "224384469011" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - repository = "platform-eng-eks-mcm/metrics-server" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  # module.images.aws_ecr_repository.image_repos["metrics-server"] will be destroyed -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/metrics-server" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - force_delete = true -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - id = "platform-eng-eks-mcm/metrics-server" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - name = "platform-eng-eks-mcm/metrics-server" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - registry_id = "224384469011" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/metrics-server" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - tags = { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Environment" = "application" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/metrics-server" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "boc:created_by" = "terraform" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - tags_all = { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Environment" = "application" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/metrics-server" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Terraform" = "true" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Terragrunt" = "true" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "boc:created_by" = "terraform" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - encryption_configuration { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - encryption_type = "KMS" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - image_scanning_configuration { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - scan_on_push = true -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  # module.images.null_resource.copy_images["metrics-server#v0.7.1"] will be destroyed -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - resource "null_resource" "copy_images" { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - id = "7262007232490788094" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - triggers = { -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "region" = "us-gov-east-1" -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -19:53:45.537 STDOUT [eks-metrics-server] terraform_current: Plan: 0 to add, 0 to change, 4 to destroy. -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  -19:53:45.537 STDOUT [eks-metrics-server] terraform_current: Changes to Outputs: -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - module_name = "tfmod-metrics-server" -> null -19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - module_version = "0.0.1" -> null -19:53:45.578 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["prom/memcached-exporter"]: Refreshing state... [id=platform-eng-eks-mcm/prom/memcached-exporter] -19:53:45.584 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.key_policy_combined: Reading... -19:53:45.589 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.key_policy_combined: Read complete after 0s [id=2059337135] -19:53:45.594 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... -19:53:45.608 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... -19:53:45.608 STDOUT [eks-loki] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 1s [id=lab-dev-gov] -19:53:45.610 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... -19:53:45.610 STDOUT [eks-loki] terraform_current: data.aws_s3_bucket.s3_server_access_logs: Reading... -19:53:45.612 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_kms_key.key[0]: Refreshing state... [id=48acfe83-618e-417e-82d1-498592f8da65] -19:53:45.656 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] -19:53:45.716 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] -19:53:45.730 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/loki-canary#3.0.0"]: Refreshing state... [id=3148087180813738972] -19:53:45.730 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["memcached"]: Refreshing state... [id=platform-eng-eks-mcm/memcached] -19:53:45.730 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prom/memcached-exporter"]: Refreshing state... [id=platform-eng-eks-mcm/prom/memcached-exporter] -19:53:45.730 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/nginx-unprivileged"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/nginx-unprivileged] -19:53:45.730 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["kiwigrid/k8s-sidecar"]: Refreshing state... [id=platform-eng-eks-mcm/kiwigrid/k8s-sidecar] -19:53:45.753 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] -19:53:45.756 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/enterprise-logs-provisioner"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/enterprise-logs-provisioner] -19:53:45.759 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/loki] -19:53:45.786 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki-canary"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/loki-canary] -19:53:45.788 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["kiwigrid/k8s-sidecar#1.27.4"]: Refreshing state... [id=4475259168260390874] -19:53:45.788 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/nginx-unprivileged#1.25.2-alpine"]: Refreshing state... [id=2003059566474709841] -19:53:45.791 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["memcached#1.6.23-alpine"]: Refreshing state... [id=6793409878383401785] -19:53:45.823 STDOUT [eks-loki] terraform_current: data.aws_s3_bucket.s3_server_access_logs: Read complete after 0s [id=inf-logs-224384469011-us-gov-east-1] -19:53:45.827 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["prom/memcached-exporter#v0.14.4"]: Refreshing state... [id=1971792497354324149] -19:53:45.847 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/loki#3.1.1"]: Refreshing state... [id=7168708508218564438] -19:53:45.847 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/enterprise-logs-provisioner#v1.7.0"]: Refreshing state... [id=2400534705754070951] -19:53:45.872 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_iam_policy_document.encrypted-object-manager[0]: Reading... -19:53:45.872 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_kms_alias.key[0]: Refreshing state... [id=alias/k-kms-platform-eng-eks-mcm-loki] -19:53:45.874 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_iam_policy_document.encrypted-object-manager[0]: Read complete after 0s [id=4130806941] -19:53:45.900 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_policy.encrypted-object-manager[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232733101400000003] -19:53:45.911 STDOUT [eks-loki] terraform_current: helm_release.loki: Refreshing state... [id=loki] -19:53:45.994 STDOUT [eks-karpenter] terraform_current: kubectl_manifest.karpenter_node_pool: Refreshing state... [id=/apis/karpenter.sh/v1/nodepools/platform-eng-eks-mcm-node-pool-general] -19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_server_side_encryption_configuration.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki] -19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_iam_policy_document.s3-bucket-owner[0]: Reading... -19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_ownership_controls.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki] -19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.this: Reading... -19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_versioning.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki] -19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_logging.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki] -19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.this: Read complete after 0s [id=3656115763] -19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_iam_policy_document.s3-bucket-owner[0]: Read complete after 0s [id=2997069216] -19:53:46.067 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.policy_delay: Refreshing state... [id=2024-09-06T23:29:22Z] -19:53:46.082 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_policy.s3-bucket-owner[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232732146300000001] -19:53:46.082 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.bucket_policy_combined: Reading... -19:53:46.082 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.bucket_policy_combined: Read complete after 0s [id=3656115763] -19:53:46.119 STDOUT [eks-metrics-server] terraform_current: helm_release.metrics_server: Destroying... [id=metrics-server] -19:53:46.122 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_policy.policy[0]: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki] -19:53:46.127 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role_policy_attachment.encrypted-object-manager[0]: Refreshing state... [id=platform-eng-eks-mcm-loki-20240906232733624100000004] -19:53:46.272 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_public_access_block.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki] -19:53:46.328 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.acl_delay: Refreshing state... [id=2024-09-06T23:29:53Z] -19:53:46.336 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role_policy_attachment.s3-bucket-owner[0]: Refreshing state... [id=platform-eng-eks-mcm-loki-20240906232732670800000002] -19:53:46.350 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_acl.this[0]: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki,private] -19:53:48.202 STDOUT [eks-karpenter] terraform_current: Terraform used the selected providers to generate the following execution -19:53:48.202 STDOUT [eks-karpenter] terraform_current: plan. Resource actions are indicated with the following symbols: -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - destroy -19:53:48.202 STDOUT [eks-karpenter] terraform_current: Terraform will perform the following actions: -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"] will be destroyed -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource "aws_ec2_tag" "container_subnets" { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - id = "subnet-02c2250b9ec2dd6a2,karpenter.sh/discovery" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - key = "karpenter.sh/discovery" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource_id = "subnet-02c2250b9ec2dd6a2" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "platform-eng-eks-mcm" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # aws_ec2_tag.container_subnets["subnet-078b228071c609a50"] will be destroyed -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource "aws_ec2_tag" "container_subnets" { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - id = "subnet-078b228071c609a50,karpenter.sh/discovery" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - key = "karpenter.sh/discovery" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource_id = "subnet-078b228071c609a50" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "platform-eng-eks-mcm" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"] will be destroyed -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource "aws_ec2_tag" "container_subnets" { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - id = "subnet-07a6339be3670fb41,karpenter.sh/discovery" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - key = "karpenter.sh/discovery" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource_id = "subnet-07a6339be3670fb41" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "platform-eng-eks-mcm" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # aws_iam_instance_profile.karpenter_node_instance_profile will be destroyed -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_instance_profile" "karpenter_node_instance_profile" { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:instance-profile/platform-eng-eks-mcm-karpenter-instance-profile" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - create_date = "2024-09-06T23:23:49Z" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - id = "platform-eng-eks-mcm-karpenter-instance-profile" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "platform-eng-eks-mcm-karpenter-instance-profile" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - path = "/" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - role = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - tags = {} -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - tags_all = { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - unique_id = "AIPATIPS3JAJWSGL362TA" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # helm_release.karpenter will be destroyed -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource "helm_release" "karpenter" { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - atomic = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - chart = "karpenter" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - cleanup_on_fail = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - create_namespace = true -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - dependency_update = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - description = "Kubernetes Node Autoscaling: built for flexibility, performance, and simplicity" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - disable_crd_hooks = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - disable_openapi_validation = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - disable_webhooks = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - force_update = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - id = "karpenter" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - lint = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - max_history = 0 -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - metadata = [ -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - app_version = "1.0.1" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - chart = "karpenter" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - first_deployed = 1725665114 -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - last_deployed = 1725665114 -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "karpenter" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - namespace = "karpenter" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - revision = 1 -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - values = jsonencode( -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - affinity = { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - nodeAffinity = { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - requiredDuringSchedulingIgnoredDuringExecution = { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - nodeSelectorTerms = [ -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - matchExpressions = [ -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - key = "karpenter.sh/nodepool" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - operator = "DoesNotExist" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - matchExpressions = [ -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - key = "eks.amazonaws.com/nodegroup" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - operator = "In" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - values = [ -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "eks-platform-eng-eks-mcm-nodegroup", -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - podAntiAffinity = { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - requiredDuringSchedulingIgnoredDuringExecution = [ -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - topologyKey = "kubernetes.io/hostname" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - controller = { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - env = [ -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "AWS_REGION" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "us-gov-east-1" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - image = { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - digest = "sha256:63f98949a9a89707ec45e48f39ae216c6833140a2401e958e18e641488b9ba02" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/karpenter/controller" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - tag = "1.0.1" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - postInstallHook = { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - image = { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - digest = "sha256:da695e26c8b3db7b9c8ae4159a55cfc2e55fc1608da5469b06d34ba20a8a0951" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/bitnami/kubectl" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - tag = "1.30.4" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - serviceAccount = { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - annotations = { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "eks.amazonaws.com/role-arn" = "arn:aws-us-gov:iam::224384469011:role/KarpenterController-20240906232348260000000005" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - settings = { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - clusterEndpoint = "https://D896BC3B83782F01D590ACB83BB75926.yl4.us-gov-east-1.eks.amazonaws.com" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - clusterName = "platform-eng-eks-mcm" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - featureGates = { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - spotToSpotConsolidation = true -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - interruptionQueue = "Karpenter-platform-eng-eks-mcm" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - isolatedVPC = true -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ) -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - version = "1.0.1" -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ] -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "karpenter" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - namespace = "karpenter" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - pass_credentials = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - recreate_pods = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - render_subchart_notes = true -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - replace = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - repository = "oci://public.ecr.aws/karpenter" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - reset_values = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - reuse_values = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - skip_crds = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - status = "deployed" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - timeout = 300 -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - verify = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - version = "1.0.1" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - wait = true -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - wait_for_jobs = false -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[0].matchExpressions[0].key" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "karpenter.sh/nodepool" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[0].matchExpressions[0].operator" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "DoesNotExist" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[1].matchExpressions[0].key" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "eks.amazonaws.com/nodegroup" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[1].matchExpressions[0].operator" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "In" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[1].matchExpressions[0].values[0]" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "eks-platform-eng-eks-mcm-nodegroup" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "affinity.podAntiAffinity.requiredDuringSchedulingIgnoredDuringExecution[0].topologyKey" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "kubernetes.io/hostname" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "controller.env[0].name" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "AWS_REGION" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "controller.env[0].value" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "us-gov-east-1" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "controller.image.digest" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "sha256:63f98949a9a89707ec45e48f39ae216c6833140a2401e958e18e641488b9ba02" -> null -19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "controller.image.repository" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/karpenter/controller" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "controller.image.tag" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "1.0.1" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "postInstallHook.image.digest" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "sha256:da695e26c8b3db7b9c8ae4159a55cfc2e55fc1608da5469b06d34ba20a8a0951" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "postInstallHook.image.repository" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/bitnami/kubectl" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "postInstallHook.image.tag" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "1.30.4" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "serviceAccount.annotations.eks\\.amazonaws\\.com/role-arn" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "arn:aws-us-gov:iam::224384469011:role/KarpenterController-20240906232348260000000005" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "settings.clusterEndpoint" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "https://D896BC3B83782F01D590ACB83BB75926.yl4.us-gov-east-1.eks.amazonaws.com" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "settings.clusterName" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "platform-eng-eks-mcm" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "settings.featureGates.spotToSpotConsolidation" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "true" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "settings.interruptionQueue" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "Karpenter-platform-eng-eks-mcm" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "settings.isolatedVPC" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "true" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # kubectl_manifest.karpenter_ec2_node_class will be destroyed -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "kubectl_manifest" "karpenter_ec2_node_class" { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - api_version = "karpenter.k8s.aws/v1" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - apply_only = false -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - force_conflicts = false -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - force_new = false -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "/apis/karpenter.k8s.aws/v1/ec2nodeclasses/platform-eng-eks-mcm-karpenter-node-class" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - kind = "EC2NodeClass" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - live_manifest_incluster = (sensitive value) -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - live_uid = "2cca7490-0118-4130-9a53-fb28e960a75d" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "platform-eng-eks-mcm-karpenter-node-class" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - server_side_apply = false -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - uid = "2cca7490-0118-4130-9a53-fb28e960a75d" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - validate_schema = true -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - wait_for_rollout = true -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - yaml_body = (sensitive value) -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - yaml_body_parsed = <<-EOT -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  apiVersion: karpenter.k8s.aws/v1 -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  kind: EC2NodeClass -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  metadata: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  annotations: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  kubernetes.io/description: EC2NodeClass for running Bottlerocket nodes -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  name: platform-eng-eks-mcm-karpenter-node-class -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  spec: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  amiFamily: Bottlerocket -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  amiSelectorTerms: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - alias: bottlerocket@latest -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  detailedMonitoring: true -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  instanceProfile: platform-eng-eks-mcm-karpenter-instance-profile -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  instanceStorePolicy: RAID0 -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  kubelet: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  evictionHard: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  memory.available: 5% -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  nodefs.available: 10% -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  nodefs.inodesFree: 10% -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  evictionMaxPodGracePeriod: 60 -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  evictionSoft: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  memory.available: 500Mi -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  nodefs.available: 15% -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  nodefs.inodesFree: 15% -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  evictionSoftGracePeriod: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  memory.available: 1m -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  nodefs.available: 1m30s -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  nodefs.inodesFree: 2m -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  imageGCHighThresholdPercent: 85 -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  imageGCLowThresholdPercent: 80 -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  metadataOptions: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  httpEndpoint: enabled -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  httpProtocolIPv6: enabled -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  httpPutResponseHopLimit: 2 -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  httpTokens: required -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  securityGroupSelectorTerms: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tags: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  Name: platform-eng-eks-mcm-node -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  subnetSelectorTerms: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tags: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  Name: '*-container-*' -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  EOT -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - yaml_incluster = (sensitive value) -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # kubectl_manifest.karpenter_node_pool will be destroyed -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "kubectl_manifest" "karpenter_node_pool" { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - api_version = "karpenter.sh/v1" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - apply_only = false -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - force_conflicts = false -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - force_new = false -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "/apis/karpenter.sh/v1/nodepools/platform-eng-eks-mcm-node-pool-general" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - kind = "NodePool" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - live_manifest_incluster = (sensitive value) -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - live_uid = "1b95faf2-f2a6-4c07-8956-4a6c6de4b659" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "platform-eng-eks-mcm-node-pool-general" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - server_side_apply = false -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - uid = "1b95faf2-f2a6-4c07-8956-4a6c6de4b659" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - validate_schema = true -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - wait_for_rollout = true -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - yaml_body = (sensitive value) -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - yaml_body_parsed = <<-EOT -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  apiVersion: karpenter.sh/v1 -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  kind: NodePool -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  metadata: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  annotations: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  kubernetes.io/description: General purpose NodePool for generic workloads -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  name: platform-eng-eks-mcm-node-pool-general -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  spec: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  disruption: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  consolidateAfter: 1h -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  consolidationPolicy: WhenEmptyOrUnderutilized -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  expireAfter: 1h -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  template: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  spec: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  nodeClassRef: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  group: karpenter.k8s.aws -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  kind: EC2NodeClass -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  name: platform-eng-eks-mcm-karpenter-node-class -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  requirements: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - key: kubernetes.io/arch -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  operator: In -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  values: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - amd64 -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - key: kubernetes.io/os -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  operator: In -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  values: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - linux -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - key: karpenter.sh/capacity-type -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  operator: In -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  values: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - on-demand -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - spot -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - key: karpenter.k8s.aws/instance-category -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  operator: In -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  values: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - c -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - m -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - r -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - t -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - key: karpenter.k8s.aws/instance-generation -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  operator: Gt -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  values: -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "2" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  EOT -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - yaml_incluster = (sensitive value) -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["bitnami/kubectl"] will be destroyed -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "platform-eng-eks-mcm/bitnami/kubectl" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - policy = jsonencode( -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - rules = [ -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - action = { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - type = "expire" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - description = "keep 5 images" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - rulePriority = 1 -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - selection = { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - countNumber = 5 -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - countType = "imageCountMoreThan" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tagStatus = "any" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  ) -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - registry_id = "224384469011" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - repository = "platform-eng-eks-mcm/bitnami/kubectl" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["karpenter/controller"] will be destroyed -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "platform-eng-eks-mcm/karpenter/controller" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - policy = jsonencode( -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - rules = [ -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - action = { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - type = "expire" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - description = "keep 5 images" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - rulePriority = 1 -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - selection = { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - countNumber = 5 -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - countType = "imageCountMoreThan" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tagStatus = "any" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  ) -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - registry_id = "224384469011" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - repository = "platform-eng-eks-mcm/karpenter/controller" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # module.images.aws_ecr_repository.image_repos["bitnami/kubectl"] will be destroyed -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/bitnami/kubectl" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - force_delete = true -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "platform-eng-eks-mcm/bitnami/kubectl" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "platform-eng-eks-mcm/bitnami/kubectl" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - registry_id = "224384469011" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/bitnami/kubectl" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tags = { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Environment" = "application" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/bitnami/kubectl" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:created_by" = "terraform" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tags_all = { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Environment" = "application" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/bitnami/kubectl" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:created_by" = "terraform" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - encryption_configuration { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - encryption_type = "KMS" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - image_scanning_configuration { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - scan_on_push = true -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # module.images.aws_ecr_repository.image_repos["karpenter/controller"] will be destroyed -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/karpenter/controller" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - force_delete = true -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "platform-eng-eks-mcm/karpenter/controller" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "platform-eng-eks-mcm/karpenter/controller" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - registry_id = "224384469011" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/karpenter/controller" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tags = { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Environment" = "application" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/karpenter/controller" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:created_by" = "terraform" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tags_all = { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Environment" = "application" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/karpenter/controller" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:created_by" = "terraform" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - encryption_configuration { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - encryption_type = "KMS" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - image_scanning_configuration { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - scan_on_push = true -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # module.images.null_resource.copy_images["bitnami/kubectl#1.30.4"] will be destroyed -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "null_resource" "copy_images" { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "8319382030182575774" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - triggers = { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "region" = "us-gov-east-1" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # module.images.null_resource.copy_images["karpenter/controller#1.0.1"] will be destroyed -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "null_resource" "copy_images" { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "7033227500110577822" -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - triggers = { -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "region" = "us-gov-east-1" -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_rule.this["health_event"] will be destroyed -19:53:48.203 STDOUT [eks-karpenter] terraform_current:   -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_rule" "this" { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:events:us-gov-east-1:224384469011:rule/KarpenterHealthEvent-20240906232348266800000006" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - description = "Karpenter interrupt - AWS health event" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_pattern = jsonencode( -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - detail-type = [ -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "AWS Health Event", -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - source = [ -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "aws.health", -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ) -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterHealthEvent-20240906232348266800000006" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - is_enabled = true -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name = "KarpenterHealthEvent-20240906232348266800000006" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name_prefix = "KarpenterHealthEvent-" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - state = "ENABLED" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags = { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags_all = { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # (2 unchanged attributes hidden) -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_rebalance"] will be destroyed -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_rule" "this" { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:events:us-gov-east-1:224384469011:rule/KarpenterInstanceRebalance-20240906232348258700000004" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - description = "Karpenter interrupt - EC2 instance rebalance recommendation" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_pattern = jsonencode( -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - detail-type = [ -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "EC2 Instance Rebalance Recommendation", -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - source = [ -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "aws.ec2", -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ) -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterInstanceRebalance-20240906232348258700000004" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - is_enabled = true -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name = "KarpenterInstanceRebalance-20240906232348258700000004" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name_prefix = "KarpenterInstanceRebalance-" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - state = "ENABLED" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags = { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags_all = { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # (2 unchanged attributes hidden) -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_state_change"] will be destroyed -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_rule" "this" { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:events:us-gov-east-1:224384469011:rule/KarpenterInstanceStateChange-20240906232348256000000001" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - description = "Karpenter interrupt - EC2 instance state-change notification" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_pattern = jsonencode( -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - detail-type = [ -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "EC2 Instance State-change Notification", -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - source = [ -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "aws.ec2", -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ) -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterInstanceStateChange-20240906232348256000000001" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - is_enabled = true -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name = "KarpenterInstanceStateChange-20240906232348256000000001" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name_prefix = "KarpenterInstanceStateChange-" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - state = "ENABLED" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags = { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags_all = { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # (2 unchanged attributes hidden) -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_rule.this["spot_interrupt"] will be destroyed -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_rule" "this" { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:events:us-gov-east-1:224384469011:rule/KarpenterSpotInterrupt-20240906232348258200000003" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - description = "Karpenter interrupt - EC2 spot instance interruption warning" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_pattern = jsonencode( -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - detail-type = [ -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "EC2 Spot Instance Interruption Warning", -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - source = [ -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "aws.ec2", -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ) -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterSpotInterrupt-20240906232348258200000003" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - is_enabled = true -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name = "KarpenterSpotInterrupt-20240906232348258200000003" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name_prefix = "KarpenterSpotInterrupt-" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - state = "ENABLED" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags = { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags_all = { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # (2 unchanged attributes hidden) -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_target.this["health_event"] will be destroyed -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_target" "this" { -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterHealthEvent-20240906232348266800000006-KarpenterInterruptionQueueTarget" -> null -19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - rule = "KarpenterHealthEvent-20240906232348266800000006" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - target_id = "KarpenterInterruptionQueueTarget" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # (3 unchanged attributes hidden) -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_target.this["instance_rebalance"] will be destroyed -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_target" "this" { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterInstanceRebalance-20240906232348258700000004-KarpenterInterruptionQueueTarget" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - rule = "KarpenterInstanceRebalance-20240906232348258700000004" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - target_id = "KarpenterInterruptionQueueTarget" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # (3 unchanged attributes hidden) -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_target.this["instance_state_change"] will be destroyed -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_target" "this" { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterInstanceStateChange-20240906232348256000000001-KarpenterInterruptionQueueTarget" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - rule = "KarpenterInstanceStateChange-20240906232348256000000001" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - target_id = "KarpenterInterruptionQueueTarget" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # (3 unchanged attributes hidden) -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_target.this["spot_interrupt"] will be destroyed -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_target" "this" { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterSpotInterrupt-20240906232348258200000003-KarpenterInterruptionQueueTarget" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - rule = "KarpenterSpotInterrupt-20240906232348258200000003" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - target_id = "KarpenterInterruptionQueueTarget" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # (3 unchanged attributes hidden) -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_eks_access_entry.node[0] will be destroyed -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - resource "aws_eks_access_entry" "node" { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - access_entry_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:access-entry/platform-eng-eks-mcm/role/224384469011/Karpenter-platform-eng-eks-mcm-20240906232348257500000002/3ec8e4d3-b820-8574-2ff6-36a2dfede510" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - created_at = "2024-09-06T23:24:39Z" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - id = "platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - kubernetes_groups = [ -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "system:nodes", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - modified_at = "2024-09-06T23:24:39Z" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - tags = {} -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - tags_all = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - type = "EC2_LINUX" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - user_name = "system:node:{{EC2PrivateDNSName}}" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_eks_pod_identity_association.karpenter[0] will be destroyed -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - resource "aws_eks_pod_identity_association" "karpenter" { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - association_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:podidentityassociation/platform-eng-eks-mcm/a-eswqyfnqnzveqqrv9" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - association_id = "a-eswqyfnqnzveqqrv9" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - id = "a-eswqyfnqnzveqqrv9" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - namespace = "kube-system" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - role_arn = "arn:aws-us-gov:iam::224384469011:role/KarpenterController-20240906232348260000000005" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - service_account = "karpenter" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - tags_all = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_policy.controller[0] will be destroyed -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_policy" "controller" { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/KarpenterController-2024090623241372970000000c" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - attachment_count = 1 -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - description = "Karpenter controller IAM policy" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/KarpenterController-2024090623241372970000000c" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - name = "KarpenterController-2024090623241372970000000c" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - name_prefix = "KarpenterController-" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - path = "/" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - policy = jsonencode( -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Statement = [ -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = [ -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:RunInstances", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:CreateFleet", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = [ -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*::snapshot/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*::image/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:subnet/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:spot-instances-request/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:security-group/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:launch-template/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedEC2InstanceActions" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = [ -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:RunInstances", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:CreateLaunchTemplate", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:CreateFleet", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringLike = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/karpenter.sh/nodepool" = "*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = [ -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:volume/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:spot-instances-request/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:network-interface/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:launch-template/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:instance/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:fleet/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedEC2InstanceActionsWithTags" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "ec2:CreateTags" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:CreateAction" = [ -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "RunInstances", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "CreateFleet", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "CreateLaunchTemplate", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringLike = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/karpenter.sh/nodepool" = "*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = [ -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:volume/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:spot-instances-request/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:network-interface/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:launch-template/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:instance/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:fleet/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedResourceCreationTagging" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "ec2:CreateTags" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ForAllValues:StringEquals" = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:TagKeys" = [ -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "karpenter.sh/nodeclaim", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Name", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringLike = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/karpenter.sh/nodepool" = "*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:ec2:*:*:instance/*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedResourceTagging" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = [ -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:TerminateInstances", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DeleteLaunchTemplate", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringLike = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/karpenter.sh/nodepool" = "*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = [ -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:launch-template/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:instance/*", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedDeletion" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = [ -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeSubnets", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeSpotPriceHistory", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeSecurityGroups", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeLaunchTemplates", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeInstances", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeInstanceTypes", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeInstanceTypeOfferings", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeImages", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeAvailabilityZones", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestedRegion" = "us-gov-east-1" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowRegionalReadActions" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "ssm:GetParameter" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:ssm:us-gov-east-1::parameter/aws/service/*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowSSMReadActions" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "pricing:GetProducts" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowPricingReadActions" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = [ -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "sqs:ReceiveMessage", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "sqs:GetQueueUrl", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "sqs:GetQueueAttributes", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "sqs:DeleteMessage", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowInterruptionQueueActions" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "iam:PassRole" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "iam:PassedToService" = "ec2.amazonaws.com" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:iam::224384469011:role/Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowPassingInstanceRole" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "iam:CreateInstanceProfile" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/topology.kubernetes.io/region" = "us-gov-east-1" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringLike = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/karpenter.k8s.aws/ec2nodeclass" = "*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedInstanceProfileCreationActions" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "iam:TagInstanceProfile" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/topology.kubernetes.io/region" = "us-gov-east-1" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringLike = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/karpenter.k8s.aws/ec2nodeclass" = "*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/karpenter.k8s.aws/ec2nodeclass" = "*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedInstanceProfileTagActions" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = [ -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "iam:RemoveRoleFromInstanceProfile", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "iam:DeleteInstanceProfile", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "iam:AddRoleToInstanceProfile", -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/topology.kubernetes.io/region" = "us-gov-east-1" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringLike = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/karpenter.k8s.aws/ec2nodeclass" = "*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedInstanceProfileActions" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "iam:GetInstanceProfile" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "*" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowInstanceProfileReadActions" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "eks:DescribeCluster" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:cluster/platform-eng-eks-mcm" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowAPIServerEndpointDiscovery" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Version = "2012-10-17" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ) -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - policy_id = "ANPATIPS3JAJ2NGAKPGOF" -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - tags = {} -> null -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - tags_all = { -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" -19:53:48.216 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" -19:53:48.216 STDOUT [eks-karpenter] terraform_current:  - -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  "created_by" = "matthew.c.morgan@census.gov" -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_role.controller[0] will be destroyed -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_role" "controller" { -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/KarpenterController-20240906232348260000000005" -> null -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - assume_role_policy = jsonencode( -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  { -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - Statement = [ -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - Action = [ -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - "sts:TagSession", -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - "sts:AssumeRole", -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - Principal = { -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - Service = "pods.eks.amazonaws.com" -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.246 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Action = "sts:AssumeRoleWithWebIdentity" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Condition = { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:aud" = "sts.amazonaws.com" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:sub" = "system:serviceaccount:karpenter:karpenter" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Principal = { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Federated = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Version = "2012-10-17" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ) -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - create_date = "2024-09-06T23:23:48Z" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - description = "Karpenter controller IAM role" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - force_detach_policies = true -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterController-20240906232348260000000005" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - managed_policy_arns = [ -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/KarpenterController-2024090623241372970000000c", -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - max_session_duration = 3600 -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - name = "KarpenterController-20240906232348260000000005" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - name_prefix = "KarpenterController-" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - path = "/" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - tags = {} -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - tags_all = { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - unique_id = "AROATIPS3JAJZ4M75TL3A" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_role.node[0] will be destroyed -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_role" "node" { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - assume_role_policy = jsonencode( -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Statement = [ -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Action = "sts:AssumeRole" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Principal = { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Service = "ec2.amazonaws.com" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Sid = "EKSNodeAssumeRole" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Version = "2012-10-17" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ) -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - create_date = "2024-09-06T23:23:48Z" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - force_detach_policies = true -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - managed_policy_arns = [ -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEKSWorkerNodePolicy", -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEKS_CNI_Policy", -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonSSMManagedInstanceCore", -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - max_session_duration = 3600 -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - name = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - name_prefix = "Karpenter-platform-eng-eks-mcm-" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - path = "/" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - tags = {} -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - tags_all = { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - unique_id = "AROATIPS3JAJ4WSLDKX5Q" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # (2 unchanged attributes hidden) -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_role_policy_attachment.controller[0] will be destroyed -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_role_policy_attachment" "controller" { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterController-20240906232348260000000005-2024090623241427070000000d" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/KarpenterController-2024090623241372970000000c" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - role = "KarpenterController-20240906232348260000000005" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEC2ContainerRegistryReadOnly"] will be destroyed -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_role_policy_attachment" "node" { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002-20240906232349117600000009" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - role = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKSWorkerNodePolicy"] will be destroyed -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_role_policy_attachment" "node" { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002-2024090623234923000000000a" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKSWorkerNodePolicy" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - role = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKS_CNI_Policy"] will be destroyed -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_role_policy_attachment" "node" { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002-20240906232349108100000008" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKS_CNI_Policy" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - role = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_role_policy_attachment.node_additional["AmazonSSMManagedInstanceCore"] will be destroyed -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_role_policy_attachment" "node_additional" { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002-2024090623234923830000000b" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonSSMManagedInstanceCore" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - role = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_sqs_queue.this[0] will be destroyed -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_sqs_queue" "this" { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - content_based_deduplication = false -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - delay_seconds = 0 -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - fifo_queue = false -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - kms_data_key_reuse_period_seconds = 300 -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - max_message_size = 262144 -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - message_retention_seconds = 300 -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - name = "Karpenter-platform-eng-eks-mcm" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - policy = jsonencode( -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Statement = [ -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Action = "sqs:SendMessage" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Principal = { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Service = [ -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "sqs.amazonaws.com", -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "events.amazonaws.com", -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Sid = "SqsWrite" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Action = "sqs:*" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Condition = { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "aws:SecureTransport" = "false" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Effect = "Deny" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Principal = "*" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Sid = "DenyHTTP" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Version = "2012-10-17" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ) -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - receive_wait_time_seconds = 0 -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - sqs_managed_sse_enabled = true -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - tags = {} -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - tags_all = { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - url = "https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - visibility_timeout_seconds = 30 -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # (6 unchanged attributes hidden) -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_sqs_queue_policy.this[0] will be destroyed -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_sqs_queue_policy" "this" { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - policy = jsonencode( -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Statement = [ -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Action = "sqs:SendMessage" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Principal = { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Service = [ -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "sqs.amazonaws.com", -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "events.amazonaws.com", -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Sid = "SqsWrite" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Action = "sqs:*" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Condition = { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "aws:SecureTransport" = "false" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Effect = "Deny" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Principal = "*" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Sid = "DenyHTTP" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  }, -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Version = "2012-10-17" -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ) -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - queue_url = "https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -19:53:48.247 STDOUT [eks-karpenter] terraform_current: Plan: 0 to add, 0 to change, 33 to destroy. -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  -19:53:48.247 STDOUT [eks-karpenter] terraform_current: Changes to Outputs: -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - module_name = "tfmod-karpenter" -> null -19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - module_version = "0.0.2" -> null -19:53:48.345 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_caller_identity.current: Reading... -19:53:48.345 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_region.current: Reading... -19:53:48.345 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_partition.current: Reading... -19:53:48.345 STDOUT [eks-tempo] terraform_current: module.images.data.aws_caller_identity.current: Reading... -19:53:48.345 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.empty: Reading... -19:53:48.345 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zones.zones: Reading... -19:53:48.345 STDOUT [eks-tempo] terraform_current: data.aws_caller_identity.current: Reading... -19:53:48.345 STDOUT [eks-tempo] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... -19:53:48.345 STDOUT [eks-tempo] terraform_current: module.images.data.aws_region.current: Reading... -19:53:48.353 STDOUT [eks-tempo] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... -19:53:48.353 STDOUT [eks-tempo] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:53:48.353 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:53:48.353 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] -19:53:48.353 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.empty: Read complete after 0s [id=1132004489] -19:53:48.365 STDOUT [eks-tempo] terraform_current: data.aws_eks_cluster_auth.cluster_auth: Reading... -19:53:48.365 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_region.current: Reading... -19:53:48.376 STDOUT [eks-tempo] terraform_current: data.aws_eks_cluster.cluster: Reading... -19:53:48.376 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_caller_identity.current: Reading... -19:53:48.376 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:53:48.376 STDOUT [eks-tempo] terraform_current: data.aws_eks_cluster_auth.cluster_auth: Read complete after 0s [id=platform-eng-eks-mcm] -19:53:48.377 STDOUT [eks-tempo] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... -19:53:48.381 STDOUT [eks-tempo] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s -19:53:48.392 STDOUT [eks-tempo] terraform_current: data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:53:48.400 STDOUT [eks-tempo] terraform_current: data.aws_s3_bucket.s3_server_access_logs: Reading... -19:53:48.423 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:53:48.453 STDOUT [eks-tempo] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:53:48.458 STDOUT [eks-tempo] terraform_current: module.images.data.aws_arn.current: Reading... -19:53:48.458 STDOUT [eks-tempo] terraform_current: module.images.aws_ecr_repository.image_repos["tempo"]: Refreshing state... [id=platform-eng-eks-mcm/tempo] -19:53:48.460 STDOUT [eks-tempo] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -19:53:48.496 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:53:48.508 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 1s [id=us-gov-east-1] -19:53:48.508 STDOUT [eks-tempo] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 1s [id=us-gov-east-1] -19:53:48.508 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo] -19:53:48.508 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_arn.current: Reading... -19:53:48.514 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -19:53:48.515 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... -19:53:48.515 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... -19:53:48.515 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... -19:53:48.519 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.key_admin: Reading... -19:53:48.527 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.key_admin: Read complete after 0s [id=2059337135] -19:53:48.528 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.key_policy_combined: Reading... -19:53:48.530 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.key_policy_combined: Read complete after 0s [id=2059337135] -19:53:48.531 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_kms_key.key[0]: Refreshing state... [id=009b63d6-497f-4139-9c8c-7cae709ed71b] -19:53:48.580 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] -19:53:48.580 STDOUT [eks-tempo] terraform_current: data.aws_s3_bucket.s3_server_access_logs: Read complete after 1s [id=inf-logs-224384469011-us-gov-east-1] -19:53:48.627 STDOUT [eks-tempo] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["tempo"]: Refreshing state... [id=platform-eng-eks-mcm/tempo] -19:53:48.627 STDOUT [eks-tempo] terraform_current: module.images.null_resource.copy_images["tempo#2.5.0"]: Refreshing state... [id=154927662841800702] -19:53:48.632 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] -19:53:48.644 STDOUT [eks-tempo] terraform_current: data.aws_eks_cluster.cluster: Read complete after 1s [id=platform-eng-eks-mcm] -19:53:48.647 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_iam_policy_document.this[0]: Reading... -19:53:48.650 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=2457411343] -19:53:48.654 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role.this[0]: Refreshing state... [id=platform-eng-eks-mcm-tempo] -19:53:48.664 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] -19:53:48.704 STDOUT [eks-tempo] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 1s [id=lab-dev-gov] -19:53:48.750 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_kms_alias.key[0]: Refreshing state... [id=alias/k-kms-platform-eng-eks-mcm-tempo] -19:53:48.750 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_iam_policy_document.encrypted-object-manager[0]: Reading... -19:53:48.753 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_iam_policy_document.encrypted-object-manager[0]: Read complete after 0s [id=1780885925] -19:53:48.755 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_policy.encrypted-object-manager[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232934209600000003] -19:53:48.886 STDOUT [eks-karpenter] terraform_current: kubectl_manifest.karpenter_node_pool: Destroying... [id=/apis/karpenter.sh/v1/nodepools/platform-eng-eks-mcm-node-pool-general] -19:53:49.051 STDOUT [eks-metrics-server] terraform_current: helm_release.metrics_server: Destruction complete after 3s -19:53:49.058 STDOUT [eks-metrics-server] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["metrics-server"]: Destroying... [id=platform-eng-eks-mcm/metrics-server] -19:53:49.084 STDOUT [eks-metrics-server] terraform_current: module.images.null_resource.copy_images["metrics-server#v0.7.1"]: Destroying... [id=7262007232490788094] -19:53:49.087 STDOUT [eks-metrics-server] terraform_current: module.images.null_resource.copy_images["metrics-server#v0.7.1"]: Destruction complete after 0s -19:53:49.129 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role_policy_attachment.encrypted-object-manager[0]: Refreshing state... [id=platform-eng-eks-mcm-tempo-20240906232934771300000004] -19:53:49.224 STDOUT [eks-metrics-server] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["metrics-server"]: Destruction complete after 0s -19:53:49.227 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.policy_delay: Refreshing state... [id=2024-09-06T23:31:23Z] -19:53:49.227 STDOUT [eks-metrics-server] terraform_current: module.images.aws_ecr_repository.image_repos["metrics-server"]: Destroying... [id=platform-eng-eks-mcm/metrics-server] -19:53:49.238 STDOUT [eks-tempo] terraform_current: helm_release.tempo: Refreshing state... [id=tempo] -19:53:49.238 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_iam_policy_document.s3-bucket-owner[0]: Reading... -19:53:49.256 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_server_side_encryption_configuration.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo] -19:53:49.257 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_ownership_controls.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo] -19:53:49.257 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.this: Reading... -19:53:49.257 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_versioning.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo] -19:53:49.257 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_iam_policy_document.s3-bucket-owner[0]: Read complete after 0s [id=4142807449] -19:53:49.257 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_logging.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo] -19:53:49.282 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.this: Read complete after 0s [id=143145154] -19:53:49.283 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_policy.s3-bucket-owner[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232923002900000001] -19:53:49.296 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.bucket_policy_combined: Reading... -19:53:49.307 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.bucket_policy_combined: Read complete after 0s [id=143145154] -19:53:49.321 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_policy.policy[0]: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo] -19:53:49.384 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_public_access_block.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo] -19:53:49.421 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.acl_delay: Refreshing state... [id=2024-09-06T23:31:53Z] -19:53:49.445 STDOUT [eks-metrics-server] terraform_current: module.images.aws_ecr_repository.image_repos["metrics-server"]: Destruction complete after 0s -19:53:49.449 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_acl.this[0]: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo,private] -19:53:49.554 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role_policy_attachment.s3-bucket-owner[0]: Refreshing state... [id=platform-eng-eks-mcm-tempo-20240906232923578800000002] -19:53:49.698 STDOUT [eks-metrics-server] terraform_current:  -19:53:49.698 STDOUT [eks-metrics-server] terraform_current: Destroy complete! Resources: 4 destroyed. -19:53:49.698 STDOUT [eks-metrics-server] terraform_current:  -19:53:49.746 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_eks_access_entry.node[0]: Destroying... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/Karpenter-platform-eng-eks-mcm-20240906232348257500000002] -19:53:49.748 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEC2ContainerRegistryReadOnly"]: Destroying... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-20240906232349117600000009] -19:53:49.748 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.controller[0]: Destroying... [id=KarpenterController-20240906232348260000000005-2024090623241427070000000d] -19:53:49.748 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKS_CNI_Policy"]: Destroying... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-20240906232349108100000008] -19:53:49.748 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Destroying... [id=subnet-02c2250b9ec2dd6a2,karpenter.sh/discovery] -19:53:49.748 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Destroying... [id=subnet-07a6339be3670fb41,karpenter.sh/discovery] -19:53:49.748 STDOUT [eks-karpenter] terraform_current: aws_iam_instance_profile.karpenter_node_instance_profile: Destroying... [id=platform-eng-eks-mcm-karpenter-instance-profile] -19:53:49.759 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["health_event"]: Destroying... [id=KarpenterHealthEvent-20240906232348266800000006-KarpenterInterruptionQueueTarget] -19:53:49.759 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_eks_pod_identity_association.karpenter[0]: Destroying... [id=a-eswqyfnqnzveqqrv9] -19:53:49.909 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["health_event"]: Destruction complete after 0s -19:53:49.912 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node_additional["AmazonSSMManagedInstanceCore"]: Destroying... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-2024090623234923830000000b] -19:53:49.923 STDOUT [eks-karpenter] terraform_current: kubectl_manifest.karpenter_node_pool: Destruction complete after 1s -19:53:49.926 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["instance_rebalance"]: Destroying... [id=KarpenterInstanceRebalance-20240906232348258700000004-KarpenterInterruptionQueueTarget] -19:53:49.970 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["instance_rebalance"]: Destruction complete after 0s -19:53:49.972 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["instance_state_change"]: Destroying... [id=KarpenterInstanceStateChange-20240906232348256000000001-KarpenterInterruptionQueueTarget] -19:53:49.988 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Destruction complete after 0s -19:53:49.990 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Destroying... [id=subnet-078b228071c609a50,karpenter.sh/discovery] -19:53:49.994 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Destruction complete after 0s -19:53:49.996 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["spot_interrupt"]: Destroying... [id=KarpenterSpotInterrupt-20240906232348258200000003-KarpenterInterruptionQueueTarget] -19:53:50.014 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["instance_state_change"]: Destruction complete after 0s -19:53:50.015 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKSWorkerNodePolicy"]: Destroying... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-2024090623234923000000000a] -19:53:50.054 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["spot_interrupt"]: Destruction complete after 0s -19:53:50.056 STDOUT [eks-karpenter] terraform_current: kubectl_manifest.karpenter_ec2_node_class: Destroying... [id=/apis/karpenter.k8s.aws/v1/ec2nodeclasses/platform-eng-eks-mcm-karpenter-node-class] -19:53:50.128 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Destruction complete after 0s -19:53:50.130 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_rebalance"]: Destroying... [id=KarpenterInstanceRebalance-20240906232348258700000004] -19:53:50.141 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKS_CNI_Policy"]: Destruction complete after 0s -19:53:50.146 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["health_event"]: Destroying... [id=KarpenterHealthEvent-20240906232348266800000006] -19:53:50.146 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.controller[0]: Destruction complete after 0s -19:53:50.148 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_state_change"]: Destroying... [id=KarpenterInstanceStateChange-20240906232348256000000001] -19:53:50.154 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEC2ContainerRegistryReadOnly"]: Destruction complete after 0s -19:53:50.155 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["spot_interrupt"]: Destroying... [id=KarpenterSpotInterrupt-20240906232348258200000003] -19:53:50.163 STDOUT [eks-karpenter] terraform_current: kubectl_manifest.karpenter_ec2_node_class: Destruction complete after 0s -19:53:50.166 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_policy.controller[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/KarpenterController-2024090623241372970000000c] -19:53:50.200 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_rebalance"]: Destruction complete after 0s -19:53:50.208 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["health_event"]: Destruction complete after 0s -19:53:50.220 STDOUT [eks-karpenter] terraform_current: helm_release.karpenter: Destroying... [id=karpenter] -19:53:50.266 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_state_change"]: Destruction complete after 0s -19:53:50.270 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["spot_interrupt"]: Destruction complete after 0s -19:53:50.282 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node_additional["AmazonSSMManagedInstanceCore"]: Destruction complete after 0s -19:53:50.283 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKSWorkerNodePolicy"]: Destruction complete after 0s -19:53:50.302 STDOUT [eks-karpenter] terraform_current: aws_iam_instance_profile.karpenter_node_instance_profile: Destruction complete after 0s -19:53:50.410 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_eks_access_entry.node[0]: Destruction complete after 0s -19:53:50.411 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue_policy.this[0]: Destroying... [id=https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm] -19:53:50.474 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_policy.controller[0]: Destruction complete after 0s -19:53:50.474 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_eks_pod_identity_association.karpenter[0]: Destruction complete after 0s -19:53:50.476 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role.node[0]: Destroying... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002] -19:53:50.947 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role.node[0]: Destruction complete after 1s -19:53:53.977 STDOUT [eks-karpenter] terraform_current: helm_release.karpenter: Destruction complete after 4s -19:53:53.981 STDOUT [eks-karpenter] terraform_current: module.images.null_resource.copy_images["bitnami/kubectl#1.30.4"]: Destroying... [id=8319382030182575774] -19:53:53.981 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["karpenter/controller"]: Destroying... [id=platform-eng-eks-mcm/karpenter/controller] -19:53:53.981 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["bitnami/kubectl"]: Destroying... [id=platform-eng-eks-mcm/bitnami/kubectl] -19:53:53.986 STDOUT [eks-karpenter] terraform_current: module.images.null_resource.copy_images["bitnami/kubectl#1.30.4"]: Destruction complete after 0s -19:53:53.986 STDOUT [eks-karpenter] terraform_current: module.images.null_resource.copy_images["karpenter/controller#1.0.1"]: Destroying... [id=7033227500110577822] -19:53:53.986 STDOUT [eks-karpenter] terraform_current: module.images.null_resource.copy_images["karpenter/controller#1.0.1"]: Destruction complete after 0s -19:53:53.986 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role.controller[0]: Destroying... [id=KarpenterController-20240906232348260000000005] -19:53:54.152 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["bitnami/kubectl"]: Destruction complete after 0s -19:53:54.163 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["karpenter/controller"]: Destruction complete after 0s -19:53:54.166 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_repository.image_repos["karpenter/controller"]: Destroying... [id=platform-eng-eks-mcm/karpenter/controller] -19:53:54.166 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_repository.image_repos["bitnami/kubectl"]: Destroying... [id=platform-eng-eks-mcm/bitnami/kubectl] -19:53:54.366 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_repository.image_repos["bitnami/kubectl"]: Destruction complete after 0s -19:53:54.375 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_repository.image_repos["karpenter/controller"]: Destruction complete after 0s -19:53:54.523 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role.controller[0]: Destruction complete after 1s -19:53:55.517 STDOUT [eks-tempo] terraform_current: Terraform used the selected providers to generate the following execution -19:53:55.517 STDOUT [eks-tempo] terraform_current: plan. Resource actions are indicated with the following symbols: -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - destroy -19:53:55.517 STDOUT [eks-tempo] terraform_current: Terraform will perform the following actions: -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # helm_release.tempo will be destroyed -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - resource "helm_release" "tempo" { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - atomic = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - chart = "tempo" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - cleanup_on_fail = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - create_namespace = true -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - dependency_update = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - disable_crd_hooks = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - disable_openapi_validation = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - disable_webhooks = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - force_update = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - id = "tempo" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - lint = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - max_history = 0 -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - metadata = [ -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - app_version = "2.5.0" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - chart = "tempo" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - first_deployed = 1725665374 -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - last_deployed = 1725665374 -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - namespace = "tempo" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - revision = 1 -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - values = jsonencode( -19:53:55.517 STDOUT [eks-tempo] terraform_current:  { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - persistence = { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - storageClassName = "gp3-encrypted" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - replicas = 3 -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - serviceAccount = { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - annotations = { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - "eks.amazonaws.com/role-arn" = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-tempo" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - tempo = { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - extraEnv = [ -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "JAEGER_AGENT_PORT" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "9411" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  }, -19:53:55.517 STDOUT [eks-tempo] terraform_current:  ] -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - metricsGenerator = { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - enabled = true -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - remoteWriteUrl = "http://prometheus-server.prometheus:9090/api/v1/write" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - persistence = { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - accessModes = [ -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - "ReadWriteOnce", -19:53:55.517 STDOUT [eks-tempo] terraform_current:  ] -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - enabled = true -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - size = "10Gi" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - receivers = { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - zipkin = null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - reportingEnabled = false -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/tempo" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - serviceAccount = { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - create = true -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - storage = { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - trace = { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - backend = "s3" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - s3 = { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - endpoint = "s3.us-gov-east-1.amazonaws.com" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - insecure = false -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - tag = "2.5.0" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  ) -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - version = "1.10.1" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.517 STDOUT [eks-tempo] terraform_current:  }, -19:53:55.517 STDOUT [eks-tempo] terraform_current:  ] -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - namespace = "tempo" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - pass_credentials = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - recreate_pods = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - render_subchart_notes = true -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - replace = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - repository = "https://grafana.github.io/helm-charts" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - reset_values = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - reuse_values = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - skip_crds = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - status = "deployed" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - timeout = 60 -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - values = [ -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - <<-EOT -19:53:55.517 STDOUT [eks-tempo] terraform_current:  tempo: -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # storage: -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # trace: -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # backend: s3 -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # s3: -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # insecure: false -19:53:55.517 STDOUT [eks-tempo] terraform_current:  extraEnv: -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name: JAEGER_AGENT_PORT -19:53:55.517 STDOUT [eks-tempo] terraform_current:  value: "9411" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  receivers: -19:53:55.517 STDOUT [eks-tempo] terraform_current:  zipkin: -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # metricsGenerator: -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # enabled: true -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # reportingEnabled: false -19:53:55.517 STDOUT [eks-tempo] terraform_current:  -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # serviceAccount: -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # create: true -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # name: "tempo" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # persistence: -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # enabled: true -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # accessModes: -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # - ReadWriteOnce -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # size: 10Gi -19:53:55.517 STDOUT [eks-tempo] terraform_current:  -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # set { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # name = "tempo.receivers.zipkin[]" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # value = "" -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  EOT, -19:53:55.517 STDOUT [eks-tempo] terraform_current:  ] -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - verify = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - version = "1.10.1" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - wait = true -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - wait_for_jobs = false -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "persistence.storageClassName" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "gp3-encrypted" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "replicas" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "3" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "serviceAccount.annotations.eks\\.amazonaws\\.com/role-arn" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-tempo" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo.metricsGenerator.enabled" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "true" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo.metricsGenerator.remoteWriteUrl" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "http://prometheus-server.prometheus:9090/api/v1/write" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo.persistence.accessModes[0]" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "ReadWriteOnce" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo.persistence.enabled" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "true" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo.persistence.size" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "10Gi" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo.reportingEnabled" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "false" -> null -19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.517 STDOUT [eks-tempo] terraform_current:  } -19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.repository" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.serviceAccount.create" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "true" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.serviceAccount.name" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.storage.trace.backend" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "s3" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.storage.trace.s3.bucket" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.storage.trace.s3.endpoint" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "s3.us-gov-east-1.amazonaws.com" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.storage.trace.s3.insecure" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "false" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - set { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.tag" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "2.5.0" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["tempo"] will be destroyed -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "platform-eng-eks-mcm/tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy = jsonencode( -19:53:55.518 STDOUT [eks-tempo] terraform_current:  { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - rules = [ -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - action = { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - type = "expire" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - description = "keep 5 images" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - rulePriority = 1 -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - selection = { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - countNumber = 5 -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - countType = "imageCountMoreThan" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tagStatus = "any" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  }, -19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  ) -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - registry_id = "224384469011" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - repository = "platform-eng-eks-mcm/tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.images.aws_ecr_repository.image_repos["tempo"] will be destroyed -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - force_delete = true -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "platform-eng-eks-mcm/tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "platform-eng-eks-mcm/tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - registry_id = "224384469011" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags = { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Environment" = "application" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/tempo" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags_all = { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Environment" = "application" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/tempo" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terraform" = "true" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terragrunt" = "true" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - encryption_configuration { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - encryption_type = "KMS" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - image_scanning_configuration { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - scan_on_push = true -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.images.null_resource.copy_images["tempo#2.5.0"] will be destroyed -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "null_resource" "copy_images" { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "154927662841800702" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - triggers = { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "region" = "us-gov-east-1" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.tempo-irsa-role.aws_iam_policy.encrypted-object-manager[0] will be destroyed -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_iam_policy" "encrypted-object-manager" { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232934209600000003" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - attachment_count = 1 -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - description = "Allow the role to read/write encrypted data using the kms keys." -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232934209600000003" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "AmazonEKS_encrypted-object-manager-20240906232934209600000003" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name_prefix = "AmazonEKS_encrypted-object-manager-" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - path = "/" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy = jsonencode( -19:53:55.518 STDOUT [eks-tempo] terraform_current:  { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Statement = [ -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Action = [ -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "kms:ReEncrypt*", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "kms:GenerateDataKey", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "kms:Encrypt", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "kms:DescribeKey", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "kms:Decrypt", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Effect = "Allow" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Resource = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/009b63d6-497f-4139-9c8c-7cae709ed71b" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  }, -19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Version = "2012-10-17" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  ) -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy_id = "ANPATIPS3JAJR3KXC62NX" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags = {} -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags_all = { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terraform" = "true" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terragrunt" = "true" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.tempo-irsa-role.aws_iam_policy.s3-bucket-owner[0] will be destroyed -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_iam_policy" "s3-bucket-owner" { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232923002900000001" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - attachment_count = 1 -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - description = "Allow the role to add/remove/change objects in the s3 bucket." -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232923002900000001" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "AmazonEKS_s3-bucket-owner-20240906232923002900000001" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name_prefix = "AmazonEKS_s3-bucket-owner-" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - path = "/" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy = jsonencode( -19:53:55.518 STDOUT [eks-tempo] terraform_current:  { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Statement = [ -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Action = [ -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "s3:PutObject*", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "s3:PutBucketVersioning", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "s3:List*", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "s3:GetObject*", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "s3:GetBucket*", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "s3:DeleteObject*", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "s3:AbortMultipartUpload", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Effect = "Allow" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Resource = [ -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-tempo/*", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-tempo", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] -19:53:55.518 STDOUT [eks-tempo] terraform_current:  }, -19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Version = "2012-10-17" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  ) -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy_id = "ANPATIPS3JAJ7DZAG4ED6" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags = {} -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags_all = { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terraform" = "true" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terragrunt" = "true" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.tempo-irsa-role.aws_iam_role.this[0] will be destroyed -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_iam_role" "this" { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - assume_role_policy = jsonencode( -19:53:55.518 STDOUT [eks-tempo] terraform_current:  { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Statement = [ -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Action = "sts:AssumeRoleWithWebIdentity" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Condition = { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - StringEquals = { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:aud" = "sts.amazonaws.com" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:sub" = "system:serviceaccount:tempo:tempo" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Effect = "Allow" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Principal = { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Federated = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  }, -19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Version = "2012-10-17" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  ) -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - create_date = "2024-09-06T23:29:21Z" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - force_detach_policies = true -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "platform-eng-eks-mcm-tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - managed_policy_arns = [ -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232934209600000003", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232923002900000001", -19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - max_session_duration = 3600 -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "platform-eng-eks-mcm-tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - path = "/" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags = { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "tfmod-tempo" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "0.0.1" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags_all = { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terraform" = "true" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terragrunt" = "true" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "tfmod-tempo" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "0.0.1" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - unique_id = "AROATIPS3JAJYIU6TPZIG" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (3 unchanged attributes hidden) -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.tempo-irsa-role.aws_iam_role_policy_attachment.encrypted-object-manager[0] will be destroyed -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_iam_role_policy_attachment" "encrypted-object-manager" { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "platform-eng-eks-mcm-tempo-20240906232934771300000004" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232934209600000003" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - role = "platform-eng-eks-mcm-tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.tempo-irsa-role.aws_iam_role_policy_attachment.s3-bucket-owner[0] will be destroyed -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_iam_role_policy_attachment" "s3-bucket-owner" { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "platform-eng-eks-mcm-tempo-20240906232923578800000002" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232923002900000001" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - role = "platform-eng-eks-mcm-tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_kms_alias.key[0] will be destroyed -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_kms_alias" "key" { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:alias/k-kms-platform-eng-eks-mcm-tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "alias/k-kms-platform-eng-eks-mcm-tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "alias/k-kms-platform-eng-eks-mcm-tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - target_key_arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/009b63d6-497f-4139-9c8c-7cae709ed71b" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - target_key_id = "009b63d6-497f-4139-9c8c-7cae709ed71b" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_kms_key.key[0] will be destroyed -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_kms_key" "key" { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/009b63d6-497f-4139-9c8c-7cae709ed71b" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - bypass_policy_lockout_safety_check = false -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - customer_master_key_spec = "SYMMETRIC_DEFAULT" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - description = "KMS CMK for S3 bucket platform-eng-eks-mcm-tempo" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - enable_key_rotation = true -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "009b63d6-497f-4139-9c8c-7cae709ed71b" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - is_enabled = true -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - key_id = "009b63d6-497f-4139-9c8c-7cae709ed71b" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - key_usage = "ENCRYPT_DECRYPT" -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - multi_region = false -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy = jsonencode( -19:53:55.518 STDOUT [eks-tempo] terraform_current:  { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Statement = [ -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Action = "kms:*" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Effect = "Allow" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Principal = { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:root" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Resource = "*" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Sid = "BuiltinKMSAdminRoles" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  }, -19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Version = "2012-10-17" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -19:53:55.518 STDOUT [eks-tempo] terraform_current:  ) -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - rotation_period_in_days = 365 -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags = { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Name" = "k-kms-platform-eng-eks-mcm-tempo" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "tfmod-tempo" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "0.0.1" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags_all = { -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Name" = "k-kms-platform-eng-eks-mcm-tempo" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terraform" = "true" -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "Terragrunt" = "true" -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "tfmod-tempo" -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "0.0.1" -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:53:55.519 STDOUT [eks-tempo] terraform_current:  } -> null -19:53:55.519 STDOUT [eks-tempo] terraform_current:  # (2 unchanged attributes hidden) -19:53:55.519 STDOUT [eks-tempo] terraform_current:  } -19:53:55.519 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket.this will be destroyed -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket" "this" { -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - arn = "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - bucket_domain_name = "v-s3-platform-eng-eks-mcm-tempo.s3.amazonaws.com" -> null -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - bucket_regional_domain_name = "v-s3-platform-eng-eks-mcm-tempo.s3.us-gov-east-1.amazonaws.com" -> null -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - force_destroy = false -> null -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - hosted_zone_id = "Z2NIFVYYW2VKV1" -> null -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - object_lock_enabled = false -> null -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - policy = jsonencode( -19:53:55.519 STDOUT [eks-tempo] terraform_current:  { -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - Statement = [ -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - { -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - Action = "s3:*" -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - Condition = { -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - Bool = { -19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "aws:SecureTransport" = "false" -19:53:55.519 STDOUT [eks-tempo] terraform_current:  } -19:53:55.519 STDOUT [eks-tempo] terraform_current:  } -19:53:55.519 STDOUT [eks-tempo] terraform_current:  -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Effect = "Deny" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Principal = { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - AWS = "*" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Resource = [ -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-tempo/*", -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-tempo", -19:53:55.521 STDOUT [eks-tempo] terraform_current:  ] -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Sid = "enforceSSL" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  }, -19:53:55.521 STDOUT [eks-tempo] terraform_current:  ] -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Version = "2012-10-17" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  ) -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - region = "us-gov-east-1" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - request_payer = "BucketOwner" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - tags = { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Name" = "v-s3-platform-eng-eks-mcm-tempo" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "tfmod-tempo" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "0.0.1" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - tags_all = { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Name" = "v-s3-platform-eng-eks-mcm-tempo" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Terraform" = "true" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Terragrunt" = "true" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "tfmod-tempo" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "0.0.1" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (2 unchanged attributes hidden) -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - grant { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "2556558a9cdb2c897c1b2e56fcedd67ffd0719e0005dccec8d3f9412968e30ce" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - permissions = [ -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "FULL_CONTROL", -19:53:55.521 STDOUT [eks-tempo] terraform_current:  ] -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - type = "CanonicalUser" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - logging { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - target_bucket = "inf-logs-224384469011-us-gov-east-1" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - target_prefix = "s3/v-s3-platform-eng-eks-mcm-tempo/" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - server_side_encryption_configuration { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - rule { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket_key_enabled = true -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - apply_server_side_encryption_by_default { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - kms_master_key_id = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/009b63d6-497f-4139-9c8c-7cae709ed71b" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - sse_algorithm = "aws:kms" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - versioning { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - enabled = false -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - mfa_delete = false -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket_acl.this[0] will be destroyed -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket_acl" "this" { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - acl = "private" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo,private" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - access_control_policy { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - grant { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - permission = "FULL_CONTROL" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - grantee { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "2556558a9cdb2c897c1b2e56fcedd67ffd0719e0005dccec8d3f9412968e30ce" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - type = "CanonicalUser" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (3 unchanged attributes hidden) -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - owner { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "2556558a9cdb2c897c1b2e56fcedd67ffd0719e0005dccec8d3f9412968e30ce" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket_logging.this will be destroyed -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket_logging" "this" { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - target_bucket = "inf-logs-224384469011-us-gov-east-1" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - target_prefix = "s3/v-s3-platform-eng-eks-mcm-tempo/" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket_ownership_controls.this will be destroyed -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket_ownership_controls" "this" { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - rule { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - object_ownership = "BucketOwnerPreferred" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket_policy.policy[0] will be destroyed -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket_policy" "policy" { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - policy = jsonencode( -19:53:55.521 STDOUT [eks-tempo] terraform_current:  { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Statement = [ -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Action = "s3:*" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Condition = { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Bool = { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "aws:SecureTransport" = "false" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Effect = "Deny" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Principal = { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - AWS = "*" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Resource = [ -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-tempo/*", -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-tempo", -19:53:55.521 STDOUT [eks-tempo] terraform_current:  ] -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Sid = "enforceSSL" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  }, -19:53:55.521 STDOUT [eks-tempo] terraform_current:  ] -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Version = "2012-10-17" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  ) -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket_public_access_block.this will be destroyed -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket_public_access_block" "this" { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - block_public_acls = true -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - block_public_policy = true -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - ignore_public_acls = true -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - restrict_public_buckets = true -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket_server_side_encryption_configuration.this will be destroyed -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket_server_side_encryption_configuration" "this" { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - rule { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket_key_enabled = true -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - apply_server_side_encryption_by_default { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - kms_master_key_id = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/009b63d6-497f-4139-9c8c-7cae709ed71b" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - sse_algorithm = "aws:kms" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket_versioning.this will be destroyed -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket_versioning" "this" { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - versioning_configuration { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - status = "Suspended" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.time_sleep.acl_delay will be destroyed -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "time_sleep" "acl_delay" { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - create_duration = "30s" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - destroy_duration = "30s" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "2024-09-06T23:31:53Z" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - triggers = { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "bucket" = "v-s3-platform-eng-eks-mcm-tempo" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "public_access_block" = "v-s3-platform-eng-eks-mcm-tempo" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.time_sleep.policy_delay will be destroyed -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "time_sleep" "policy_delay" { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - create_duration = "120s" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - destroy_duration = "30s" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "2024-09-06T23:31:23Z" -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - triggers = { -19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "bucket" = "v-s3-platform-eng-eks-mcm-tempo" -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -> null -19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -19:53:55.521 STDOUT [eks-tempo] terraform_current: Plan: 0 to add, 0 to change, 21 to destroy. -19:53:55.521 STDOUT [eks-tempo] terraform_current:  -19:53:56.025 STDOUT [eks-tempo] terraform_current: module.images.null_resource.copy_images["tempo#2.5.0"]: Destroying... [id=154927662841800702] -19:53:56.027 STDOUT [eks-tempo] terraform_current: module.images.null_resource.copy_images["tempo#2.5.0"]: Destruction complete after 0s -19:53:56.058 STDOUT [eks-tempo] terraform_current: helm_release.tempo: Destroying... [id=tempo] -19:53:56.505 STDOUT [eks-loki] terraform_current: Terraform used the selected providers to generate the following execution -19:53:56.505 STDOUT [eks-loki] terraform_current: plan. Resource actions are indicated with the following symbols: -19:53:56.505 STDOUT [eks-loki] terraform_current:  - destroy -19:53:56.505 STDOUT [eks-loki] terraform_current: Terraform will perform the following actions: -19:53:56.522 STDOUT [eks-loki] terraform_current:  # helm_release.loki will be destroyed -19:53:56.522 STDOUT [eks-loki] terraform_current:  - resource "helm_release" "loki" { -19:53:56.522 STDOUT [eks-loki] terraform_current:  - atomic = false -> null -19:53:56.522 STDOUT [eks-loki] terraform_current:  - chart = "loki" -> null -19:53:56.522 STDOUT [eks-loki] terraform_current:  - cleanup_on_fail = false -> null -19:53:56.522 STDOUT [eks-loki] terraform_current:  - create_namespace = false -> null -19:53:56.522 STDOUT [eks-loki] terraform_current:  - dependency_update = false -> null -19:53:56.522 STDOUT [eks-loki] terraform_current:  - disable_crd_hooks = false -> null -19:53:56.522 STDOUT [eks-loki] terraform_current:  - disable_openapi_validation = false -> null -19:53:56.522 STDOUT [eks-loki] terraform_current:  - disable_webhooks = false -> null -19:53:56.522 STDOUT [eks-loki] terraform_current:  - force_update = false -> null -19:53:56.522 STDOUT [eks-loki] terraform_current:  - id = "loki" -> null -19:53:56.522 STDOUT [eks-loki] terraform_current:  - lint = false -> null -19:53:56.522 STDOUT [eks-loki] terraform_current:  - max_history = 0 -> null -19:53:56.522 STDOUT [eks-loki] terraform_current:  - metadata = [ -19:53:56.522 STDOUT [eks-loki] terraform_current:  - { -19:53:56.522 STDOUT [eks-loki] terraform_current:  - app_version = "3.1.1" -19:53:56.522 STDOUT [eks-loki] terraform_current:  - chart = "loki" -19:53:56.522 STDOUT [eks-loki] terraform_current:  - first_deployed = 1725665251 -19:53:56.522 STDOUT [eks-loki] terraform_current:  - last_deployed = 1725665251 -19:53:56.522 STDOUT [eks-loki] terraform_current:  - name = "loki" -19:53:56.522 STDOUT [eks-loki] terraform_current:  - namespace = "loki" -19:53:56.522 STDOUT [eks-loki] terraform_current:  - notes = <<-EOT -19:53:56.522 STDOUT [eks-loki] terraform_current:  *********************************************************************** -19:53:56.522 STDOUT [eks-loki] terraform_current:  Welcome to Grafana Loki -19:53:56.522 STDOUT [eks-loki] terraform_current:  Chart version: 6.10.2 -19:53:56.522 STDOUT [eks-loki] terraform_current:  Chart Name: loki -19:53:56.522 STDOUT [eks-loki] terraform_current:  Loki version: 3.1.1 -19:53:56.522 STDOUT [eks-loki] terraform_current:  *********************************************************************** -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  ** Please be patient while the chart is being deployed ** -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  Tip: -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  Watch the deployment status using the command: kubectl get pods -w --namespace loki -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  If pods are taking too long to schedule make sure pod affinity can be fulfilled in the current cluster. -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  *********************************************************************** -19:53:56.522 STDOUT [eks-loki] terraform_current:  Installed components: -19:53:56.522 STDOUT [eks-loki] terraform_current:  *********************************************************************** -19:53:56.522 STDOUT [eks-loki] terraform_current:  * gateway -19:53:56.522 STDOUT [eks-loki] terraform_current:  * read -19:53:56.522 STDOUT [eks-loki] terraform_current:  * write -19:53:56.522 STDOUT [eks-loki] terraform_current:  * backend -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  *********************************************************************** -19:53:56.522 STDOUT [eks-loki] terraform_current:  Sending logs to Loki -19:53:56.522 STDOUT [eks-loki] terraform_current:  *********************************************************************** -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  Loki has been configured with a gateway (nginx) to support reads and writes from a single component. -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  You can send logs from inside the cluster using the cluster DNS: -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  http://loki-gateway.loki.svc.cluster.local/loki/api/v1/push -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  You can test to send data from outside the cluster by port-forwarding the gateway to your local machine: -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  kubectl port-forward --namespace loki svc/loki-gateway 3100:80 & -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  And then using http://127.0.0.1:3100/loki/api/v1/push URL as shown below: -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  ``` -19:53:56.522 STDOUT [eks-loki] terraform_current:  curl -H "Content-Type: application/json" -XPOST -s "http://127.0.0.1:3100/loki/api/v1/push" \ -19:53:56.522 STDOUT [eks-loki] terraform_current:  --data-raw "{\"streams\": [{\"stream\": {\"job\": \"test\"}, \"values\": [[\"$(date +%s)000000000\", \"fizzbuzz\"]]}]}" \ -19:53:56.522 STDOUT [eks-loki] terraform_current:  -H X-Scope-OrgId:foo -19:53:56.522 STDOUT [eks-loki] terraform_current:  ``` -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  Then verify that Loki did received the data using the following command: -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  ``` -19:53:56.522 STDOUT [eks-loki] terraform_current:  curl "http://127.0.0.1:3100/loki/api/v1/query_range" --data-urlencode 'query={job="test"}' -H X-Scope-OrgId:foo | jq .data.result -19:53:56.522 STDOUT [eks-loki] terraform_current:  ``` -19:53:56.522 STDOUT [eks-loki] terraform_current:  -19:53:56.522 STDOUT [eks-loki] terraform_current:  *********************************************************************** -19:53:56.522 STDOUT [eks-loki] terraform_current:  Connecting Grafana to Loki -19:53:56.523 STDOUT [eks-loki] terraform_current:  *********************************************************************** -19:53:56.523 STDOUT [eks-loki] terraform_current:  -19:53:56.523 STDOUT [eks-loki] terraform_current:  If Grafana operates within the cluster, you'll set up a new Loki datasource by utilizing the following URL: -19:53:56.523 STDOUT [eks-loki] terraform_current:  -19:53:56.523 STDOUT [eks-loki] terraform_current:  http://loki-gateway.loki.svc.cluster.local/ -19:53:56.523 STDOUT [eks-loki] terraform_current:  -19:53:56.523 STDOUT [eks-loki] terraform_current:  *********************************************************************** -19:53:56.523 STDOUT [eks-loki] terraform_current:  Multi-tenancy -19:53:56.523 STDOUT [eks-loki] terraform_current:  *********************************************************************** -19:53:56.523 STDOUT [eks-loki] terraform_current:  -19:53:56.523 STDOUT [eks-loki] terraform_current:  Loki is configured with auth enabled (multi-tenancy) and expects tenant headers (`X-Scope-OrgID`) to be set for all API calls. -19:53:56.523 STDOUT [eks-loki] terraform_current:  -19:53:56.523 STDOUT [eks-loki] terraform_current:  You must configure Grafana's Loki datasource using the `HTTP Headers` section with the `X-Scope-OrgID` to target a specific tenant. -19:53:56.523 STDOUT [eks-loki] terraform_current:  For each tenant, you can create a different datasource. -19:53:56.523 STDOUT [eks-loki] terraform_current:  -19:53:56.523 STDOUT [eks-loki] terraform_current:  The agent of your choice must also be configured to propagate this header. -19:53:56.523 STDOUT [eks-loki] terraform_current:  For example, when using Promtail you can use the `tenant` stage. https://grafana.com/docs/loki/latest/send-data/promtail/stages/tenant/ -19:53:56.523 STDOUT [eks-loki] terraform_current:  -19:53:56.523 STDOUT [eks-loki] terraform_current:  When not provided with the `X-Scope-OrgID` while auth is enabled, Loki will reject reads and writes with a 404 status code `no org id`. -19:53:56.523 STDOUT [eks-loki] terraform_current:  -19:53:56.523 STDOUT [eks-loki] terraform_current:  You can also use a reverse proxy, to automatically add the `X-Scope-OrgID` header as suggested by https://grafana.com/docs/loki/latest/operations/authentication/ -19:53:56.523 STDOUT [eks-loki] terraform_current:  -19:53:56.523 STDOUT [eks-loki] terraform_current:  For more information, read our documentation about multi-tenancy: https://grafana.com/docs/loki/latest/operations/multi-tenancy/ -19:53:56.523 STDOUT [eks-loki] terraform_current:  -19:53:56.523 STDOUT [eks-loki] terraform_current:  > When using curl you can pass `X-Scope-OrgId` header using `-H X-Scope-OrgId:foo` option, where foo can be replaced with the tenant of your choice. -19:53:56.523 STDOUT [eks-loki] terraform_current:  EOT -19:53:56.523 STDOUT [eks-loki] terraform_current:  - revision = 1 -19:53:56.523 STDOUT [eks-loki] terraform_current:  - values = jsonencode( -19:53:56.523 STDOUT [eks-loki] terraform_current:  { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - backend = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - autoscaling = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = true -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - persistence = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - storageClass = "gp3-encrypted" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - compactor = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - compaction_interval = "10m" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - retention_delete_delay = "2h" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - retention_delete_worker_count = 150 -19:53:56.523 STDOUT [eks-loki] terraform_current:  - retention_enabled = true -19:53:56.523 STDOUT [eks-loki] terraform_current:  - shared_store = "s3" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - working_directory = "/loki/compactor" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - distributor = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - autoscaling = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = true -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - gateway = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/nginx-unprivileged" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - tag = "1.25.2-alpine" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - global = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - registry = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - ingester = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - autoscaling = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = true -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - loki = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - analytics = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - reporting_enabled = false -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - auth_enabled = true -19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/loki" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - tag = "3.1.1" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - limits_config = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - ingestion_rate_strategy = "local" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - max_global_streams_per_user = 5000 -19:53:56.523 STDOUT [eks-loki] terraform_current:  - max_query_parallelism = 32 -19:53:56.523 STDOUT [eks-loki] terraform_current:  - max_streams_per_user = 10000 -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - provisioner = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - tag = "v1.7.0" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - schemaConfig = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - configs = [ -19:53:56.523 STDOUT [eks-loki] terraform_current:  - { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - from = "2024-04-01" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - index = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - period = "24h" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - prefix = "loki_sb_index_" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - object_store = "s3" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - schema = "v13" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - store = "tsdb" -19:53:56.523 STDOUT [eks-loki] terraform_current:  }, -19:53:56.523 STDOUT [eks-loki] terraform_current:  ] -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - storage = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - bucketNames = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - admin = "platform-eng-eks-mcm-loki" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - chunks = "platform-eng-eks-mcm-loki" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - ruler = "platform-eng-eks-mcm-loki" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - s3 = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - region = "us-gov-east-1" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - s3 = "s3://us-gov-east-1" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - type = "s3" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - storage_config = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - aws = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - s3 = "s3://us-gov-east-1/platform-eng-eks-mcm-loki" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - lokiCanary = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/loki-canary" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - tag = "3.0.0" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - memberlist = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - service = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - publishNotReadyAddresses = true -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - memcached = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/memcached" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - tag = "1.6.23-alpine" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - memcachedExporter = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prom/memcached-exporter" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - tag = "v0.14.4" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - monitoring = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - dashboards = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = false -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - lokiCanary = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = false -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - rules = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = false -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - selfMonitoring = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = false -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - serviceMonitor = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = false -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - querier = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - autoscaling = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = true -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - queryFrontend = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - autoscaling = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = true -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - read = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - autoscaling = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = true -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - serviceAccount = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - annotations = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - "eks.amazonaws.com/role-arn" = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-loki" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - sidecar = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - tag = "1.27.4" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - test = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = false -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - write = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - autoscaling = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = true -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - extraVolumes = [ -19:53:56.523 STDOUT [eks-loki] terraform_current:  - { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki" -19:53:56.523 STDOUT [eks-loki] terraform_current:  }, -19:53:56.523 STDOUT [eks-loki] terraform_current:  ] -19:53:56.523 STDOUT [eks-loki] terraform_current:  - extraVolumesMounts = [ -19:53:56.523 STDOUT [eks-loki] terraform_current:  - { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - mountPath = "/loki" -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "data" -19:53:56.523 STDOUT [eks-loki] terraform_current:  }, -19:53:56.523 STDOUT [eks-loki] terraform_current:  ] -19:53:56.523 STDOUT [eks-loki] terraform_current:  - persistence = { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - storageClass = "gp3-encrypted" -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  ) -19:53:56.523 STDOUT [eks-loki] terraform_current:  - version = "6.10.2" -19:53:56.523 STDOUT [eks-loki] terraform_current:  }, -19:53:56.523 STDOUT [eks-loki] terraform_current:  ] -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - namespace = "loki" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - pass_credentials = false -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - recreate_pods = false -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - render_subchart_notes = true -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - replace = false -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "https://grafana.github.io/helm-charts" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - reset_values = false -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - reuse_values = false -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - skip_crds = false -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - status = "deployed" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - timeout = 900 -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - verify = false -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - version = "6.10.2" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - wait = true -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - wait_for_jobs = false -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "backend.autoscaling.enabled" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "true" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "backend.persistence.storageClass" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "gp3-encrypted" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "compactor.compaction_interval" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "10m" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "compactor.retention_delete_delay" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "2h" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "compactor.retention_delete_worker_count" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "150" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "compactor.retention_enabled" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "true" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "compactor.shared_store" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "s3" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "compactor.working_directory" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "/loki/compactor" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "distributor.autoscaling.enabled" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "true" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "gateway.image.repository" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "platform-eng-eks-mcm/grafana/nginx-unprivileged" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "gateway.image.tag" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "1.25.2-alpine" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "global.image.registry" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "ingester.autoscaling.enabled" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "true" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.analytics.reporting_enabled" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "false" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.auth_enabled" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "true" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.image.repository" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "platform-eng-eks-mcm/grafana/loki" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.image.tag" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "3.1.1" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.limits_config.ingestion_rate_strategy" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "local" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.limits_config.max_global_streams_per_user" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "5000" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.limits_config.max_query_parallelism" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "32" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.limits_config.max_streams_per_user" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "10000" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.provisioner.image.repository" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.provisioner.image.tag" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "v1.7.0" -> null -19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.523 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.schemaConfig.configs[0].from" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "2024-04-01" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.schemaConfig.configs[0].index.period" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "24h" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.schemaConfig.configs[0].index.prefix" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "loki_sb_index_" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.schemaConfig.configs[0].object_store" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "s3" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.schemaConfig.configs[0].schema" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "v13" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.schemaConfig.configs[0].store" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "tsdb" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.storage.bucketNames.admin" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "platform-eng-eks-mcm-loki" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.storage.bucketNames.chunks" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "platform-eng-eks-mcm-loki" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.storage.bucketNames.ruler" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "platform-eng-eks-mcm-loki" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.storage.s3.region" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "us-gov-east-1" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.storage.s3.s3" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "s3://us-gov-east-1" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.storage.type" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "s3" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.storage_config.aws.s3" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "s3://us-gov-east-1/platform-eng-eks-mcm-loki" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "lokiCanary.image.repository" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "platform-eng-eks-mcm/grafana/loki-canary" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "lokiCanary.image.tag" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "3.0.0" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "memberlist.service.publishNotReadyAddresses" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "true" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "memcached.image.repository" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/memcached" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "memcached.image.tag" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "1.6.23-alpine" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "memcachedExporter.image.repository" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prom/memcached-exporter" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "memcachedExporter.image.tag" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "v0.14.4" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "monitoring.dashboards.enabled" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "false" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "monitoring.lokiCanary.enabled" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "false" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "monitoring.rules.enabled" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "false" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "monitoring.selfMonitoring.enabled" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "false" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "monitoring.serviceMonitor.enabled" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "false" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "querier.autoscaling.enabled" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "true" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "queryFrontend.autoscaling.enabled" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "true" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "read.autoscaling.enabled" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "true" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "serviceAccount.annotations.eks\\.amazonaws\\.com/role-arn" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-loki" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "sidecar.image.repository" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "sidecar.image.tag" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "1.27.4" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "test.enabled" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "false" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "write.autoscaling.enabled" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "true" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "write.extraVolumesMounts[0].mountPath" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "/loki" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.524 STDOUT [eks-loki] terraform_current:  } -19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "write.extraVolumesMounts[0].name" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "data" -> null -19:53:56.524 STDOUT [eks-loki] terraform_current:  [90 -19:53:56.565 STDOUT [eks-loki] terraform_current: m# (1 unchanged attribute hidden) -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - name = "write.extraVolumes[0].name" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - value = "loki" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  - set { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - name = "write.persistence.storageClass" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - value = "gp3-encrypted" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  # kubernetes_namespace.ns[0] will be destroyed -19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "kubernetes_namespace" "ns" { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "loki" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - wait_for_default_service_account = false -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - metadata { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - annotations = {} -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - generation = 0 -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - labels = { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - "istio-injection" = "enabled" -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - name = "loki" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource_version = "4559" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - uid = "30ded0be-5ee5-4531-9366-7c7f39b3b3de" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["grafana/enterprise-logs-provisioner"] will be destroyed -19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( -19:53:56.565 STDOUT [eks-loki] terraform_current:  { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - rules = [ -19:53:56.565 STDOUT [eks-loki] terraform_current:  - { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - action = { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - type = "expire" -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  - description = "keep 5 images" -19:53:56.565 STDOUT [eks-loki] terraform_current:  - rulePriority = 1 -19:53:56.565 STDOUT [eks-loki] terraform_current:  - selection = { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - countNumber = 5 -19:53:56.565 STDOUT [eks-loki] terraform_current:  - countType = "imageCountMoreThan" -19:53:56.565 STDOUT [eks-loki] terraform_current:  - tagStatus = "any" -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  }, -19:53:56.565 STDOUT [eks-loki] terraform_current:  ] -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  ) -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki"] will be destroyed -19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/loki" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( -19:53:56.565 STDOUT [eks-loki] terraform_current:  { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - rules = [ -19:53:56.565 STDOUT [eks-loki] terraform_current:  - { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - action = { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - type = "expire" -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  - description = "keep 5 images" -19:53:56.565 STDOUT [eks-loki] terraform_current:  - rulePriority = 1 -19:53:56.565 STDOUT [eks-loki] terraform_current:  - selection = { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - countNumber = 5 -19:53:56.565 STDOUT [eks-loki] terraform_current:  - countType = "imageCountMoreThan" -19:53:56.565 STDOUT [eks-loki] terraform_current:  - tagStatus = "any" -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  }, -19:53:56.565 STDOUT [eks-loki] terraform_current:  ] -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  ) -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/loki" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki-canary"] will be destroyed -19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/loki-canary" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( -19:53:56.565 STDOUT [eks-loki] terraform_current:  { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - rules = [ -19:53:56.565 STDOUT [eks-loki] terraform_current:  - { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - action = { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - type = "expire" -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  - description = "keep 5 images" -19:53:56.565 STDOUT [eks-loki] terraform_current:  - rulePriority = 1 -19:53:56.565 STDOUT [eks-loki] terraform_current:  - selection = { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - countNumber = 5 -19:53:56.565 STDOUT [eks-loki] terraform_current:  - countType = "imageCountMoreThan" -19:53:56.565 STDOUT [eks-loki] terraform_current:  - tagStatus = "any" -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  }, -19:53:56.565 STDOUT [eks-loki] terraform_current:  ] -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  ) -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/loki-canary" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["grafana/nginx-unprivileged"] will be destroyed -19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/nginx-unprivileged" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( -19:53:56.565 STDOUT [eks-loki] terraform_current:  { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - rules = [ -19:53:56.565 STDOUT [eks-loki] terraform_current:  - { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - action = { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - type = "expire" -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  - description = "keep 5 images" -19:53:56.565 STDOUT [eks-loki] terraform_current:  - rulePriority = 1 -19:53:56.565 STDOUT [eks-loki] terraform_current:  - selection = { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - countNumber = 5 -19:53:56.565 STDOUT [eks-loki] terraform_current:  - countType = "imageCountMoreThan" -19:53:56.565 STDOUT [eks-loki] terraform_current:  - tagStatus = "any" -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  }, -19:53:56.565 STDOUT [eks-loki] terraform_current:  ] -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  ) -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/nginx-unprivileged" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["kiwigrid/k8s-sidecar"] will be destroyed -19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( -19:53:56.565 STDOUT [eks-loki] terraform_current:  { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - rules = [ -19:53:56.565 STDOUT [eks-loki] terraform_current:  - { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - action = { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - type = "expire" -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  - description = "keep 5 images" -19:53:56.565 STDOUT [eks-loki] terraform_current:  - rulePriority = 1 -19:53:56.565 STDOUT [eks-loki] terraform_current:  - selection = { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - countNumber = 5 -19:53:56.565 STDOUT [eks-loki] terraform_current:  - countType = "imageCountMoreThan" -19:53:56.565 STDOUT [eks-loki] terraform_current:  - tagStatus = "any" -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  }, -19:53:56.565 STDOUT [eks-loki] terraform_current:  ] -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  ) -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["memcached"] will be destroyed -19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/memcached" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( -19:53:56.565 STDOUT [eks-loki] terraform_current:  { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - rules = [ -19:53:56.565 STDOUT [eks-loki] terraform_current:  - { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - action = { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - type = "expire" -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  - description = "keep 5 images" -19:53:56.565 STDOUT [eks-loki] terraform_current:  - rulePriority = 1 -19:53:56.565 STDOUT [eks-loki] terraform_current:  - selection = { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - countNumber = 5 -19:53:56.565 STDOUT [eks-loki] terraform_current:  - countType = "imageCountMoreThan" -19:53:56.565 STDOUT [eks-loki] terraform_current:  - tagStatus = "any" -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  }, -19:53:56.565 STDOUT [eks-loki] terraform_current:  ] -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  ) -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/memcached" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["prom/memcached-exporter"] will be destroyed -19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/prom/memcached-exporter" -> null -19:53:56.565 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( -19:53:56.565 STDOUT [eks-loki] terraform_current:  { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - rules = [ -19:53:56.565 STDOUT [eks-loki] terraform_current:  - { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - action = { -19:53:56.565 STDOUT [eks-loki] terraform_current:  - type = "expire" -19:53:56.565 STDOUT [eks-loki] terraform_current:  } -19:53:56.565 STDOUT [eks-loki] terraform_current:  - description = "keep 5 images" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - rulePriority = 1 -19:53:56.566 STDOUT [eks-loki] terraform_current:  - selection = { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - countNumber = 5 -19:53:56.566 STDOUT [eks-loki] terraform_current:  - countType = "imageCountMoreThan" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - tagStatus = "any" -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  }, -19:53:56.566 STDOUT [eks-loki] terraform_current:  ] -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  ) -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/prom/memcached-exporter" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_repository.image_repos["grafana/enterprise-logs-provisioner"] will be destroyed -19:53:56.566 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - force_delete = true -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags = { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags_all = { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_configuration { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_type = "KMS" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_scanning_configuration { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - scan_on_push = true -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_repository.image_repos["grafana/loki"] will be destroyed -19:53:56.566 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/grafana/loki" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - force_delete = true -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/loki" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm/grafana/loki" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/loki" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags = { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/loki" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags_all = { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/loki" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_configuration { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_type = "KMS" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_scanning_configuration { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - scan_on_push = true -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_repository.image_repos["grafana/loki-canary"] will be destroyed -19:53:56.566 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/grafana/loki-canary" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - force_delete = true -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/loki-canary" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm/grafana/loki-canary" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/loki-canary" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags = { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/loki-canary" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags_all = { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/loki-canary" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_configuration { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_type = "KMS" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_scanning_configuration { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - scan_on_push = true -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_repository.image_repos["grafana/nginx-unprivileged"] will be destroyed -19:53:56.566 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/grafana/nginx-unprivileged" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - force_delete = true -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/nginx-unprivileged" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm/grafana/nginx-unprivileged" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/nginx-unprivileged" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags = { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/nginx-unprivileged" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags_all = { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/nginx-unprivileged" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_configuration { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_type = "KMS" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_scanning_configuration { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - scan_on_push = true -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_repository.image_repos["kiwigrid/k8s-sidecar"] will be destroyed -19:53:56.566 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - force_delete = true -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags = { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags_all = { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_configuration { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_type = "KMS" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_scanning_configuration { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - scan_on_push = true -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_repository.image_repos["memcached"] will be destroyed -19:53:56.566 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/memcached" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - force_delete = true -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/memcached" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm/memcached" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/memcached" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags = { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/memcached" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags_all = { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/memcached" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_configuration { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_type = "KMS" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_scanning_configuration { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - scan_on_push = true -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -19:53:56.566 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_repository.image_repos["prom/memcached-exporter"] will be destroyed -19:53:56.566 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/prom/memcached-exporter" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - force_delete = true -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/prom/memcached-exporter" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm/prom/memcached-exporter" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prom/memcached-exporter" -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags = { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prom/memcached-exporter" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags_all = { -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prom/memcached-exporter" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" -19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" -19:53:56.567 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.567 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:53:56.567 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:53:56.567 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:56.567 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:56.567 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:56.567 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.567 STDOUT [eks-loki] terraform_current:  - encryption_configuration { -19:53:56.567 STDOUT [eks-loki] terraform_current:  - encryption_type = "KMS" -> null -19:53:56.567 STDOUT [eks-loki] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:53:56.567 STDOUT [eks-loki] terraform_current:  } -19:53:56.567 STDOUT [eks-loki] terraform_current:  - image_scanning_configuration { -19:53:56.567 STDOUT [eks-loki] terraform_current:  - scan_on_push = true -> null -19:53:56.567 STDOUT [eks-loki] terraform_current:  } -19:53:56.567 STDOUT [eks-loki] terraform_current:  } -19:53:56.567 STDOUT [eks-loki] terraform_current:  # module.images.null_resource.copy_images["grafana/enterprise-logs-provisioner#v1.7.0"] will be destroyed -19:53:56.567 STDOUT [eks-loki] terraform_current:  - resource "null_resource" "copy_images" { -19:53:56.567 STDOUT [eks-loki] terraform_current:  - id = "2400534705754070951" -> null -19:53:56.567 STDOUT [eks-loki] terraform_current:  - triggers = { -19:53:56.567 STDOUT [eks-loki] terraform_current:  - "region" = "us-gov-east-1" -19:53:56.567 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.567 STDOUT [eks-loki] terraform_current:  } -19:53:56.567 STDOUT [eks-loki] terraform_current:  # module.images.null_resource.copy_images["grafana/loki#3.1.1"] will be destroyed -19:53:56.567 STDOUT [eks-loki] terraform_current:  - resource "null_resource" "copy_images" { -19:53:56.567 STDOUT [eks-loki] terraform_current:  - id = "7168708508218564438" -> null -19:53:56.567 STDOUT [eks-loki] terraform_current:  - triggers = { -19:53:56.567 STDOUT [eks-loki] terraform_current:  - "region" = "us-gov-east-1" -19:53:56.567 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.567 STDOUT [eks-loki] terraform_current:  } -19:53:56.567 STDOUT [eks-loki] terraform_current:  # module.images.null_resource.copy_images["grafana/loki-canary#3.0.0"] will be destroyed -19:53:56.567 STDOUT [eks-loki] terraform_current:  - resource "null_resource" "copy_images" { -19:53:56.567 STDOUT [eks-loki] terraform_current:  - id = "3148087180813738972" -> null -19:53:56.567 STDOUT [eks-loki] terraform_current:  - triggers = { -19:53:56.567 STDOUT [eks-loki] terraform_current:  - "region" = "us-gov-east-1" -19:53:56.567 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.567 STDOUT [eks-loki] terraform_current:  } -19:53:56.567 STDOUT [eks-loki] terraform_current:  # module.images.null_resource.copy_images["grafana/nginx-unprivileged#1.25.2-alpine"] will be destroyed -19:53:56.567 STDOUT [eks-loki] terraform_current:  - resource "null_resource" "copy_images" { -19:53:56.567 STDOUT [eks-loki] terraform_current:  - id = "2003059566474709841" -> null -19:53:56.567 STDOUT [eks-loki] terraform_current:  - triggers = { -19:53:56.567 STDOUT [eks-loki] terraform_current:  - "region" = "us-gov-east-1" -19:53:56.567 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.567 STDOUT [eks-loki] terraform_current:  } -19:53:56.567 STDOUT [eks-loki] terraform_current:  # module.images.null_resource.copy_images["kiwigrid/k8 -19:53:56.574 STDOUT [eks-loki] terraform_current: s-sidecar#1.27.4"] will be destroyed -19:53:56.574 STDOUT [eks-loki] terraform_current:  - resource "null_resource" "copy_images" { -19:53:56.574 STDOUT [eks-loki] terraform_current:  - id = "4475259168260390874" -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - triggers = { -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "region" = "us-gov-east-1" -19:53:56.574 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  } -19:53:56.574 STDOUT [eks-loki] terraform_current:  # module.images.null_resource.copy_images["memcached#1.6.23-alpine"] will be destroyed -19:53:56.574 STDOUT [eks-loki] terraform_current:  - resource "null_resource" "copy_images" { -19:53:56.574 STDOUT [eks-loki] terraform_current:  - id = "6793409878383401785" -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - triggers = { -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "region" = "us-gov-east-1" -19:53:56.574 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  } -19:53:56.574 STDOUT [eks-loki] terraform_current:  # module.images.null_resource.copy_images["prom/memcached-exporter#v0.14.4"] will be destroyed -19:53:56.574 STDOUT [eks-loki] terraform_current:  - resource "null_resource" "copy_images" { -19:53:56.574 STDOUT [eks-loki] terraform_current:  - id = "1971792497354324149" -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - triggers = { -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "region" = "us-gov-east-1" -19:53:56.574 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  } -19:53:56.574 STDOUT [eks-loki] terraform_current:  # module.loki_irsa_role.aws_iam_policy.encrypted-object-manager[0] will be destroyed -19:53:56.574 STDOUT [eks-loki] terraform_current:  - resource "aws_iam_policy" "encrypted-object-manager" { -19:53:56.574 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232733101400000003" -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - attachment_count = 1 -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - description = "Allow the role to read/write encrypted data using the kms keys." -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232733101400000003" -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - name = "AmazonEKS_encrypted-object-manager-20240906232733101400000003" -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - name_prefix = "AmazonEKS_encrypted-object-manager-" -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - path = "/" -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( -19:53:56.574 STDOUT [eks-loki] terraform_current:  { -19:53:56.574 STDOUT [eks-loki] terraform_current:  - Statement = [ -19:53:56.574 STDOUT [eks-loki] terraform_current:  - { -19:53:56.574 STDOUT [eks-loki] terraform_current:  - Action = [ -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "kms:ReEncrypt*", -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "kms:GenerateDataKey", -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "kms:Encrypt", -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "kms:DescribeKey", -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "kms:Decrypt", -19:53:56.574 STDOUT [eks-loki] terraform_current:  ] -19:53:56.574 STDOUT [eks-loki] terraform_current:  - Effect = "Allow" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - Resource = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/48acfe83-618e-417e-82d1-498592f8da65" -19:53:56.574 STDOUT [eks-loki] terraform_current:  }, -19:53:56.574 STDOUT [eks-loki] terraform_current:  ] -19:53:56.574 STDOUT [eks-loki] terraform_current:  - Version = "2012-10-17" -19:53:56.574 STDOUT [eks-loki] terraform_current:  } -19:53:56.574 STDOUT [eks-loki] terraform_current:  ) -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - policy_id = "ANPATIPS3JAJZ5Y2OHUVI" -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - tags = {} -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - tags_all = { -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:56.574 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  } -19:53:56.574 STDOUT [eks-loki] terraform_current:  # module.loki_irsa_role.aws_iam_policy.s3-bucket-owner[0] will be destroyed -19:53:56.574 STDOUT [eks-loki] terraform_current:  - resource "aws_iam_policy" "s3-bucket-owner" { -19:53:56.574 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232732146300000001" -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - attachment_count = 1 -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - description = "Allow the role to add/remove/change objects in the s3 bucket." -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232732146300000001" -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - name = "AmazonEKS_s3-bucket-owner-20240906232732146300000001" -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - name_prefix = "AmazonEKS_s3-bucket-owner-" -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - path = "/" -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( -19:53:56.574 STDOUT [eks-loki] terraform_current:  { -19:53:56.574 STDOUT [eks-loki] terraform_current:  - Statement = [ -19:53:56.574 STDOUT [eks-loki] terraform_current:  - { -19:53:56.574 STDOUT [eks-loki] terraform_current:  - Action = [ -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "s3:PutObject*", -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "s3:PutBucketVersioning", -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "s3:List*", -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "s3:GetObject*", -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "s3:GetBucket*", -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "s3:DeleteObject*", -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "s3:AbortMultipartUpload", -19:53:56.574 STDOUT [eks-loki] terraform_current:  ] -19:53:56.574 STDOUT [eks-loki] terraform_current:  - Effect = "Allow" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - Resource = [ -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-loki/*", -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-loki", -19:53:56.574 STDOUT [eks-loki] terraform_current:  ] -19:53:56.574 STDOUT [eks-loki] terraform_current:  }, -19:53:56.574 STDOUT [eks-loki] terraform_current:  ] -19:53:56.574 STDOUT [eks-loki] terraform_current:  - Version = "2012-10-17" -19:53:56.574 STDOUT [eks-loki] terraform_current:  } -19:53:56.574 STDOUT [eks-loki] terraform_current:  ) -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - policy_id = "ANPATIPS3JAJ7FVLF7FGM" -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - tags = {} -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  - tags_all = { -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:56.574 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:56.574 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.574 STDOUT [eks-loki] terraform_current:  } -19:53:56.574 STDOUT [eks-loki] terraform_current:  # module.loki_irsa_role.aws_iam_role.this[0] will be destroyed -19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_iam_role" "this" { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - assume_role_policy = jsonencode( -19:53:56.575 STDOUT [eks-loki] terraform_current:  { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Statement = [ -19:53:56.575 STDOUT [eks-loki] terraform_current:  - { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Action = "sts:AssumeRoleWithWebIdentity" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Condition = { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - StringEquals = { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:aud" = "sts.amazonaws.com" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:sub" = "system:serviceaccount:loki:loki" -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Effect = "Allow" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Principal = { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Federated = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  }, -19:53:56.575 STDOUT [eks-loki] terraform_current:  ] -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Version = "2012-10-17" -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  ) -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - create_date = "2024-09-06T23:27:20Z" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - force_detach_policies = true -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - managed_policy_arns = [ -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232733101400000003", -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232732146300000001", -19:53:56.575 STDOUT [eks-loki] terraform_current:  ] -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - max_session_duration = 3600 -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - path = "/" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - tags = { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "tfmod-loki" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "0.0.2" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - tags_all = { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "tfmod-loki" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "0.0.2" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - unique_id = "AROATIPS3JAJT5A42O76D" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  # (3 unchanged attributes hidden) -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_irsa_role.aws_iam_role_policy_attachment.encrypted-object-manager[0] will be destroyed -19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_iam_role_policy_attachment" "encrypted-object-manager" { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm-loki-20240906232733624100000004" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232733101400000003" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - role = "platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_irsa_role.aws_iam_role_policy_attachment.s3-bucket-owner[0] will be destroyed -19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_iam_role_policy_attachment" "s3-bucket-owner" { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm-loki-20240906232732670800000002" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232732146300000001" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - role = "platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_kms_alias.key[0] will be destroyed -19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_kms_alias" "key" { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:alias/k-kms-platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "alias/k-kms-platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - name = "alias/k-kms-platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - target_key_arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/48acfe83-618e-417e-82d1-498592f8da65" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - target_key_id = "48acfe83-618e-417e-82d1-498592f8da65" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_kms_key.key[0] will be destroyed -19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_kms_key" "key" { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/48acfe83-618e-417e-82d1-498592f8da65" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - bypass_policy_lockout_safety_check = false -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - customer_master_key_spec = "SYMMETRIC_DEFAULT" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - description = "KMS CMK for S3 bucket platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - enable_key_rotation = true -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "48acfe83-618e-417e-82d1-498592f8da65" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - is_enabled = true -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - key_id = "48acfe83-618e-417e-82d1-498592f8da65" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - key_usage = "ENCRYPT_DECRYPT" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - multi_region = false -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( -19:53:56.575 STDOUT [eks-loki] terraform_current:  { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Statement = [ -19:53:56.575 STDOUT [eks-loki] terraform_current:  - { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Action = "kms:*" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Effect = "Allow" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Principal = { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:root" -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Resource = "*" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Sid = "BuiltinKMSAdminRoles" -19:53:56.575 STDOUT [eks-loki] terraform_current:  }, -19:53:56.575 STDOUT [eks-loki] terraform_current:  ] -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Version = "2012-10-17" -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  ) -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - rotation_period_in_days = 365 -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - tags = { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Name" = "k-kms-platform-eng-eks-mcm-loki" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "tfmod-loki" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "0.0.2" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - tags_all = { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Name" = "k-kms-platform-eng-eks-mcm-loki" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "tfmod-loki" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "0.0.2" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  # (2 unchanged attributes hidden) -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket.this will be destroyed -19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket" "this" { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket_domain_name = "v-s3-platform-eng-eks-mcm-loki.s3.amazonaws.com" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket_regional_domain_name = "v-s3-platform-eng-eks-mcm-loki.s3.us-gov-east-1.amazonaws.com" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - force_destroy = false -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - hosted_zone_id = "Z2NIFVYYW2VKV1" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - object_lock_enabled = false -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( -19:53:56.575 STDOUT [eks-loki] terraform_current:  { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Statement = [ -19:53:56.575 STDOUT [eks-loki] terraform_current:  - { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Action = "s3:*" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Condition = { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Bool = { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "aws:SecureTransport" = "false" -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Effect = "Deny" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Principal = { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - AWS = "*" -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Resource = [ -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-loki/*", -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-loki", -19:53:56.575 STDOUT [eks-loki] terraform_current:  ] -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Sid = "enforceSSL" -19:53:56.575 STDOUT [eks-loki] terraform_current:  }, -19:53:56.575 STDOUT [eks-loki] terraform_current:  ] -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Version = "2012-10-17" -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  ) -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - region = "us-gov-east-1" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - request_payer = "BucketOwner" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - tags = { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Name" = "v-s3-platform-eng-eks-mcm-loki" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "tfmod-loki" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "0.0.2" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - tags_all = { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Name" = "v-s3-platform-eng-eks-mcm-loki" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "tfmod-loki" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "0.0.2" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  # (2 unchanged attributes hidden) -19:53:56.575 STDOUT [eks-loki] terraform_current:  - grant { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "2556558a9cdb2c897c1b2e56fcedd67ffd0719e0005dccec8d3f9412968e30ce" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - permissions = [ -19:53:56.575 STDOUT [eks-loki] terraform_current:  - "FULL_CONTROL", -19:53:56.575 STDOUT [eks-loki] terraform_current:  ] -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - type = "CanonicalUser" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  - logging { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - target_bucket = "inf-logs-224384469011-us-gov-east-1" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - target_prefix = "s3/v-s3-platform-eng-eks-mcm-loki/" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  - server_side_encryption_configuration { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - rule { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket_key_enabled = true -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - apply_server_side_encryption_by_default { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - kms_master_key_id = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/48acfe83-618e-417e-82d1-498592f8da65" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - sse_algorithm = "aws:kms" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  - versioning { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - enabled = false -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - mfa_delete = false -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket_acl.this[0] will be destroyed -19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket_acl" "this" { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - acl = "private" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki,private" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.575 STDOUT [eks-loki] terraform_current:  - access_control_policy { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - grant { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - permission = "FULL_CONTROL" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - grantee { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "2556558a9cdb2c897c1b2e56fcedd67ffd0719e0005dccec8d3f9412968e30ce" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - type = "CanonicalUser" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  # (3 unchanged attributes hidden) -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  - owner { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "2556558a9cdb2c897c1b2e56fcedd67ffd0719e0005dccec8d3f9412968e30ce" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket_logging.this will be destroyed -19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket_logging" "this" { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - target_bucket = "inf-logs-224384469011-us-gov-east-1" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - target_prefix = "s3/v-s3-platform-eng-eks-mcm-loki/" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket_ownership_controls.this will be destroyed -19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket_ownership_controls" "this" { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - rule { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - object_ownership = "BucketOwnerPreferred" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  } -19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket_policy.policy[0] will be destroyed -19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket_policy" "policy" { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.575 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( -19:53:56.575 STDOUT [eks-loki] terraform_current:  { -19:53:56.575 STDOUT [eks-loki] terraform_current:  - Statement = [ -19:53:56.576 STDOUT [eks-loki] terraform_current:  - { -19:53:56.576 STDOUT [eks-loki] terraform_current:  - Action = "s3:*" -19:53:56.576 STDOUT [eks-loki] terraform_current:  - Condition = { -19:53:56.576 STDOUT [eks-loki] terraform_current:  - Bool = { -19:53:56.576 STDOUT [eks-loki] terraform_current:  - "aws:SecureTransport" = "false" -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -19:53:56.576 STDOUT [eks-loki] terraform_current:  - Effect = "Deny" -19:53:56.576 STDOUT [eks-loki] terraform_current:  - Principal = { -19:53:56.576 STDOUT [eks-loki] terraform_current:  - AWS = "*" -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -19:53:56.576 STDOUT [eks-loki] terraform_current:  - Resource = [ -19:53:56.576 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-loki/*", -19:53:56.576 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-loki", -19:53:56.576 STDOUT [eks-loki] terraform_current:  ] -19:53:56.576 STDOUT [eks-loki] terraform_current:  - Sid = "enforceSSL" -19:53:56.576 STDOUT [eks-loki] terraform_current:  }, -19:53:56.576 STDOUT [eks-loki] terraform_current:  ] -19:53:56.576 STDOUT [eks-loki] terraform_current:  - Version = "2012-10-17" -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -19:53:56.576 STDOUT [eks-loki] terraform_current:  ) -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -19:53:56.576 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket_public_access_block.this will be destroyed -19:53:56.576 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket_public_access_block" "this" { -19:53:56.576 STDOUT [eks-loki] terraform_current:  - block_public_acls = true -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - block_public_policy = true -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - ignore_public_acls = true -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - restrict_public_buckets = true -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -19:53:56.576 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket_server_side_encryption_configuration.this will be destroyed -19:53:56.576 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket_server_side_encryption_configuration" "this" { -19:53:56.576 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.576 STDOUT [eks-loki] terraform_current:  - rule { -19:53:56.576 STDOUT [eks-loki] terraform_current:  - bucket_key_enabled = true -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - apply_server_side_encryption_by_default { -19:53:56.576 STDOUT [eks-loki] terraform_current:  - kms_master_key_id = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/48acfe83-618e-417e-82d1-498592f8da65" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - sse_algorithm = "aws:kms" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -19:53:56.576 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket_versioning.this will be destroyed -19:53:56.576 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket_versioning" "this" { -19:53:56.576 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.576 STDOUT [eks-loki] terraform_current:  - versioning_configuration { -19:53:56.576 STDOUT [eks-loki] terraform_current:  - status = "Suspended" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -19:53:56.576 STDOUT [eks-loki] terraform_current:  # module.loki_s3.time_sleep.acl_delay will be destroyed -19:53:56.576 STDOUT [eks-loki] terraform_current:  - resource "time_sleep" "acl_delay" { -19:53:56.576 STDOUT [eks-loki] terraform_current:  - create_duration = "30s" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - destroy_duration = "30s" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - id = "2024-09-06T23:29:53Z" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - triggers = { -19:53:56.576 STDOUT [eks-loki] terraform_current:  - "bucket" = "v-s3-platform-eng-eks-mcm-loki" -19:53:56.576 STDOUT [eks-loki] terraform_current:  - "public_access_block" = "v-s3-platform-eng-eks-mcm-loki" -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -19:53:56.576 STDOUT [eks-loki] terraform_current:  # module.loki_s3.time_sleep.policy_delay will be destroyed -19:53:56.576 STDOUT [eks-loki] terraform_current:  - resource "time_sleep" "policy_delay" { -19:53:56.576 STDOUT [eks-loki] terraform_current:  - create_duration = "120s" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - destroy_duration = "30s" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - id = "2024-09-06T23:29:22Z" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - triggers = { -19:53:56.576 STDOUT [eks-loki] terraform_current:  - "bucket" = "v-s3-platform-eng-eks-mcm-loki" -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -19:53:56.576 STDOUT [eks-loki] terraform_current: Plan: 0 to add, 0 to change, 40 to destroy. -19:53:56.576 STDOUT [eks-loki] terraform_current:  -19:53:56.576 STDOUT [eks-loki] terraform_current: Changes to Outputs: -19:53:56.576 STDOUT [eks-loki] terraform_current:  - gateway_internal_endpoint = { -19:53:56.576 STDOUT [eks-loki] terraform_current:  - hostname = "loki-gateway.loki.svc.cluster.local" -19:53:56.576 STDOUT [eks-loki] terraform_current:  - portNumber = "80" -19:53:56.576 STDOUT [eks-loki] terraform_current:  - url = "http://loki-gateway.loki.svc.cluster.local:80/" -19:53:56.576 STDOUT [eks-loki] terraform_current:  } -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - module_name = "tfmod-loki" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - module_version = "0.0.2" -> null -19:53:56.576 STDOUT [eks-loki] terraform_current:  - rwo_storage_class = "gp3-encrypted" -> null -19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_ownership_controls.this: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo] -19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_versioning.this: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo] -19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role_policy_attachment.s3-bucket-owner[0]: Destroying... [id=platform-eng-eks-mcm-tempo-20240906232923578800000002] -19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_logging.this: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo] -19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_acl.this[0]: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo,private] -19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_kms_alias.key[0]: Destroying... [id=alias/k-kms-platform-eng-eks-mcm-tempo] -19:53:56.738 STDOUT [eks-tempo] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["tempo"]: Destroying... [id=platform-eng-eks-mcm/tempo] -19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_server_side_encryption_configuration.this: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo] -19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role_policy_attachment.encrypted-object-manager[0]: Destroying... [id=platform-eng-eks-mcm-tempo-20240906232934771300000004] -19:53:56.745 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_acl.this[0]: Destruction complete after 0s -19:53:56.746 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.acl_delay: Destroying... [id=2024-09-06T23:31:53Z] -19:53:56.859 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_kms_alias.key[0]: Destruction complete after 0s -19:53:56.898 STDOUT [eks-tempo] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["tempo"]: Destruction complete after 0s -19:53:56.903 STDOUT [eks-tempo] terraform_current: module.images.aws_ecr_repository.image_repos["tempo"]: Destroying... [id=platform-eng-eks-mcm/tempo] -19:53:57.067 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_logging.this: Destruction complete after 0s -19:53:57.099 STDOUT [eks-tempo] terraform_current: module.images.aws_ecr_repository.image_repos["tempo"]: Destruction complete after 0s -19:53:57.166 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role_policy_attachment.s3-bucket-owner[0]: Destruction complete after 0s -19:53:57.168 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_policy.s3-bucket-owner[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232923002900000001] -19:53:57.168 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role_policy_attachment.encrypted-object-manager[0]: Destruction complete after 0s -19:53:57.170 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_policy.encrypted-object-manager[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232934209600000003] -19:53:57.249 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["prom/memcached-exporter#v0.14.4"]: Destroying... [id=1971792497354324149] -19:53:57.249 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["kiwigrid/k8s-sidecar#1.27.4"]: Destroying... [id=4475259168260390874] -19:53:57.249 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/nginx-unprivileged#1.25.2-alpine"]: Destroying... [id=2003059566474709841] -19:53:57.249 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/loki#3.1.1"]: Destroying... [id=7168708508218564438] -19:53:57.249 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["memcached#1.6.23-alpine"]: Destroying... [id=6793409878383401785] -19:53:57.249 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/enterprise-logs-provisioner#v1.7.0"]: Destroying... [id=2400534705754070951] -19:53:57.249 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/loki-canary#3.0.0"]: Destroying... [id=3148087180813738972] -19:53:57.252 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["prom/memcached-exporter#v0.14.4"]: Destruction complete after 0s -19:53:57.252 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["kiwigrid/k8s-sidecar#1.27.4"]: Destruction complete after 0s -19:53:57.252 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/loki-canary#3.0.0"]: Destruction complete after 0s -19:53:57.261 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/enterprise-logs-provisioner#v1.7.0"]: Destruction complete after 0s -19:53:57.261 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/loki#3.1.1"]: Destruction complete after 0s -19:53:57.261 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["memcached#1.6.23-alpine"]: Destruction complete after 0s -19:53:57.270 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/nginx-unprivileged#1.25.2-alpine"]: Destruction complete after 0s -19:53:57.286 STDOUT [eks-loki] terraform_current: helm_release.loki: Destroying... [id=loki] -19:53:57.420 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_versioning.this: Destruction complete after 0s -19:53:57.475 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_policy.s3-bucket-owner[0]: Destruction complete after 0s -19:53:57.486 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_policy.encrypted-object-manager[0]: Destruction complete after 0s -19:53:57.559 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_ownership_controls.this: Destruction complete after 1s -19:53:57.789 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_server_side_encryption_configuration.this: Destruction complete after 1s -19:53:57.911 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["memcached"]: Destroying... [id=platform-eng-eks-mcm/memcached] -19:53:57.911 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_server_side_encryption_configuration.this: Destroying... [id=v-s3-platform-eng-eks-mcm-loki] -19:53:57.911 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/nginx-unprivileged"]: Destroying... [id=platform-eng-eks-mcm/grafana/nginx-unprivileged] -19:53:57.911 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki"]: Destroying... [id=platform-eng-eks-mcm/grafana/loki] -19:53:57.920 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki-canary"]: Destroying... [id=platform-eng-eks-mcm/grafana/loki-canary] -19:53:57.920 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_logging.this: Destroying... [id=v-s3-platform-eng-eks-mcm-loki] -19:53:57.920 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_versioning.this: Destroying... [id=v-s3-platform-eng-eks-mcm-loki] -19:53:57.920 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prom/memcached-exporter"]: Destroying... [id=platform-eng-eks-mcm/prom/memcached-exporter] -19:53:57.920 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role_policy_attachment.encrypted-object-manager[0]: Destroying... [id=platform-eng-eks-mcm-loki-20240906232733624100000004] -19:53:57.952 STDOUT [eks-tempo] terraform_current: helm_release.tempo: Destruction complete after 2s -19:53:57.958 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role.this[0]: Destroying... [id=platform-eng-eks-mcm-tempo] -19:53:58.068 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki"]: Destruction complete after 0s -19:53:58.068 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["memcached"]: Destruction complete after 0s -19:53:58.068 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/nginx-unprivileged"]: Destruction complete after 0s -19:53:58.072 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_ownership_controls.this: Destroying... [id=v-s3-platform-eng-eks-mcm-loki] -19:53:58.072 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role_policy_attachment.s3-bucket-owner[0]: Destroying... [id=platform-eng-eks-mcm-loki-20240906232732670800000002] -19:53:58.072 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_acl.this[0]: Destroying... [id=v-s3-platform-eng-eks-mcm-loki,private] -19:53:58.075 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_acl.this[0]: Destruction complete after 0s -19:53:58.077 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prom/memcached-exporter"]: Destruction complete after 0s -19:53:58.077 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/enterprise-logs-provisioner"]: Destroying... [id=platform-eng-eks-mcm/grafana/enterprise-logs-provisioner] -19:53:58.079 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_kms_alias.key[0]: Destroying... [id=alias/k-kms-platform-eng-eks-mcm-loki] -19:53:58.081 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki-canary"]: Destruction complete after 0s -19:53:58.082 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["kiwigrid/k8s-sidecar"]: Destroying... [id=platform-eng-eks-mcm/kiwigrid/k8s-sidecar] -19:53:58.133 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/enterprise-logs-provisioner"]: Destruction complete after 0s -19:53:58.136 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.acl_delay: Destroying... [id=2024-09-06T23:29:53Z] -19:53:58.138 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["kiwigrid/k8s-sidecar"]: Destruction complete after 0s -19:53:58.140 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/nginx-unprivileged"]: Destroying... [id=platform-eng-eks-mcm/grafana/nginx-unprivileged] -19:53:58.198 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_kms_alias.key[0]: Destruction complete after 0s -19:53:58.199 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["kiwigrid/k8s-sidecar"]: Destroying... [id=platform-eng-eks-mcm/kiwigrid/k8s-sidecar] -19:53:58.281 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_logging.this: Destruction complete after 0s -19:53:58.283 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/loki-canary"]: Destroying... [id=platform-eng-eks-mcm/grafana/loki-canary] -19:53:58.337 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role_policy_attachment.encrypted-object-manager[0]: Destruction complete after 0s -19:53:58.337 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/nginx-unprivileged"]: Destruction complete after 0s -19:53:58.337 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/loki"]: Destroying... [id=platform-eng-eks-mcm/grafana/loki] -19:53:58.337 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["prom/memcached-exporter"]: Destroying... [id=platform-eng-eks-mcm/prom/memcached-exporter] -19:53:58.402 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["kiwigrid/k8s-sidecar"]: Destruction complete after 0s -19:53:58.404 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/enterprise-logs-provisioner"]: Destroying... [id=platform-eng-eks-mcm/grafana/enterprise-logs-provisioner] -19:53:58.433 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role.this[0]: Destruction complete after 0s -19:53:58.468 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role_policy_attachment.s3-bucket-owner[0]: Destruction complete after 0s -19:53:58.470 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["memcached"]: Destroying... [id=platform-eng-eks-mcm/memcached] -19:53:58.472 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_ownership_controls.this: Destruction complete after 0s -19:53:58.473 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_policy.encrypted-object-manager[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232733101400000003] -19:53:58.478 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/loki-canary"]: Destruction complete after 0s -19:53:58.479 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_policy.s3-bucket-owner[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232732146300000001] -19:53:58.512 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["prom/memcached-exporter"]: Destruction complete after 1s -19:53:58.551 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/loki"]: Destruction complete after 1s -19:53:58.556 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_versioning.this: Destruction complete after 1s -19:53:58.581 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/enterprise-logs-provisioner"]: Destruction complete after 1s -19:53:58.651 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["memcached"]: Destruction complete after 1s -19:53:58.789 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_policy.encrypted-object-manager[0]: Destruction complete after 1s -19:53:58.789 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_policy.s3-bucket-owner[0]: Destruction complete after 1s -19:53:58.933 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_server_side_encryption_configuration.this: Destruction complete after 1s -19:54:00.411 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue_policy.this[0]: Still destroying... [id=https://sqs.us-gov-east-1.amazonaws.com...4469011/Karpenter-platform-eng-eks-mcm, 10s elapsed] -19:54:03.499 STDOUT [eks-loki] terraform_current: helm_release.loki: Destruction complete after 6s -19:54:03.519 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Destroying... [id=loki] -19:54:03.519 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role.this[0]: Destroying... [id=platform-eng-eks-mcm-loki] -19:54:03.984 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role.this[0]: Destruction complete after 0s -19:54:06.746 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.acl_delay: Still destroying... [id=2024-09-06T23:31:53Z, 10s elapsed] -19:54:08.137 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.acl_delay: Still destroying... [id=2024-09-06T23:29:53Z, 10s elapsed] -19:54:10.412 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue_policy.this[0]: Still destroying... [id=https://sqs.us-gov-east-1.amazonaws.com...4469011/Karpenter-platform-eng-eks-mcm, 20s elapsed] -19:54:13.524 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 10s elapsed] -19:54:15.763 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue_policy.this[0]: Destruction complete after 26s -19:54:15.979 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue.this[0]: Destroying... [id=https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm] -19:54:16.746 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.acl_delay: Still destroying... [id=2024-09-06T23:31:53Z, 20s elapsed] -19:54:17.913 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue.this[0]: Destruction complete after 2s -19:54:18.070 STDOUT [eks-karpenter] terraform_current:  -19:54:18.070 STDOUT [eks-karpenter] terraform_current: Destroy complete! Resources: 33 destroyed. -19:54:18.070 STDOUT [eks-karpenter] terraform_current:  -19:54:18.138 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.acl_delay: Still destroying... [id=2024-09-06T23:29:53Z, 20s elapsed] -19:54:23.525 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 20s elapsed] -19:54:26.746 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.acl_delay: Still destroying... [id=2024-09-06T23:31:53Z, 30s elapsed] -19:54:26.783 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.acl_delay: Destruction complete after 30s -19:54:26.985 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_public_access_block.this: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo] -19:54:27.326 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_public_access_block.this: Destruction complete after 0s -19:54:27.327 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_policy.policy[0]: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo] -19:54:27.610 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_policy.policy[0]: Destruction complete after 1s -19:54:27.613 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_kms_key.key[0]: Destroying... [id=009b63d6-497f-4139-9c8c-7cae709ed71b] -19:54:27.614 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.policy_delay: Destroying... [id=2024-09-06T23:31:23Z] -19:54:27.763 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_kms_key.key[0]: Destruction complete after 0s -19:54:28.142 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.acl_delay: Still destroying... [id=2024-09-06T23:29:53Z, 30s elapsed] -19:54:28.167 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.acl_delay: Destruction complete after 30s -19:54:28.370 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_public_access_block.this: Destroying... [id=v-s3-platform-eng-eks-mcm-loki] -19:54:28.740 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_public_access_block.this: Destruction complete after 1s -19:54:28.743 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_policy.policy[0]: Destroying... [id=v-s3-platform-eng-eks-mcm-loki] -19:54:29.013 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_policy.policy[0]: Destruction complete after 0s -19:54:29.017 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.policy_delay: Destroying... [id=2024-09-06T23:29:22Z] -19:54:29.020 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_kms_key.key[0]: Destroying... [id=48acfe83-618e-417e-82d1-498592f8da65] -19:54:29.174 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_kms_key.key[0]: Destruction complete after 0s -19:54:33.527 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 30s elapsed] -19:54:37.615 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.policy_delay: Still destroying... [id=2024-09-06T23:31:23Z, 10s elapsed] -19:54:39.018 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.policy_delay: Still destroying... [id=2024-09-06T23:29:22Z, 10s elapsed] -19:54:43.527 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 40s elapsed] -19:54:47.616 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.policy_delay: Still destroying... [id=2024-09-06T23:31:23Z, 20s elapsed] -19:54:49.019 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.policy_delay: Still destroying... [id=2024-09-06T23:29:22Z, 20s elapsed] -19:54:53.529 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 50s elapsed] -19:54:57.617 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.policy_delay: Still destroying... [id=2024-09-06T23:31:23Z, 30s elapsed] -19:54:57.644 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.policy_delay: Destruction complete after 30s -19:54:57.829 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket.this: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo] -19:54:58.148 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket.this: Destruction complete after 0s -19:54:58.304 STDOUT [eks-tempo] terraform_current:  -19:54:58.304 STDOUT [eks-tempo] terraform_current: Destroy complete! Resources: 21 destroyed. -19:54:58.304 STDOUT [eks-tempo] terraform_current:  -19:54:59.020 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.policy_delay: Still destroying... [id=2024-09-06T23:29:22Z, 30s elapsed] -19:54:59.050 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.policy_delay: Destruction complete after 30s -19:54:59.212 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket.this: Destroying... [id=v-s3-platform-eng-eks-mcm-loki] -19:54:59.524 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket.this: Destruction complete after 1s -19:55:03.533 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 1m0s elapsed] -19:55:05.744 STDOUT [eks-prometheus] terraform_current: kubernetes_namespace.ns: Refreshing state... [id=prometheus] -19:55:06.494 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_region.current: Reading... -19:55:06.494 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... -19:55:06.494 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... -19:55:06.494 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... -19:55:06.494 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_caller_identity.current: Reading... -19:55:06.494 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zones.zones: Reading... -19:55:06.500 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s -19:55:06.500 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:55:06.529 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 1s [id=224384469011] -19:55:06.532 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_arn.current: Reading... -19:55:06.543 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -19:55:06.574 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/prometheus-config-reloader"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/prometheus-config-reloader] -19:55:06.574 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/node-exporter"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/node-exporter] -19:55:06.574 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/prometheus"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/prometheus] -19:55:06.574 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/kube-state-metrics"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/kube-state-metrics] -19:55:06.574 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/alertmanager"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/alertmanager] -19:55:06.574 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/pushgateway"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/pushgateway] -19:55:06.637 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 1s [id=us-gov-east-1] -19:55:06.656 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 1s [id=us-gov-east-1] -19:55:06.665 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... -19:55:06.665 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... -19:55:06.665 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... -19:55:06.717 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] -19:55:06.771 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] -19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/alertmanager#v0.27.0"]: Refreshing state... [id=8630798188061012409] -19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/kube-state-metrics#v2.13.0"]: Refreshing state... [id=6933699179229132418] -19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] -19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/node-exporter"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/node-exporter] -19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus-config-reloader"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/prometheus-config-reloader] -19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/pushgateway"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/pushgateway] -19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/prometheus] -19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/alertmanager"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/alertmanager] -19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/kube-state-metrics"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/kube-state-metrics] -19:55:06.815 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/node-exporter#v1.8.2"]: Refreshing state... [id=4907547390444109840] -19:55:06.829 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/prometheus-config-reloader#v0.75.2"]: Refreshing state... [id=8179388785829298469] -19:55:06.829 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/prometheus#v2.53.1"]: Refreshing state... [id=4204319747607986992] -19:55:06.832 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/pushgateway#v1.9.0"]: Refreshing state... [id=438977600877449532] -19:55:06.837 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 1s [id=lab-dev-gov] -19:55:06.896 STDOUT [eks-prometheus] terraform_current: helm_release.prometheus: Refreshing state... [id=prometheus] -19:55:12.690 STDOUT [eks-prometheus] terraform_current: Terraform used the selected providers to generate the following execution -19:55:12.690 STDOUT [eks-prometheus] terraform_current: plan. Resource actions are indicated with the following symbols: -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - destroy -19:55:12.690 STDOUT [eks-prometheus] terraform_current: Terraform will perform the following actions: -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  # helm_release.prometheus will be destroyed -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - resource "helm_release" "prometheus" { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - atomic = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - chart = "prometheus" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - cleanup_on_fail = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - create_namespace = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - dependency_update = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - disable_crd_hooks = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - disable_openapi_validation = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - disable_webhooks = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - force_update = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - id = "prometheus" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - lint = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - max_history = 0 -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - metadata = [ -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - app_version = "v2.53.1" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - chart = "prometheus" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - first_deployed = 1725665292 -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - last_deployed = 1725665292 -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - namespace = "prometheus" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - notes = <<-EOT -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  1. Get the application URL by running these commands: -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  export POD_NAME=$(kubectl get pods --namespace prometheus -l "app.kubernetes.io/name=alertmanager,app.kubernetes.io/instance=prometheus" -o jsonpath="{.items[0].metadata.name}") -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  echo "Visit http://127.0.0.1:9093 to use your application" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  kubectl --namespace prometheus port-forward $POD_NAME 9093:80 -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  1. Get the application URL by running these commands: -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  export POD_NAME=$(kubectl get pods --namespace prometheus -l "app.kubernetes.io/name=prometheus-pushgateway,app.kubernetes.io/instance=prometheus" -o jsonpath="{.items[0].metadata.name}") -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  kubectl port-forward $POD_NAME 9091 -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  echo "Visit http://127.0.0.1:9091 to use your application" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  The Prometheus server can be accessed via port 80 on the following DNS name from within your cluster: -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  prometheus-server.prometheus.svc.cluster.local -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  Get the Prometheus server URL by running these commands in the same shell: -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  export POD_NAME=$(kubectl get pods --namespace prometheus -l "app.kubernetes.io/name=prometheus,app.kubernetes.io/instance=prometheus" -o jsonpath="{.items[0].metadata.name}") -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  kubectl --namespace prometheus port-forward $POD_NAME 9090 -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  The Prometheus alertmanager can be accessed via port 9093 on the following DNS name from within your cluster: -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  prometheus-alertmanager.prometheus.svc.cluster.local -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  Get the Alertmanager URL by running these commands in the same shell: -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  export POD_NAME=$(kubectl get pods --namespace prometheus -l "app.kubernetes.io/name=alertmanager,app.kubernetes.io/instance=prometheus" -o jsonpath="{.items[0].metadata.name}") -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  kubectl --namespace prometheus port-forward $POD_NAME 9093 -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ################################################################################# -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ###### WARNING: Pod Security Policy has been disabled by default since ##### -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ###### it deprecated after k8s 1.25+. use ##### -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ###### (index .Values "prometheus-node-exporter" "rbac" ##### -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ###### . "pspEnabled") with (index .Values ##### -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ###### "prometheus-node-exporter" "rbac" "pspAnnotations") ##### -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ###### in case you still need it. ##### -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ################################################################################# -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  The Prometheus PushGateway can be accessed via port 9091 on the following DNS name from within your cluster: -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  prometheus-prometheus-pushgateway.prometheus.svc.cluster.local -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  Get the PushGateway URL by running these commands in the same shell: -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  export POD_NAME=$(kubectl get pods --namespace prometheus -l "app=prometheus-pushgateway,component=pushgateway" -o jsonpath="{.items[0].metadata.name}") -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  kubectl --namespace prometheus port-forward $POD_NAME 9091 -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  For more information on running Prometheus, visit: -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  https://prometheus.io/ -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  1. Get the application URL by running these commands: -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  export POD_NAME=$(kubectl get pods --namespace prometheus -l "app.kubernetes.io/name=prometheus-node-exporter,app.kubernetes.io/instance=prometheus" -o jsonpath="{.items[0].metadata.name}") -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  echo "Visit http://127.0.0.1:9100 to use your application" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  kubectl port-forward --namespace prometheus $POD_NAME 9100 -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  kube-state-metrics is a simple service that listens to the Kubernetes API server and generates metrics about the state of the objects. -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  The exposed metrics can be found here: -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  https://github.com/kubernetes/kube-state-metrics/blob/master/docs/README.md#exposed-metrics -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  The metrics are exported on the HTTP endpoint /metrics on the listening port. -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  In your case, prometheus-kube-state-metrics.prometheus.svc.cluster.local:8080/metrics -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  They are served either as plaintext or protobuf depending on the Accept header. -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  They are designed to be consumed either by Prometheus itself or by a scraper that is compatible with scraping a Prometheus client endpoint. -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  EOT -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - revision = 1 -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - values = jsonencode( -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - alertmanager = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - configmapReload = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - image = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - tag = "v0.75.2" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - image = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/alertmanager" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - tag = "v0.27.0" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - persistence = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - storageClass = "gp3-encrypted" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - configmapReload = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - prometheus = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - image = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - tag = "v0.75.2" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - kube-state-metrics = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - image = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - registry = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/kube-state-metrics" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - tag = "v2.13.0" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - prometheus-node-exporter = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - image = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - registry = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/node-exporter" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - tag = "v1.8.2" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - prometheus-pushgateway = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - image = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/pushgateway" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - tag = "v1.9.0" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - server = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - image = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - tag = "v2.53.1" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - persistentVolume = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - storageClass = "gp3-encrypted" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - web = { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - enable-remote-write-receiver = "" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ) -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - version = "25.25.0" -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  }, -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ] -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - namespace = "prometheus" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - pass_credentials = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - recreate_pods = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - render_subchart_notes = true -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - replace = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "https://prometheus-community.github.io/helm-charts" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - reset_values = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - reuse_values = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - skip_crds = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - status = "deployed" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - timeout = 300 -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - verify = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - version = "25.25.0" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - wait = true -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - wait_for_jobs = false -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "alertmanager.configmapReload.image.repository" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "alertmanager.configmapReload.image.tag" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - value = "v0.75.2" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "alertmanager.image.repository" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/alertmanager" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "alertmanager.image.tag" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - value = "v0.27.0" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "alertmanager.persistence.storageClass" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - value = "gp3-encrypted" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "configmapReload.prometheus.image.repository" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "configmapReload.prometheus.image.tag" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "v0.75.2" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "kube-state-metrics.image.registry" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "kube-state-metrics.image.repository" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "platform-eng-eks-mcm/prometheus/kube-state-metrics" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "kube-state-metrics.image.tag" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "v2.13.0" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus-node-exporter.image.registry" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus-node-exporter.image.repository" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "platform-eng-eks-mcm/prometheus/node-exporter" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus-node-exporter.image.tag" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "v1.8.2" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus-pushgateway.image.repository" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/pushgateway" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus-pushgateway.image.tag" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "v1.9.0" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "server.image.repository" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "server.image.tag" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "v2.53.1" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "server.persistentVolume.storageClass" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "gp3-encrypted" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "server.web.enable-remote-write-receiver" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (2 unchanged attributes hidden) -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # kubernetes_namespace.ns will be destroyed -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "kubernetes_namespace" "ns" { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "prometheus" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - wait_for_default_service_account = false -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - metadata { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - annotations = {} -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - generation = 0 -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - labels = { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "istio-injection" = "enabled" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource_version = "4570" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - uid = "4fa15265-3517-4e13-aed7-e37d94e8c321" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["prometheus/alertmanager"] will be destroyed -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/alertmanager" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - policy = jsonencode( -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rules = [ -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - action = { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - type = "expire" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - description = "keep 5 images" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rulePriority = 1 -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - selection = { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countNumber = 5 -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countType = "imageCountMoreThan" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tagStatus = "any" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  }, -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ] -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ) -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/alertmanager" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["prometheus/kube-state-metrics"] will be destroyed -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/kube-state-metrics" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - policy = jsonencode( -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rules = [ -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - action = { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - type = "expire" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - description = "keep 5 images" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rulePriority = 1 -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - selection = { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countNumber = 5 -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countType = "imageCountMoreThan" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tagStatus = "any" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  }, -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ] -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ) -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/kube-state-metrics" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["prometheus/node-exporter"] will be destroyed -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/node-exporter" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - policy = jsonencode( -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rules = [ -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - action = { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - type = "expire" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - description = "keep 5 images" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rulePriority = 1 -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - selection = { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countNumber = 5 -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countType = "imageCountMoreThan" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tagStatus = "any" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  }, -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ] -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ) -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/node-exporter" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus"] will be destroyed -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/prometheus" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - policy = jsonencode( -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rules = [ -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - action = { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - type = "expire" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - description = "keep 5 images" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rulePriority = 1 -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - selection = { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countNumber = 5 -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countType = "imageCountMoreThan" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tagStatus = "any" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  }, -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ] -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ) -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/prometheus" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus-config-reloader"] will be destroyed -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - policy = jsonencode( -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rules = [ -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - action = { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - type = "expire" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - description = "keep 5 images" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rulePriority = 1 -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - selection = { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countNumber = 5 -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countType = "imageCountMoreThan" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tagStatus = "any" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  }, -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ] -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ) -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["prometheus/pushgateway"] will be destroyed -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/pushgateway" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - policy = jsonencode( -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rules = [ -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - action = { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - type = "expire" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - description = "keep 5 images" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rulePriority = 1 -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - selection = { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countNumber = 5 -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countType = "imageCountMoreThan" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tagStatus = "any" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  }, -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ] -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ) -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/pushgateway" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_repository.image_repos["prometheus/alertmanager"] will be destroyed -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/prometheus/alertmanager" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - force_delete = true -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/alertmanager" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "platform-eng-eks-mcm/prometheus/alertmanager" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/alertmanager" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tags = { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/alertmanager" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tags_all = { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/alertmanager" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Organization" = "census:ocio:csvd" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Terraform" = "true" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Terragrunt" = "true" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - encryption_configuration { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - encryption_type = "KMS" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - image_scanning_configuration { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - scan_on_push = true -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_repository.image_repos["prometheus/kube-state-metrics"] will be destroyed -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/prometheus/kube-state-metrics" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - force_delete = true -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/kube-state-metrics" -> null -19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - name = "platform-eng-eks-mcm/prometheus/kube-state-metrics" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/kube-state-metrics" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - tags = { -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/kube-state-metrics" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - tags_all = { -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/kube-state-metrics" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Organization" = "census:ocio:csvd" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Terraform" = "true" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Terragrunt" = "true" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - encryption_configuration { -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - encryption_type = "KMS" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - image_scanning_configuration { -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - scan_on_push = true -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_repository.image_repos["prometheus/node-exporter"] will be destroyed -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/prometheus/node-exporter" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - force_delete = true -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/node-exporter" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - name = "platform-eng-eks-mcm/prometheus/node-exporter" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/node-exporter" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - tags  -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  = { -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/node-exporter" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - tags_all = { -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/node-exporter" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Organization" = "census:ocio:csvd" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Terraform" = "true" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Terragrunt" = "true" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - encryption_configuration { -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - encryption_type = "KMS" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - image_scanning_configuration { -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - scan_on_push = true -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_repository.image_repos["prometheus/prometheus"] will be destroyed -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/prometheus/prometheus" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - force_delete = true -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/prometheus" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - name = "platform-eng-eks-mcm/prometheus/prometheus" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus" -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - tags = { -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/prometheus" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - tags_all = { -19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/prometheus" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Organization" = "census:ocio:csvd" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Terraform" = "true" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Terragrunt" = "true" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - encryption_configuration { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - encryption_type = "KMS" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - image_scanning_configuration { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - scan_on_push = true -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_repository.image_repos["prometheus/prometheus-config-reloader"] will be destroyed -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - force_delete = true -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - name = "platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - tags = { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - tags_all = { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Organization" = "census:ocio:csvd" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Terraform" = "true" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Terragrunt" = "true" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - encryption_configuration { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - encryption_type = "KMS" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - image_scanning_configuration { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - scan_on_push = true -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_repository.image_repos["prometheus/pushgateway"] will be destroyed -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/prometheus/pushgateway" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - force_delete = true -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/pushgateway" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - name = "platform-eng-eks-mcm/prometheus/pushgateway" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/pushgateway" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - tags = { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/pushgateway" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - tags_all = { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/pushgateway" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Organization" = "census:ocio:csvd" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Terraform" = "true" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Terragrunt" = "true" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - encryption_configuration { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - encryption_type = "KMS" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - image_scanning_configuration { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - scan_on_push = true -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.null_resource.copy_images["prometheus/alertmanager#v0.27.0"] will be destroyed -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "null_resource" "copy_images" { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "8630798188061012409" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - triggers = { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "region" = "us-gov-east-1" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.null_resource.copy_images["prometheus/kube-state-metrics#v2.13.0"] will be destroyed -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "null_resource" "copy_images" { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "6933699179229132418" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - triggers = { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "region" = "us-gov-east-1" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.null_resource.copy_images["prometheus/node-exporter#v1.8.2"] will be destroyed -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "null_resource" "copy_images" { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "4907547390444109840" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - triggers = { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "region" = "us-gov-east-1" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.null_resource.copy_images["prometheus/prometheus#v2.53.1"] will be destroyed -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "null_resource" "copy_images" { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "4204319747607986992" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - triggers = { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "region" = "us-gov-east-1" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.null_resource.copy_images["prometheus/prometheus-config-reloader#v0.75.2"] will be destroyed -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "null_resource" "copy_images" { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "8179388785829298469" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - triggers = { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "region" = "us-gov-east-1" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.null_resource.copy_images["prometheus/pushgateway#v1.9.0"] will be destroyed -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "null_resource" "copy_images" { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "438977600877449532" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - triggers = { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "region" = "us-gov-east-1" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -19:55:12.693 STDOUT [eks-prometheus] terraform_current: Plan: 0 to add, 0 to change, 20 to destroy. -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  -19:55:12.693 STDOUT [eks-prometheus] terraform_current: Changes to Outputs: -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - alertmanager_headless_internal_endpoint = { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - hostname = "prometheus-alertmanager-headless.prometheus.svc.cluster.local" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - port_number = 9093 -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - url = "http://prometheus-alertmanager.prometheus.svc.cluster.local:9093/" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - alertmanager_internal_endpoint = { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - hostname = "prometheus-alertmanager.prometheus.svc.cluster.local" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - port_number = 9093 -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - url = "http://prometheus-alertmanager.prometheus.svc.cluster.local:9093/" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - module_name = "tfmod-prometheus" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - module_version = "0.0.2" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - prometheus_namespace = "prometheus" -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - prometheus_server_internal_endpoint = { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - hostname = "prometheus-server.prometheus.svc.cluster.local" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - port_number = 9090 -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - url = "http://prometheus-server.prometheus.svc.cluster.local:9090/" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - pushgateway_internal_endpoint = { -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - hostname = "prometheus-prometheus-pushgateway.prometheus.svc.cluster.local" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - port_number = 9091 -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - url = "http://prometheus-prometheus-pushgateway.prometheus.svc.cluster.local:9091/" -19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null -19:55:13.256 STDOUT [eks-prometheus] terraform_current: helm_release.prometheus: Destroying... [id=prometheus] -19:55:13.534 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 1m10s elapsed] -19:55:23.255 STDOUT [eks-prometheus] terraform_current: helm_release.prometheus: Still destroying... [id=prometheus, 10s elapsed] -19:55:23.534 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 1m20s elapsed] -19:55:23.707 STDOUT [eks-prometheus] terraform_current: helm_release.prometheus: Destruction complete after 11s -19:55:23.716 STDOUT [eks-prometheus] terraform_current: kubernetes_namespace.ns: Destroying... [id=prometheus] -19:55:23.725 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus-config-reloader"]: Destroying... [id=platform-eng-eks-mcm/prometheus/prometheus-config-reloader] -19:55:23.725 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/alertmanager"]: Destroying... [id=platform-eng-eks-mcm/prometheus/alertmanager] -19:55:23.725 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/kube-state-metrics"]: Destroying... [id=platform-eng-eks-mcm/prometheus/kube-state-metrics] -19:55:23.732 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/node-exporter#v1.8.2"]: Destroying... [id=4907547390444109840] -19:55:23.732 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/pushgateway#v1.9.0"]: Destroying... [id=438977600877449532] -19:55:23.732 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/prometheus-config-reloader#v0.75.2"]: Destroying... [id=8179388785829298469] -19:55:23.732 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/alertmanager#v0.27.0"]: Destroying... [id=8630798188061012409] -19:55:23.732 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/prometheus#v2.53.1"]: Destroying... [id=4204319747607986992] -19:55:23.732 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/kube-state-metrics#v2.13.0"]: Destroying... [id=6933699179229132418] -19:55:23.735 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/prometheus#v2.53.1"]: Destruction complete after 0s -19:55:23.735 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/kube-state-metrics#v2.13.0"]: Destruction complete after 0s -19:55:23.735 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/node-exporter#v1.8.2"]: Destruction complete after 0s -19:55:23.735 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/pushgateway#v1.9.0"]: Destruction complete after 0s -19:55:23.735 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/prometheus-config-reloader#v0.75.2"]: Destruction complete after 0s -19:55:23.735 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/alertmanager#v0.27.0"]: Destruction complete after 0s -19:55:23.737 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus"]: Destroying... [id=platform-eng-eks-mcm/prometheus/prometheus] -19:55:23.737 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/node-exporter"]: Destroying... [id=platform-eng-eks-mcm/prometheus/node-exporter] -19:55:23.737 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/pushgateway"]: Destroying... [id=platform-eng-eks-mcm/prometheus/pushgateway] -19:55:23.872 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/alertmanager"]: Destruction complete after 0s -19:55:23.873 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus-config-reloader"]: Destruction complete after 0s -19:55:23.875 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/kube-state-metrics"]: Destruction complete after 0s -19:55:23.880 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/pushgateway"]: Destruction complete after 0s -19:55:23.892 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/node-exporter"]: Destruction complete after 0s -19:55:23.892 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus"]: Destruction complete after 0s -19:55:23.900 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/kube-state-metrics"]: Destroying... [id=platform-eng-eks-mcm/prometheus/kube-state-metrics] -19:55:23.900 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/node-exporter"]: Destroying... [id=platform-eng-eks-mcm/prometheus/node-exporter] -19:55:23.900 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/pushgateway"]: Destroying... [id=platform-eng-eks-mcm/prometheus/pushgateway] -19:55:23.900 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/prometheus"]: Destroying... [id=platform-eng-eks-mcm/prometheus/prometheus] -19:55:23.900 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/prometheus-config-reloader"]: Destroying... [id=platform-eng-eks-mcm/prometheus/prometheus-config-reloader] -19:55:23.900 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/alertmanager"]: Destroying... [id=platform-eng-eks-mcm/prometheus/alertmanager] -19:55:24.098 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/kube-state-metrics"]: Destruction complete after 0s -19:55:24.118 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/node-exporter"]: Destruction complete after 0s -19:55:24.118 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/pushgateway"]: Destruction complete after 0s -19:55:24.119 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/prometheus-config-reloader"]: Destruction complete after 0s -19:55:24.127 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/prometheus"]: Destruction complete after 0s -19:55:24.130 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/alertmanager"]: Destruction complete after 0s -19:55:33.534 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 1m30s elapsed] -19:55:33.716 STDOUT [eks-prometheus] terraform_current: kubernetes_namespace.ns: Still destroying... [id=prometheus, 10s elapsed] -19:55:37.441 STDOUT [eks-prometheus] terraform_current: kubernetes_namespace.ns: Destruction complete after 13s -19:55:37.679 STDOUT [eks-prometheus] terraform_current:  -19:55:37.679 STDOUT [eks-prometheus] terraform_current: Destroy complete! Resources: 20 destroyed. -19:55:37.679 STDOUT [eks-prometheus] terraform_current:  -19:55:43.539 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 1m40s elapsed] -19:55:53.540 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 1m50s elapsed] -19:56:03.540 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 2m0s elapsed] -19:56:13.541 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 2m10s elapsed] -19:56:17.700 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Destruction complete after 2m14s -19:56:17.989 STDOUT [eks-loki] terraform_current:  -19:56:17.989 STDOUT [eks-loki] terraform_current: Destroy complete! Resources: 40 destroyed. -19:56:17.989 STDOUT [eks-loki] terraform_current:  -19:56:23.209 STDOUT [eks-grafana] terraform_current: kubernetes_namespace.ns: Refreshing state... [id=grafana] -19:56:23.943 STDOUT [eks-grafana] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... -19:56:23.943 STDOUT [eks-grafana] terraform_current: module.images.data.aws_caller_identity.current: Reading... -19:56:23.943 STDOUT [eks-grafana] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... -19:56:23.943 STDOUT [eks-grafana] terraform_current: module.images.data.aws_region.current: Reading... -19:56:23.952 STDOUT [eks-grafana] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... -19:56:23.952 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zones.zones: Reading... -19:56:23.972 STDOUT [eks-grafana] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s -19:56:23.972 STDOUT [eks-grafana] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:56:23.989 STDOUT [eks-grafana] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:56:23.996 STDOUT [eks-grafana] terraform_current: module.images.data.aws_arn.current: Reading... -19:56:23.996 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/curl"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/curl] -19:56:23.996 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/busybox"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/busybox] -19:56:23.996 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/grafana"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/grafana] -19:56:23.999 STDOUT [eks-grafana] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa/matthew.c.morgan@census.gov] -19:56:24.091 STDOUT [eks-grafana] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 0s [id=us-gov-east-1] -19:56:24.110 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 0s [id=us-gov-east-1] -19:56:24.114 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... -19:56:24.114 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... -19:56:24.114 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... -19:56:24.177 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] -19:56:24.214 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] -19:56:24.237 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/curl"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/curl] -19:56:24.237 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/curl#7.85.0"]: Refreshing state... [id=3613762253667554703] -19:56:24.237 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/grafana"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/grafana] -19:56:24.237 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/grafana#11.1.5"]: Refreshing state... [id=7103419918200909936] -19:56:24.237 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/busybox"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/busybox] -19:56:24.237 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/busybox#1.31.1"]: Refreshing state... [id=708020167642995718] -19:56:24.259 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] -19:56:24.305 STDOUT [eks-grafana] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 0s [id=lab-dev-gov] -19:56:24.330 STDOUT [eks-grafana] terraform_current: helm_release.grafana: Refreshing state... [id=grafana] -19:56:29.797 STDOUT [eks-grafana] terraform_current: module.grafana_ingress.helm_release.ingress: Refreshing state... [id=grafana.grafana-8080] -19:56:31.234 STDOUT [eks-grafana] terraform_current: Terraform used the selected providers to generate the following execution -19:56:31.234 STDOUT [eks-grafana] terraform_current: plan. Resource actions are indicated with the following symbols: -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - destroy -19:56:31.234 STDOUT [eks-grafana] terraform_current: Terraform will perform the following actions: -19:56:31.234 STDOUT [eks-grafana] terraform_current:  # helm_release.grafana will be destroyed -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - resource "helm_release" "grafana" { -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - atomic = false -> null -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - chart = "grafana" -> null -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - cleanup_on_fail = false -> null -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - create_namespace = false -> null -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - dependency_update = false -> null -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - disable_crd_hooks = false -> null -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - disable_openapi_validation = false -> null -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - disable_webhooks = false -> null -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - force_update = false -> null -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - id = "grafana" -> null -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - lint = false -> null -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - max_history = 0 -> null -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - metadata = [ -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - { -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - app_version = "11.1.5" -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - chart = "grafana" -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - first_deployed = 1725665183 -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - last_deployed = 1725665183 -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - name = "grafana" -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - namespace = "grafana" -19:56:31.234 STDOUT [eks-grafana] terraform_current:  - notes = <<-EOT -19:56:31.235 STDOUT [eks-grafana] terraform_current:  1. Get your 'admin' user password by running: -19:56:31.235 STDOUT [eks-grafana] terraform_current:  -19:56:31.235 STDOUT [eks-grafana] terraform_current:  kubectl get secret --namespace grafana grafana -o jsonpath="{.data.admin-password}" | base64 --decode ; echo -19:56:31.235 STDOUT [eks-grafana] terraform_current:  -19:56:31.235 STDOUT [eks-grafana] terraform_current:  -19:56:31.235 STDOUT [eks-grafana] terraform_current:  2. The Grafana server can be accessed via port 80 on the following DNS name from within your cluster: -19:56:31.235 STDOUT [eks-grafana] terraform_current:  -19:56:31.235 STDOUT [eks-grafana] terraform_current:  grafana.grafana.svc.cluster.local -19:56:31.235 STDOUT [eks-grafana] terraform_current:  -19:56:31.235 STDOUT [eks-grafana] terraform_current:  Get the Grafana URL to visit by running these commands in the same shell: -19:56:31.235 STDOUT [eks-grafana] terraform_current:  export POD_NAME=$(kubectl get pods --namespace grafana -l "app.kubernetes.io/name=grafana,app.kubernetes.io/instance=grafana" -o jsonpath="{.items[0].metadata.name}") -19:56:31.235 STDOUT [eks-grafana] terraform_current:  kubectl --namespace grafana port-forward $POD_NAME 3000 -19:56:31.235 STDOUT [eks-grafana] terraform_current:  -19:56:31.235 STDOUT [eks-grafana] terraform_current:  3. Login with the password from step 1 and the username: admin -19:56:31.235 STDOUT [eks-grafana] terraform_current:  EOT -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - revision = 1 -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - values = jsonencode( -19:56:31.235 STDOUT [eks-grafana] terraform_current:  { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - downloadDashboardsImage = { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - registry = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/curl" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - tag = "7.85.0" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - global = { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - autoscaling = { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - enabled = true -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - serviceMonitor = { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - enabled = true -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - image = { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - registry = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/grafana" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - tag = "11.1.5" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - initChownData = { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - image = { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - registry = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/busybox" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - tag = "1.31.1" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - persistence = { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - enabled = true -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - storageClassName = "gp3-encrypted" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - testFramework = { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - enabled = false -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  ) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - version = "8.5.0" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  }, -19:56:31.235 STDOUT [eks-grafana] terraform_current:  ] -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "grafana" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - namespace = "grafana" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - pass_credentials = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - recreate_pods = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - render_subchart_notes = true -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - replace = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - repository = "https://grafana.github.io/helm-charts" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - reset_values = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - reuse_values = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - skip_crds = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - status = "deployed" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - timeout = 300 -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - verify = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - version = "8.5.0" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - wait = true -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - wait_for_jobs = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "downloadDashboardsImage.registry" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "downloadDashboardsImage.repository" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "platform-eng-eks-mcm/grafana/curl" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "downloadDashboardsImage.tag" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "7.85.0" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "global.autoscaling.enabled" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "true" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "global.serviceMonitor.enabled" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "true" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "image.registry" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "image.repository" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "platform-eng-eks-mcm/grafana/grafana" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "image.tag" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "11.1.5" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "initChownData.image.registry" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "initChownData.image.repository" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "platform-eng-eks-mcm/grafana/busybox" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "initChownData.image.tag" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "1.31.1" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "persistence.enabled" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "true" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "persistence.storageClassName" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "gp3-encrypted" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "testFramework.enabled" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "false" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # kubernetes_namespace.ns will be destroyed -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - resource "kubernetes_namespace" "ns" { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - id = "grafana" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - wait_for_default_service_account = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - metadata { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - annotations = {} -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - generation = 0 -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - labels = { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - "istio-injection" = "enabled" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "grafana" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - resource_version = "3886" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - uid = "9c3fd8db-1baa-4de6-8c42-dcb47984136a" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # module.grafana_ingress.helm_release.ingress will be destroyed -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - resource "helm_release" "ingress" { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - atomic = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - chart = "service-ingress" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - cleanup_on_fail = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - create_namespace = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - dependency_update = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - disable_crd_hooks = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - disable_openapi_validation = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - disable_webhooks = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - force_update = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - id = "grafana.grafana-8080" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - lint = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - max_history = 0 -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - metadata = [ -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - app_version = "1.0.0" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - chart = "service-ingress" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - first_deployed = 1725665222 -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - last_deployed = 1725665222 -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "grafana.grafana-8080" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - namespace = "grafana" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - revision = 1 -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - values = jsonencode( -19:56:31.235 STDOUT [eks-grafana] terraform_current:  { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - certificateIssuer = "clusterissuer" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - istioNamespace = "istio-system" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - publicDomain = "dev.lab.csp2.census.gov" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - publicHostname = "grafana" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - serviceHostname = "grafana.grafana.svc.cluster.local" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - servicePortNumber = 8080 -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  ) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - version = "1.0.0" -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  }, -19:56:31.235 STDOUT [eks-grafana] terraform_current:  ] -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "grafana.grafana-8080" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - namespace = "grafana" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - pass_credentials = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - recreate_pods = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - render_subchart_notes = true -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - replace = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - repository = ".terraform/modules/grafana_ingress/charts" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - reset_values = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - reuse_values = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - skip_crds = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - status = "deployed" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - timeout = 300 -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - verify = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - version = "1.0.0" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - wait = true -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - wait_for_jobs = false -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "certificateIssuer" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "clusterissuer" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "istioNamespace" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "istio-system" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "publicDomain" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "dev.lab.csp2.census.gov" -> null -19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - name = "publicHostname" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - value = "grafana" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - name = "serviceHostname" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - value = "grafana.grafana.svc.cluster.local" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - set { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - name = "servicePortNumber" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - value = "8080" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["grafana/busybox"] will be destroyed -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "platform-eng-eks-mcm/grafana/busybox" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - policy = jsonencode( -19:56:31.236 STDOUT [eks-grafana] terraform_current:  { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - rules = [ -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - action = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - type = "expire" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - description = "keep 5 images" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - rulePriority = 1 -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - selection = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - countNumber = 5 -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - countType = "imageCountMoreThan" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tagStatus = "any" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  }, -19:56:31.236 STDOUT [eks-grafana] terraform_current:  ] -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  ) -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - registry_id = "224384469011" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/busybox" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["grafana/curl"] will be destroyed -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "platform-eng-eks-mcm/grafana/curl" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - policy = jsonencode( -19:56:31.236 STDOUT [eks-grafana] terraform_current:  { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - rules = [ -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - action = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - type = "expire" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - description = "keep 5 images" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - rulePriority = 1 -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - selection = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - countNumber = 5 -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - countType = "imageCountMoreThan" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tagStatus = "any" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  }, -19:56:31.236 STDOUT [eks-grafana] terraform_current:  ] -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  ) -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - registry_id = "224384469011" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/curl" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["grafana/grafana"] will be destroyed -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "platform-eng-eks-mcm/grafana/grafana" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - policy = jsonencode( -19:56:31.236 STDOUT [eks-grafana] terraform_current:  { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - rules = [ -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - action = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - type = "expire" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - description = "keep 5 images" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - rulePriority = 1 -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - selection = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - countNumber = 5 -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - countType = "imageCountMoreThan" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tagStatus = "any" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  }, -19:56:31.236 STDOUT [eks-grafana] terraform_current:  ] -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  ) -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - registry_id = "224384469011" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/grafana" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.aws_ecr_repository.image_repos["grafana/busybox"] will be destroyed -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/grafana/busybox" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - force_delete = true -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "platform-eng-eks-mcm/grafana/busybox" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - name = "platform-eng-eks-mcm/grafana/busybox" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - registry_id = "224384469011" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/busybox" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tags = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Environment" = "application" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/busybox" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:created_by" = "terraform" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tags_all = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Environment" = "application" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/busybox" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:created_by" = "terraform" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - encryption_configuration { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - encryption_type = "KMS" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - image_scanning_configuration { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - scan_on_push = true -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.aws_ecr_repository.image_repos["grafana/curl"] will be destroyed -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/grafana/curl" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - force_delete = true -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "platform-eng-eks-mcm/grafana/curl" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - name = "platform-eng-eks-mcm/grafana/curl" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - registry_id = "224384469011" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/curl" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tags = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Environment" = "application" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/curl" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:created_by" = "terraform" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tags_all = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Environment" = "application" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/curl" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:created_by" = "terraform" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - encryption_configuration { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - encryption_type = "KMS" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - image_scanning_configuration { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - scan_on_push = true -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.aws_ecr_repository.image_repos["grafana/grafana"] will be destroyed -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/grafana/grafana" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - force_delete = true -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "platform-eng-eks-mcm/grafana/grafana" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - name = "platform-eng-eks-mcm/grafana/grafana" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - registry_id = "224384469011" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/grafana" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tags = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Environment" = "application" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/grafana" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:created_by" = "terraform" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tags_all = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Environment" = "application" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/grafana" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:created_by" = "terraform" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - encryption_configuration { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - encryption_type = "KMS" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - image_scanning_configuration { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - scan_on_push = true -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.null_resource.copy_images["grafana/busybox#1.31.1"] will be destroyed -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "null_resource" "copy_images" { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "708020167642995718" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - triggers = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "region" = "us-gov-east-1" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.null_resource.copy_images["grafana/curl#7.85.0"] will be destroyed -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "null_resource" "copy_images" { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "3613762253667554703" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - triggers = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "region" = "us-gov-east-1" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.null_resource.copy_images["grafana/grafana#11.1.5"] will be destroyed -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "null_resource" "copy_images" { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "7103419918200909936" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - triggers = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "region" = "us-gov-east-1" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -19:56:31.236 STDOUT [eks-grafana] terraform_current: Plan: 0 to add, 0 to change, 12 to destroy. -19:56:31.236 STDOUT [eks-grafana] terraform_current:  -19:56:31.236 STDOUT [eks-grafana] terraform_current: Changes to Outputs: -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - internal_endpoint = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - hostname = "grafana.grafana.svc.cluster.local" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - port_number = "80" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - url = "https://grafana.grafana.svc.cluster.local:80/" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - module_name = "tfmod-grafana" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - module_version = "0.0.2" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - namespace = "grafana" -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - public_endpoint = { -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - hostname = "grafana.dev.lab.csp2.census.gov" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - port_number = "80" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - url = "https://grafana.dev.lab.csp2.census.gov:80/" -19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null -19:56:31.236 STDOUT [eks-grafana] terraform_current:  - secret_name = "grafana" -> null -19:56:31.762 STDOUT [eks-grafana] terraform_current: module.grafana_ingress.helm_release.ingress: Destroying... [id=grafana.grafana-8080] -19:56:33.468 STDOUT [eks-grafana] terraform_current: module.grafana_ingress.helm_release.ingress: Destruction complete after 1s -19:56:33.479 STDOUT [eks-grafana] terraform_current: helm_release.grafana: Destroying... [id=grafana] -19:56:41.677 STDOUT [eks-grafana] terraform_current: helm_release.grafana: Destruction complete after 9s -19:56:41.687 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/busybox#1.31.1"]: Destroying... [id=708020167642995718] -19:56:41.687 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/curl#7.85.0"]: Destroying... [id=3613762253667554703] -19:56:41.687 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/grafana#11.1.5"]: Destroying... [id=7103419918200909936] -19:56:41.703 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/busybox"]: Destroying... [id=platform-eng-eks-mcm/grafana/busybox] -19:56:41.710 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/grafana#11.1.5"]: Destruction complete after 0s -19:56:41.710 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/curl#7.85.0"]: Destruction complete after 0s -19:56:41.710 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/busybox#1.31.1"]: Destruction complete after 0s -19:56:41.711 STDOUT [eks-grafana] terraform_current: kubernetes_namespace.ns: Destroying... [id=grafana] -19:56:41.716 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/curl"]: Destroying... [id=platform-eng-eks-mcm/grafana/curl] -19:56:41.716 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/grafana"]: Destroying... [id=platform-eng-eks-mcm/grafana/grafana] -19:56:41.845 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/busybox"]: Destruction complete after 0s -19:56:41.877 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/curl"]: Destruction complete after 0s -19:56:41.880 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/grafana"]: Destruction complete after 0s -19:56:41.886 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/busybox"]: Destroying... [id=platform-eng-eks-mcm/grafana/busybox] -19:56:41.886 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/grafana"]: Destroying... [id=platform-eng-eks-mcm/grafana/grafana] -19:56:41.886 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/curl"]: Destroying... [id=platform-eng-eks-mcm/grafana/curl] -19:56:42.087 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/grafana"]: Destruction complete after 0s -19:56:42.094 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/busybox"]: Destruction complete after 0s -19:56:42.097 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/curl"]: Destruction complete after 0s -19:56:48.990 STDOUT [eks-grafana] terraform_current: kubernetes_namespace.ns: Destruction complete after 7s -19:56:48.998 STDOUT [eks-grafana] terraform_current:  -19:56:48.998 STDOUT [eks-grafana] terraform_current: Destroy complete! Resources: 12 destroyed. -19:56:48.998 STDOUT [eks-grafana] terraform_current:  -19:56:57.191 STDOUT [eks-istio] terraform_current: data.kubernetes_service.apiserver: Reading... -19:56:57.191 STDOUT [eks-istio] terraform_current: kubernetes_namespace.ns: Refreshing state... [id=istio-system] -19:56:58.092 STDOUT [eks-config] terraform_current: kubernetes_namespace.operators: Refreshing state... [id=operators] -19:56:58.095 STDOUT [eks-config] terraform_current: data.http.cluster_roles["eks-console-restricted-access"]: Reading... -19:56:58.095 STDOUT [eks-config] terraform_current: data.http.cluster_roles["eks-console-full-access"]: Reading... -19:56:58.119 STDOUT [eks-istio] terraform_current: data.kubernetes_service.apiserver: Read complete after 1s [id=default/kubernetes] -19:56:58.131 STDOUT [eks-istio] terraform_current: module.images.data.aws_region.current: Reading... -19:56:58.131 STDOUT [eks-istio] terraform_current: module.images.data.aws_caller_identity.current: Reading... -19:56:58.131 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zones.zones: Reading... -19:56:58.131 STDOUT [eks-istio] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... -19:56:58.131 STDOUT [eks-istio] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... -19:56:58.131 STDOUT [eks-istio] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... -19:56:58.144 STDOUT [eks-istio] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:56:58.156 STDOUT [eks-istio] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s -19:56:58.163 STDOUT [eks-istio] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:56:58.174 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_repository.image_repos["istio/proxyv2"]: Refreshing state... [id=platform-eng-eks-mcm/istio/proxyv2] -19:56:58.174 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_repository.image_repos["istio/pilot"]: Refreshing state... [id=platform-eng-eks-mcm/istio/pilot] -19:56:58.174 STDOUT [eks-istio] terraform_current: module.images.data.aws_arn.current: Reading... -19:56:58.174 STDOUT [eks-istio] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -19:56:58.262 STDOUT [eks-istio] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 0s [id=us-gov-east-1] -19:56:58.291 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 0s [id=us-gov-east-1] -19:56:58.303 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... -19:56:58.303 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... -19:56:58.303 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... -19:56:58.357 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] -19:56:58.405 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] -19:56:58.436 STDOUT [eks-config] terraform_current: data.http.cluster_roles["eks-console-restricted-access"]: Read complete after 0s [id=https://s3.us-west-2.amazonaws.com/amazon-eks/docs/eks-console-restricted-access.yaml] -19:56:58.437 STDOUT [eks-config] terraform_current: data.http.cluster_roles["eks-console-full-access"]: Read complete after 0s [id=https://s3.us-west-2.amazonaws.com/amazon-eks/docs/eks-console-full-access.yaml] -19:56:58.450 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] -19:56:58.471 STDOUT [eks-config] terraform_current: data.kubectl_file_documents.access_documents["eks-console-full-access"]: Reading... -19:56:58.471 STDOUT [eks-istio] terraform_current: module.images.null_resource.copy_images["istio/pilot#1.22.1"]: Refreshing state... [id=6525359393711592378] -19:56:58.471 STDOUT [eks-istio] terraform_current: module.images.null_resource.copy_images["istio/proxyv2#1.22.1"]: Refreshing state... [id=4423650552927619903] -19:56:58.471 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["istio/proxyv2"]: Refreshing state... [id=platform-eng-eks-mcm/istio/proxyv2] -19:56:58.504 STDOUT [eks-config] terraform_current: data.kubectl_file_documents.access_documents["eks-console-full-access"]: Read complete after 0s [id=956b80201e25dc34091aeb0fecdb622c338e3317d8ed6a4ec8729d40b2d57696] -19:56:58.504 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["istio/pilot"]: Refreshing state... [id=platform-eng-eks-mcm/istio/pilot] -19:56:58.504 STDOUT [eks-istio] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 0s [id=lab-dev-gov] -19:56:58.505 STDOUT [eks-config] terraform_current: kubectl_manifest.deploy_cluster_roles[0]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/eks-console-dashboard-full-access-binding] -19:56:58.505 STDOUT [eks-config] terraform_current: kubectl_manifest.deploy_cluster_roles[1]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/eks-console-dashboard-full-access-clusterrole] -19:56:58.580 STDOUT [eks-istio] terraform_current: helm_release.base: Refreshing state... [id=istio-base] -19:56:59.005 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zones.zones: Reading... -19:56:59.005 STDOUT [eks-config] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... -19:56:59.005 STDOUT [eks-config] terraform_current: module.images.data.aws_region.current: Reading... -19:56:59.005 STDOUT [eks-config] terraform_current: module.images.data.aws_caller_identity.current: Reading... -19:56:59.005 STDOUT [eks-config] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... -19:56:59.005 STDOUT [eks-config] terraform_current: data.aws_ebs_default_kms_key.current: Reading... -19:56:59.005 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.data.aws_security_group.sg["sg-0117da2c13b4caf21"]: Reading... -19:56:59.029 STDOUT [eks-config] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:56:59.041 STDOUT [eks-config] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... -19:56:59.072 STDOUT [eks-config] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s -19:56:59.072 STDOUT [eks-config] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:56:59.072 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_kms_key.key[0]: Refreshing state... [id=815b2daf-8e10-42cd-a038-00424726df2e] -19:56:59.084 STDOUT [eks-config] terraform_current: module.images.data.aws_arn.current: Reading... -19:56:59.087 STDOUT [eks-config] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -19:56:59.124 STDOUT [eks-config] terraform_current: module.images.aws_ecr_repository.image_repos["kubectl"]: Refreshing state... [id=platform-eng-eks-mcm/kubectl] -19:56:59.181 STDOUT [eks-config] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 0s [id=us-gov-east-1] -19:56:59.192 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 0s [id=us-gov-east-1] -19:56:59.203 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... -19:56:59.203 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... -19:56:59.214 STDOUT [eks-config] terraform_current: data.aws_ebs_default_kms_key.current: Read complete after 0s [id=us-gov-east-1] -19:56:59.225 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... -19:56:59.236 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.data.aws_security_group.sg["sg-0117da2c13b4caf21"]: Read complete after 0s [id=sg-0117da2c13b4caf21] -19:56:59.258 STDOUT [eks-config] terraform_current: data.aws_kms_key.ebs_key: Reading... -19:56:59.266 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] -19:56:59.278 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] -19:56:59.300 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] -19:56:59.320 STDOUT [eks-config] terraform_current: data.aws_kms_key.ebs_key: Read complete after 0s [id=e0543b2b-c3f1-49a5-bfa7-87eec859be03] -19:56:59.331 STDOUT [eks-config] terraform_current: kubernetes_storage_class.gp3_encrypted: Refreshing state... [id=gp3-encrypted] -19:56:59.331 STDOUT [eks-config] terraform_current: kubernetes_storage_class.ebs_encrypted: Refreshing state... [id=gp2-encrypted] -19:56:59.342 STDOUT [eks-config] terraform_current: module.images.null_resource.copy_images["kubectl#1.30.4"]: Refreshing state... [id=1086192723359257187] -19:56:59.342 STDOUT [eks-config] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["kubectl"]: Refreshing state... [id=platform-eng-eks-mcm/kubectl] -19:56:59.395 STDOUT [eks-config] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 0s [id=lab-dev-gov] -19:56:59.396 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_efs_file_system.fs: Refreshing state... [id=fs-01737a6222633f706] -19:56:59.396 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_kms_alias.key[0]: Refreshing state... [id=alias/k-kms-platform-eng-eks-mcm] -19:56:59.671 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[1]: Refreshing state... [id=fsmt-06c0f6fe90e4a1ddc] -19:56:59.671 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[2]: Refreshing state... [id=fsmt-0eb95a734315675b7] -19:56:59.672 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[0]: Refreshing state... [id=fsmt-029ae74adf10349bb] -19:57:00.009 STDOUT [eks-config] terraform_current: kubernetes_storage_class.efs_sc: Refreshing state... [id=efs] -19:57:01.419 STDOUT [eks-istio] terraform_current: helm_release.istiod: Refreshing state... [id=istiod] -19:57:01.760 STDOUT [eks-config] terraform_current: Terraform used the selected providers to generate the following execution -19:57:01.760 STDOUT [eks-config] terraform_current: plan. Resource actions are indicated with the following symbols: -19:57:01.760 STDOUT [eks-config] terraform_current:  - destroy -19:57:01.760 STDOUT [eks-config] terraform_current: Terraform will perform the following actions: -19:57:01.760 STDOUT [eks-config] terraform_current:  # kubectl_manifest.deploy_cluster_roles[0] will be destroyed -19:57:01.760 STDOUT [eks-config] terraform_current:  - resource "kubectl_manifest" "deploy_cluster_roles" { -19:57:01.760 STDOUT [eks-config] terraform_current:  - api_version = "rbac.authorization.k8s.io/v1" -> null -19:57:01.760 STDOUT [eks-config] terraform_current:  - apply_only = false -> null -19:57:01.760 STDOUT [eks-config] terraform_current:  - force_conflicts = false -> null -19:57:01.760 STDOUT [eks-config] terraform_current:  - force_new = false -> null -19:57:01.760 STDOUT [eks-config] terraform_current:  - id = "/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/eks-console-dashboard-full-access-binding" -> null -19:57:01.760 STDOUT [eks-config] terraform_current:  - kind = "ClusterRoleBinding" -> null -19:57:01.760 STDOUT [eks-config] terraform_current:  - live_manifest_incluster = (sensitive value) -> null -19:57:01.760 STDOUT [eks-config] terraform_current:  - live_uid = "7541edf2-80f3-444d-9d20-cfec8e83ec82" -> null -19:57:01.760 STDOUT [eks-config] terraform_current:  - name = "eks-console-dashboard-full-access-binding" -> null -19:57:01.760 STDOUT [eks-config] terraform_current:  - server_side_apply = false -> null -19:57:01.760 STDOUT [eks-config] terraform_current:  - uid = "7541edf2-80f3-444d-9d20-cfec8e83ec82" -> null -19:57:01.760 STDOUT [eks-config] terraform_current:  - validate_schema = true -> null -19:57:01.760 STDOUT [eks-config] terraform_current:  - wait_for_rollout = true -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - yaml_body = (sensitive value) -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - yaml_body_parsed = <<-EOT -19:57:01.761 STDOUT [eks-config] terraform_current:  apiVersion: rbac.authorization.k8s.io/v1 -19:57:01.761 STDOUT [eks-config] terraform_current:  kind: ClusterRoleBinding -19:57:01.761 STDOUT [eks-config] terraform_current:  metadata: -19:57:01.761 STDOUT [eks-config] terraform_current:  name: eks-console-dashboard-full-access-binding -19:57:01.761 STDOUT [eks-config] terraform_current:  roleRef: -19:57:01.761 STDOUT [eks-config] terraform_current:  apiGroup: rbac.authorization.k8s.io -19:57:01.761 STDOUT [eks-config] terraform_current:  kind: ClusterRole -19:57:01.761 STDOUT [eks-config] terraform_current:  name: eks-console-dashboard-full-access-clusterrole -19:57:01.761 STDOUT [eks-config] terraform_current:  subjects: -19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroup: rbac.authorization.k8s.io -19:57:01.761 STDOUT [eks-config] terraform_current:  kind: Group -19:57:01.761 STDOUT [eks-config] terraform_current:  name: eks-console-dashboard-full-access-group -19:57:01.761 STDOUT [eks-config] terraform_current:  EOT -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - yaml_incluster = (sensitive value) -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  # kubectl_manifest.deploy_cluster_roles[1] will be destroyed -19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "kubectl_manifest" "deploy_cluster_roles" { -19:57:01.761 STDOUT [eks-config] terraform_current:  - api_version = "rbac.authorization.k8s.io/v1" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - apply_only = false -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - force_conflicts = false -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - force_new = false -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "/apis/rbac.authorization.k8s.io/v1/clusterroles/eks-console-dashboard-full-access-clusterrole" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - kind = "ClusterRole" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - live_manifest_incluster = (sensitive value) -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - live_uid = "131c1dda-c901-4b0a-829e-d1553480694c" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - name = "eks-console-dashboard-full-access-clusterrole" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - server_side_apply = false -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - uid = "131c1dda-c901-4b0a-829e-d1553480694c" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - validate_schema = true -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - wait_for_rollout = true -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - yaml_body = (sensitive value) -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - yaml_body_parsed = <<-EOT -19:57:01.761 STDOUT [eks-config] terraform_current:  apiVersion: rbac.authorization.k8s.io/v1 -19:57:01.761 STDOUT [eks-config] terraform_current:  kind: ClusterRole -19:57:01.761 STDOUT [eks-config] terraform_current:  metadata: -19:57:01.761 STDOUT [eks-config] terraform_current:  name: eks-console-dashboard-full-access-clusterrole -19:57:01.761 STDOUT [eks-config] terraform_current:  rules: -19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: -19:57:01.761 STDOUT [eks-config] terraform_current:  - "" -19:57:01.761 STDOUT [eks-config] terraform_current:  resources: -19:57:01.761 STDOUT [eks-config] terraform_current:  - nodes -19:57:01.761 STDOUT [eks-config] terraform_current:  - namespaces -19:57:01.761 STDOUT [eks-config] terraform_current:  - pods -19:57:01.761 STDOUT [eks-config] terraform_current:  - configmaps -19:57:01.761 STDOUT [eks-config] terraform_current:  - endpoints -19:57:01.761 STDOUT [eks-config] terraform_current:  - events -19:57:01.761 STDOUT [eks-config] terraform_current:  - limitranges -19:57:01.761 STDOUT [eks-config] terraform_current:  - persistentvolumeclaims -19:57:01.761 STDOUT [eks-config] terraform_current:  - podtemplates -19:57:01.761 STDOUT [eks-config] terraform_current:  - replicationcontrollers -19:57:01.761 STDOUT [eks-config] terraform_current:  - resourcequotas -19:57:01.761 STDOUT [eks-config] terraform_current:  - secrets -19:57:01.761 STDOUT [eks-config] terraform_current:  - serviceaccounts -19:57:01.761 STDOUT [eks-config] terraform_current:  - services -19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: -19:57:01.761 STDOUT [eks-config] terraform_current:  - get -19:57:01.761 STDOUT [eks-config] terraform_current:  - list -19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: -19:57:01.761 STDOUT [eks-config] terraform_current:  - apps -19:57:01.761 STDOUT [eks-config] terraform_current:  resources: -19:57:01.761 STDOUT [eks-config] terraform_current:  - deployments -19:57:01.761 STDOUT [eks-config] terraform_current:  - daemonsets -19:57:01.761 STDOUT [eks-config] terraform_current:  - statefulsets -19:57:01.761 STDOUT [eks-config] terraform_current:  - replicasets -19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: -19:57:01.761 STDOUT [eks-config] terraform_current:  - get -19:57:01.761 STDOUT [eks-config] terraform_current:  - list -19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: -19:57:01.761 STDOUT [eks-config] terraform_current:  - batch -19:57:01.761 STDOUT [eks-config] terraform_current:  resources: -19:57:01.761 STDOUT [eks-config] terraform_current:  - jobs -19:57:01.761 STDOUT [eks-config] terraform_current:  - cronjobs -19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: -19:57:01.761 STDOUT [eks-config] terraform_current:  - get -19:57:01.761 STDOUT [eks-config] terraform_current:  - list -19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: -19:57:01.761 STDOUT [eks-config] terraform_current:  - coordination.k8s.io -19:57:01.761 STDOUT [eks-config] terraform_current:  resources: -19:57:01.761 STDOUT [eks-config] terraform_current:  - leases -19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: -19:57:01.761 STDOUT [eks-config] terraform_current:  - get -19:57:01.761 STDOUT [eks-config] terraform_current:  - list -19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: -19:57:01.761 STDOUT [eks-config] terraform_current:  - discovery.k8s.io -19:57:01.761 STDOUT [eks-config] terraform_current:  resources: -19:57:01.761 STDOUT [eks-config] terraform_current:  - endpointslices -19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: -19:57:01.761 STDOUT [eks-config] terraform_current:  - get -19:57:01.761 STDOUT [eks-config] terraform_current:  - list -19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: -19:57:01.761 STDOUT [eks-config] terraform_current:  - events.k8s.io -19:57:01.761 STDOUT [eks-config] terraform_current:  resources: -19:57:01.761 STDOUT [eks-config] terraform_current:  - events -19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: -19:57:01.761 STDOUT [eks-config] terraform_current:  - get -19:57:01.761 STDOUT [eks-config] terraform_current:  - list -19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: -19:57:01.761 STDOUT [eks-config] terraform_current:  - extensions -19:57:01.761 STDOUT [eks-config] terraform_current:  resources: -19:57:01.761 STDOUT [eks-config] terraform_current:  - daemonsets -19:57:01.761 STDOUT [eks-config] terraform_current:  - deployments -19:57:01.761 STDOUT [eks-config] terraform_current:  - ingresses -19:57:01.761 STDOUT [eks-config] terraform_current:  - networkpolicies -19:57:01.761 STDOUT [eks-config] terraform_current:  - replicasets -19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: -19:57:01.761 STDOUT [eks-config] terraform_current:  - get -19:57:01.761 STDOUT [eks-config] terraform_current:  - list -19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: -19:57:01.761 STDOUT [eks-config] terraform_current:  - networking.k8s.io -19:57:01.761 STDOUT [eks-config] terraform_current:  resources: -19:57:01.761 STDOUT [eks-config] terraform_current:  - ingresses -19:57:01.761 STDOUT [eks-config] terraform_current:  - networkpolicies -19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: -19:57:01.761 STDOUT [eks-config] terraform_current:  - get -19:57:01.761 STDOUT [eks-config] terraform_current:  - list -19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: -19:57:01.761 STDOUT [eks-config] terraform_current:  - policy -19:57:01.761 STDOUT [eks-config] terraform_current:  resources: -19:57:01.761 STDOUT [eks-config] terraform_current:  - poddisruptionbudgets -19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: -19:57:01.761 STDOUT [eks-config] terraform_current:  - get -19:57:01.761 STDOUT [eks-config] terraform_current:  - list -19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: -19:57:01.761 STDOUT [eks-config] terraform_current:  - rbac.authorization.k8s.io -19:57:01.761 STDOUT [eks-config] terraform_current:  resources: -19:57:01.761 STDOUT [eks-config] terraform_current:  - rolebindings -19:57:01.761 STDOUT [eks-config] terraform_current:  - roles -19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: -19:57:01.761 STDOUT [eks-config] terraform_current:  - get -19:57:01.761 STDOUT [eks-config] terraform_current:  - list -19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: -19:57:01.761 STDOUT [eks-config] terraform_current:  - storage.k8s.io -19:57:01.761 STDOUT [eks-config] terraform_current:  resources: -19:57:01.761 STDOUT [eks-config] terraform_current:  - csistoragecapacities -19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: -19:57:01.761 STDOUT [eks-config] terraform_current:  - get -19:57:01.761 STDOUT [eks-config] terraform_current:  - list -19:57:01.761 STDOUT [eks-config] terraform_current:  EOT -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - yaml_incluster = (sensitive value) -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  # kubernetes_namespace.operators will be destroyed -19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "kubernetes_namespace" "operators" { -19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "operators" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - wait_for_default_service_account = false -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - metadata { -19:57:01.761 STDOUT [eks-config] terraform_current:  - annotations = {} -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - generation = 0 -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - labels = {} -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - name = "operators" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - resource_version = "2519" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - uid = "0ffec718-19a2-4d34-897f-09cb62301588" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  # (1 unchanged attribute hidden) -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  # kubernetes_storage_class.ebs_encrypted will be destroyed -19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "kubernetes_storage_class" "ebs_encrypted" { -19:57:01.761 STDOUT [eks-config] terraform_current:  - allow_volume_expansion = true -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "gp2-encrypted" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - mount_options = [] -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - parameters = { -19:57:01.761 STDOUT [eks-config] terraform_current:  - "encrypted" = "true" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "fsType" = "ext4" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "kmsKeyId" = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/e0543b2b-c3f1-49a5-bfa7-87eec859be03" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "type" = "gp2" -19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - reclaim_policy = "Delete" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - storage_provisioner = "kubernetes.io/aws-ebs" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - volume_binding_mode = "Immediate" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - metadata { -19:57:01.761 STDOUT [eks-config] terraform_current:  - annotations = { -19:57:01.761 STDOUT [eks-config] terraform_current:  - "storageclass.kubernetes.io/is-default-class" = "false" -19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - generation = 0 -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - labels = {} -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - name = "gp2-encrypted" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - resource_version = "2517" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - uid = "e912e5b9-930d-4a9f-abad-8e8011c95a68" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  # (1 unchanged attribute hidden) -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  # kubernetes_storage_class.efs_sc will be destroyed -19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "kubernetes_storage_class" "efs_sc" { -19:57:01.761 STDOUT [eks-config] terraform_current:  - allow_volume_expansion = true -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "efs" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - mount_options = [ -19:57:01.761 STDOUT [eks-config] terraform_current:  - "tls", -19:57:01.761 STDOUT [eks-config] terraform_current:  ] -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - parameters = { -19:57:01.761 STDOUT [eks-config] terraform_current:  - "directoryPerms" = "700" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "fileSystemId" = "fs-01737a6222633f706" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "provisioningMode" = "efs-ap" -19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - reclaim_policy = "Delete" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - storage_provisioner = "efs.csi.aws.com" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - volume_binding_mode = "Immediate" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - metadata { -19:57:01.761 STDOUT [eks-config] terraform_current:  - annotations = {} -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - generation = 0 -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - labels = {} -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - name = "efs" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - resource_version = "3159" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - uid = "49079b9c-cd8c-4e44-b32a-104d94e0de03" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  # (1 unchanged attribute hidden) -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  # kubernetes_storage_class.gp3_encrypted will be destroyed -19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "kubernetes_storage_class" "gp3_encrypted" { -19:57:01.761 STDOUT [eks-config] terraform_current:  - allow_volume_expansion = true -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "gp3-encrypted" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - mount_options = [] -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - parameters = { -19:57:01.761 STDOUT [eks-config] terraform_current:  - "encrypted" = "true" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "fsType" = "ext4" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "kmsKeyId" = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/e0543b2b-c3f1-49a5-bfa7-87eec859be03" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "type" = "gp3" -19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - reclaim_policy = "Delete" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - storage_provisioner = "ebs.csi.aws.com" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - volume_binding_mode = "Immediate" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - metadata { -19:57:01.761 STDOUT [eks-config] terraform_current:  - annotations = { -19:57:01.761 STDOUT [eks-config] terraform_current:  - "storageclass.kubernetes.io/is-default-class" = "true" -19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - generation = 0 -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - labels = {} -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - name = "gp3-encrypted" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - resource_version = "2518" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - uid = "afec93df-4b89-4fc8-9bcc-dd00dbd058bd" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  # (1 unchanged attribute hidden) -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["kubectl"] will be destroyed -19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "platform-eng-eks-mcm/kubectl" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - policy = jsonencode( -19:57:01.761 STDOUT [eks-config] terraform_current:  { -19:57:01.761 STDOUT [eks-config] terraform_current:  - rules = [ -19:57:01.761 STDOUT [eks-config] terraform_current:  - { -19:57:01.761 STDOUT [eks-config] terraform_current:  - action = { -19:57:01.761 STDOUT [eks-config] terraform_current:  - type = "expire" -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  - description = "keep 5 images" -19:57:01.761 STDOUT [eks-config] terraform_current:  - rulePriority = 1 -19:57:01.761 STDOUT [eks-config] terraform_current:  - selection = { -19:57:01.761 STDOUT [eks-config] terraform_current:  - countNumber = 5 -19:57:01.761 STDOUT [eks-config] terraform_current:  - countType = "imageCountMoreThan" -19:57:01.761 STDOUT [eks-config] terraform_current:  - tagStatus = "any" -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  }, -19:57:01.761 STDOUT [eks-config] terraform_current:  ] -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  ) -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - registry_id = "224384469011" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - repository = "platform-eng-eks-mcm/kubectl" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  # module.images.aws_ecr_repository.image_repos["kubectl"] will be destroyed -19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:57:01.761 STDOUT [eks-config] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/kubectl" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - force_delete = true -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "platform-eng-eks-mcm/kubectl" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - name = "platform-eng-eks-mcm/kubectl" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - registry_id = "224384469011" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/kubectl" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - tags = { -19:57:01.761 STDOUT [eks-config] terraform_current:  - "Environment" = "application" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/kubectl" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "boc:created_by" = "terraform" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - tags_all = { -19:57:01.761 STDOUT [eks-config] terraform_current:  - "Environment" = "application" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/kubectl" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "Organization" = "census:ocio:csvd" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "Terraform" = "true" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "Terragrunt" = "true" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "boc:created_by" = "terraform" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:57:01.761 STDOUT [eks-config] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - encryption_configuration { -19:57:01.761 STDOUT [eks-config] terraform_current:  - encryption_type = "KMS" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  - image_scanning_configuration { -19:57:01.761 STDOUT [eks-config] terraform_current:  - scan_on_push = true -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.761 STDOUT [eks-config] terraform_current:  # module.images.null_resource.copy_images["kubectl#1.30.4"] will be destroyed -19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "null_resource" "copy_images" { -19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "1086192723359257187" -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  - triggers = { -19:57:01.761 STDOUT [eks-config] terraform_current:  - "region" = "us-gov-east-1" -19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null -19:57:01.761 STDOUT [eks-config] terraform_current:  } -19:57:01.762 STDOUT [eks-config] terraform_current:  # module.efs.module.efs_fs.aws_efs_file_system.fs will be destroyed -19:57:01.762 STDOUT [eks-config] terraform_current:  - resource "aws_efs_file_system" "fs" { -19:57:01.762 STDOUT [eks-config] terraform_current:  - arn = "arn:aws-us-gov:elasticfilesystem:us-gov-east-1:224384469011:file-system/fs-01737a6222633f706" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - creation_token = "v-efs-platform-eng-eks-mcm" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - dns_name = "fs-01737a6222633f706.efs.us-gov-east-1.amazonaws.com" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - encrypted = true -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - id = "fs-01737a6222633f706" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - kms_key_id = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/815b2daf-8e10-42cd-a038-00424726df2e" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - name = "v-efs-platform-eng-eks-mcm" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - number_of_mount_targets = 3 -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - owner_id = "224384469011" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - performance_mode = "generalPurpose" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - provisioned_throughput_in_mibps = 0 -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - size_in_bytes = [ -19:57:01.762 STDOUT [eks-config] terraform_current:  - { -19:57:01.762 STDOUT [eks-config] terraform_current:  - value = 6144 -19:57:01.762 STDOUT [eks-config] terraform_current:  - value_in_ia = 0 -19:57:01.762 STDOUT [eks-config] terraform_current:  - value_in_standard = 6144 -19:57:01.762 STDOUT [eks-config] terraform_current:  }, -19:57:01.762 STDOUT [eks-config] terraform_current:  ] -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - tags = { -19:57:01.762 STDOUT [eks-config] terraform_current:  - "CostAllocation" = "census:csvd:platformbaseline" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Environment" = "dev" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Name" = "v-efs-platform-eng-eks-mcm" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:created_by" = "terraform" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:tf_module_version" = "0.0.3" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "efs.csi.aws.com/cluster" = "true" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:57:01.762 STDOUT [eks-config] terraform_current:  } -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - tags_all = { -19:57:01.762 STDOUT [eks-config] terraform_current:  - "CostAllocation" = "census:csvd:platformbaseline" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Environment" = "dev" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Name" = "v-efs-platform-eng-eks-mcm" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Organization" = "census:ocio:csvd" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Terraform" = "true" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Terragrunt" = "true" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:created_by" = "terraform" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:tf_module_version" = "0.0.3" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "efs.csi.aws.com/cluster" = "true" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:57:01.762 STDOUT [eks-config] terraform_current:  } -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - throughput_mode = "bursting" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  # (2 unchanged attributes hidden) -19:57:01.762 STDOUT [eks-config] terraform_current:  - protection { -19:57:01.762 STDOUT [eks-config] terraform_current:  - replication_overwrite = "ENABLED" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  } -19:57:01.762 STDOUT [eks-config] terraform_current:  } -19:57:01.762 STDOUT [eks-config] terraform_current:  # module.efs.module.efs_fs.aws_kms_alias.key[0] will be destroyed -19:57:01.762 STDOUT [eks-config] terraform_current:  - resource "aws_kms_alias" "key" { -19:57:01.762 STDOUT [eks-config] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:alias/k-kms-platform-eng-eks-mcm" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - id = "alias/k-kms-platform-eng-eks-mcm" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - name = "alias/k-kms-platform-eng-eks-mcm" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - target_key_arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/815b2daf-8e10-42cd-a038-00424726df2e" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - target_key_id = "815b2daf-8e10-42cd-a038-00424726df2e" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  # (1 unchanged attribute hidden) -19:57:01.762 STDOUT [eks-config] terraform_current:  } -19:57:01.762 STDOUT [eks-config] terraform_current:  # module.efs.module.efs_fs.aws_kms_key.key[0] will be destroyed -19:57:01.762 STDOUT [eks-config] terraform_current:  - resource "aws_kms_key" "key" { -19:57:01.762 STDOUT [eks-config] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/815b2daf-8e10-42cd-a038-00424726df2e" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - bypass_policy_lockout_safety_check = false -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - customer_master_key_spec = "SYMMETRIC_DEFAULT" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - description = "KMS CMK for EFS v-efs-platform-eng-eks-mcm" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - enable_key_rotation = true -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - id = "815b2daf-8e10-42cd-a038-00424726df2e" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - is_enabled = true -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - key_id = "815b2daf-8e10-42cd-a038-00424726df2e" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - key_usage = "ENCRYPT_DECRYPT" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - multi_region = false -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - policy = jsonencode( -19:57:01.762 STDOUT [eks-config] terraform_current:  { -19:57:01.762 STDOUT [eks-config] terraform_current:  - Id = "key-default-1" -19:57:01.762 STDOUT [eks-config] terraform_current:  - Statement = [ -19:57:01.762 STDOUT [eks-config] terraform_current:  - { -19:57:01.762 STDOUT [eks-config] terraform_current:  - Action = "kms:*" -19:57:01.762 STDOUT [eks-config] terraform_current:  - Effect = "Allow" -19:57:01.762 STDOUT [eks-config] terraform_current:  - Principal = { -19:57:01.762 STDOUT [eks-config] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:root" -19:57:01.762 STDOUT [eks-config] terraform_current:  } -19:57:01.762 STDOUT [eks-config] terraform_current:  - Resource = "*" -19:57:01.762 STDOUT [eks-config] terraform_current:  - Sid = "Enable IAM User Permissions" -19:57:01.762 STDOUT [eks-config] terraform_current:  }, -19:57:01.762 STDOUT [eks-config] terraform_current:  ] -19:57:01.762 STDOUT [eks-config] terraform_current:  - Version = "2012-10-17" -19:57:01.762 STDOUT [eks-config] terraform_current:  } -19:57:01.762 STDOUT [eks-config] terraform_current:  ) -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - rotation_period_in_days = 365 -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - tags = { -19:57:01.762 STDOUT [eks-config] terraform_current:  - "CostAllocation" = "census:csvd:platformbaseline" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Environment" = "dev" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Name" = "k-kms-platform-eng-eks-mcm" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:created_by" = "terraform" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:tf_module_version" = "0.0.3" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "efs.csi.aws.com/cluster" = "true" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:57:01.762 STDOUT [eks-config] terraform_current:  } -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - tags_all = { -19:57:01.762 STDOUT [eks-config] terraform_current:  - "CostAllocation" = "census:csvd:platformbaseline" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Environment" = "dev" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Name" = "k-kms-platform-eng-eks-mcm" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Organization" = "census:ocio:csvd" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Terraform" = "true" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "Terragrunt" = "true" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:created_by" = "terraform" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:tf_module_version" = "0.0.3" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "efs.csi.aws.com/cluster" = "true" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:57:01.762 STDOUT [eks-config] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:57:01.762 STDOUT [eks-config] terraform_current:  } -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  # (2 unchanged attributes hidden) -19:57:01.762 STDOUT [eks-config] terraform_current:  } -19:57:01.762 STDOUT [eks-config] terraform_current:  # module.efs.module.efs_mnt.aws_efs_mount_target.mount[0] will be destroyed -19:57:01.762 STDOUT [eks-config] terraform_current:  - resource "aws_efs_mount_target" "mount" { -19:57:01.762 STDOUT [eks-config] terraform_current:  - availability_zone_id = "usge1-az1" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - availability_zone_name = "us-gov-east-1a" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - dns_name = "fs-01737a6222633f706.efs.us-gov-east-1.amazonaws.com" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - file_system_arn = "arn:aws-us-gov:elasticfilesystem:us-gov-east-1:224384469011:file-system/fs-01737a6222633f706" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - file_system_id = "fs-01737a6222633f706" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - id = "fsmt-029ae74adf10349bb" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - ip_address = "10.129.54.5" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - mount_target_dns_name = "us-gov-east-1a.fs-01737a6222633f706.efs.us-gov-east-1.amazonaws.com" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - network_interface_id = "eni-0c359f03ae8785130" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - owner_id = "224384469011" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - security_groups = [ -19:57:01.762 STDOUT [eks-config] terraform_current:  - "sg-0117da2c13b4caf21", -19:57:01.762 STDOUT [eks-config] terraform_current:  ] -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - subnet_id = "subnet-02c2250b9ec2dd6a2" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  } -19:57:01.762 STDOUT [eks-config] terraform_current:  # module.efs.module.efs_mnt.aws_efs_mount_target.mount[1] will be destroyed -19:57:01.762 STDOUT [eks-config] terraform_current:  - resource "aws_efs_mount_target" "mount" { -19:57:01.762 STDOUT [eks-config] terraform_current:  - availability_zone_id = "usge1-az3" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - availability_zone_name = "us-gov-east-1c" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - dns_name = "fs-01737a6222633f706.efs.us-gov-east-1.amazonaws.com" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - file_system_arn = "arn:aws-us-gov:elasticfilesystem:us-gov-east-1:224384469011:file-system/fs-01737a6222633f706" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - file_system_id = "fs-01737a6222633f706" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - id = "fsmt-06c0f6fe90e4a1ddc" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - ip_address = "10.129.63.88" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - mount_target_dns_name = "us-gov-east-1c.fs-01737a6222633f706.efs.us-gov-east-1.amazonaws.com" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - network_interface_id = "eni-0120a768536edb21a" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - owner_id = "224384469011" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - security_groups = [ -19:57:01.762 STDOUT [eks-config] terraform_current:  - "sg-0117da2c13b4caf21", -19:57:01.762 STDOUT [eks-config] terraform_current:  ] -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - subnet_id = "subnet-078b228071c609a50" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  } -19:57:01.762 STDOUT [eks-config] terraform_current:  # module.efs.module.efs_mnt.aws_efs_mount_target.mount[2] will be destroyed -19:57:01.762 STDOUT [eks-config] terraform_current:  - resource "aws_efs_mount_target" "mount" { -19:57:01.762 STDOUT [eks-config] terraform_current:  - availability_zone_id = "usge1-az2" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - availability_zone_name = "us-gov-east-1b" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - dns_name = "fs-01737a6222633f706.efs.us-gov-east-1.amazonaws.com" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - file_system_arn = "arn:aws-us-gov:elasticfilesystem:us-gov-east-1:224384469011:file-system/fs-01737a6222633f706" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - file_system_id = "fs-01737a6222633f706" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - id = "fsmt-0eb95a734315675b7" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - ip_address = "10.129.59.54" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - mount_target_dns_name = "us-gov-east-1b.fs-01737a6222633f706.efs.us-gov-east-1.amazonaws.com" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - network_interface_id = "eni-0c4d84da0e07564f5" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - owner_id = "224384469011" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - security_groups = [ -19:57:01.762 STDOUT [eks-config] terraform_current:  - "sg-0117da2c13b4caf21", -19:57:01.762 STDOUT [eks-config] terraform_current:  ] -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - subnet_id = "subnet-07a6339be3670fb41" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  } -19:57:01.762 STDOUT [eks-config] terraform_current: Plan: 0 to add, 0 to change, 15 to destroy. -19:57:01.762 STDOUT [eks-config] terraform_current:  -19:57:01.762 STDOUT [eks-config] terraform_current: Changes to Outputs: -19:57:01.762 STDOUT [eks-config] terraform_current:  - kubectl_image_full_path = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/kubectl:1.30.4" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - kubectl_image_registry = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - kubectl_image_repository = "platform-eng-eks-mcm/kubectl" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - kubectl_image_tag = "1.30.4" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - module_name = "tfmod-eks-configuration" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - module_version = "0.0.3" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - rwo_storage_class = "gp3-encrypted" -> null -19:57:01.762 STDOUT [eks-config] terraform_current:  - rwx_storage_class = "efs" -> null -19:57:02.481 STDOUT [eks-config] terraform_current: module.images.null_resource.copy_images["kubectl#1.30.4"]: Destroying... [id=1086192723359257187] -19:57:02.482 STDOUT [eks-config] terraform_current: module.images.null_resource.copy_images["kubectl#1.30.4"]: Destruction complete after 0s -19:57:02.508 STDOUT [eks-config] terraform_current: kubernetes_namespace.operators: Destroying... [id=operators] -19:57:02.508 STDOUT [eks-config] terraform_current: kubernetes_storage_class.gp3_encrypted: Destroying... [id=gp3-encrypted] -19:57:02.508 STDOUT [eks-config] terraform_current: kubernetes_storage_class.ebs_encrypted: Destroying... [id=gp2-encrypted] -19:57:02.508 STDOUT [eks-config] terraform_current: kubernetes_storage_class.efs_sc: Destroying... [id=efs] -19:57:02.510 STDOUT [eks-config] terraform_current: kubectl_manifest.deploy_cluster_roles[1]: Destroying... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/eks-console-dashboard-full-access-clusterrole] -19:57:02.510 STDOUT [eks-config] terraform_current: kubectl_manifest.deploy_cluster_roles[0]: Destroying... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/eks-console-dashboard-full-access-binding] -19:57:02.989 STDOUT [eks-config] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["kubectl"]: Destroying... [id=platform-eng-eks-mcm/kubectl] -19:57:03.142 STDOUT [eks-config] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["kubectl"]: Destruction complete after 0s -19:57:03.152 STDOUT [eks-config] terraform_current: module.images.aws_ecr_repository.image_repos["kubectl"]: Destroying... [id=platform-eng-eks-mcm/kubectl] -19:57:03.189 STDOUT [eks-istio] terraform_current: helm_release.egress[0]: Refreshing state... [id=istio-egressgateway] -19:57:03.193 STDOUT [eks-istio] terraform_current: helm_release.ingress: Refreshing state... [id=istio-ingressgateway] -19:57:03.363 STDOUT [eks-config] terraform_current: module.images.aws_ecr_repository.image_repos["kubectl"]: Destruction complete after 0s -19:57:03.448 STDOUT [eks-config] terraform_current: kubectl_manifest.deploy_cluster_roles[0]: Destruction complete after 0s -19:57:03.463 STDOUT [eks-config] terraform_current: kubectl_manifest.deploy_cluster_roles[1]: Destruction complete after 0s -19:57:03.484 STDOUT [eks-config] terraform_current: kubernetes_storage_class.efs_sc: Destruction complete after 0s -19:57:03.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_kms_alias.key[0]: Destroying... [id=alias/k-kms-platform-eng-eks-mcm] -19:57:03.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[2]: Destroying... [id=fsmt-0eb95a734315675b7] -19:57:03.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[0]: Destroying... [id=fsmt-029ae74adf10349bb] -19:57:03.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[1]: Destroying... [id=fsmt-06c0f6fe90e4a1ddc] -19:57:03.490 STDOUT [eks-config] terraform_current: kubernetes_storage_class.gp3_encrypted: Destruction complete after 1s -19:57:03.490 STDOUT [eks-config] terraform_current: kubernetes_storage_class.ebs_encrypted: Destruction complete after 0s -19:57:03.596 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_kms_alias.key[0]: Destruction complete after 1s -19:57:07.847 STDOUT [eks-istio] terraform_current: Terraform used the selected providers to generate the following execution -19:57:07.847 STDOUT [eks-istio] terraform_current: plan. Resource actions are indicated with the following symbols: -19:57:07.847 STDOUT [eks-istio] terraform_current:  - destroy -19:57:07.847 STDOUT [eks-istio] terraform_current: Terraform will perform the following actions: -19:57:07.847 STDOUT [eks-istio] terraform_current:  # helm_release.base will be destroyed -19:57:07.847 STDOUT [eks-istio] terraform_current:  - resource "helm_release" "base" { -19:57:07.847 STDOUT [eks-istio] terraform_current:  - atomic = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - chart = "base" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - cleanup_on_fail = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - create_namespace = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - dependency_update = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - disable_crd_hooks = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - disable_openapi_validation = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - disable_webhooks = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - force_update = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - id = "istio-base" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - lint = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - max_history = 0 -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - metadata = [ -19:57:07.847 STDOUT [eks-istio] terraform_current:  - { -19:57:07.847 STDOUT [eks-istio] terraform_current:  - app_version = "1.22.1" -19:57:07.847 STDOUT [eks-istio] terraform_current:  - chart = "base" -19:57:07.847 STDOUT [eks-istio] terraform_current:  - first_deployed = 1725665094 -19:57:07.847 STDOUT [eks-istio] terraform_current:  - last_deployed = 1725665094 -19:57:07.847 STDOUT [eks-istio] terraform_current:  - name = "istio-base" -19:57:07.847 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" -19:57:07.847 STDOUT [eks-istio] terraform_current:  - notes = <<-EOT -19:57:07.847 STDOUT [eks-istio] terraform_current:  Istio base successfully installed! -19:57:07.847 STDOUT [eks-istio] terraform_current:  -19:57:07.847 STDOUT [eks-istio] terraform_current:  To learn more about the release, try: -19:57:07.847 STDOUT [eks-istio] terraform_current:  $ helm status istio-base -n istio-system -19:57:07.847 STDOUT [eks-istio] terraform_current:  $ helm get all istio-base -n istio-system -19:57:07.847 STDOUT [eks-istio] terraform_current:  EOT -19:57:07.847 STDOUT [eks-istio] terraform_current:  - revision = 1 -19:57:07.847 STDOUT [eks-istio] terraform_current:  - values = jsonencode({}) -19:57:07.847 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" -19:57:07.847 STDOUT [eks-istio] terraform_current:  }, -19:57:07.847 STDOUT [eks-istio] terraform_current:  ] -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - name = "istio-base" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - pass_credentials = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - recreate_pods = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - render_subchart_notes = true -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - replace = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - repository = "https://istio-release.storage.googleapis.com/charts" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - reset_values = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - reuse_values = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - skip_crds = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - status = "deployed" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - timeout = 300 -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - verify = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - wait = true -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - wait_for_jobs = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  } -19:57:07.847 STDOUT [eks-istio] terraform_current:  # helm_release.egress[0] will be destroyed -19:57:07.847 STDOUT [eks-istio] terraform_current:  - resource "helm_release" "egress" { -19:57:07.847 STDOUT [eks-istio] terraform_current:  - atomic = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - chart = "gateway" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - cleanup_on_fail = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - create_namespace = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - dependency_update = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - disable_crd_hooks = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - disable_openapi_validation = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - disable_webhooks = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - force_update = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - id = "istio-egressgateway" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - lint = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - max_history = 0 -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - metadata = [ -19:57:07.847 STDOUT [eks-istio] terraform_current:  - { -19:57:07.847 STDOUT [eks-istio] terraform_current:  - app_version = "1.22.1" -19:57:07.847 STDOUT [eks-istio] terraform_current:  - chart = "gateway" -19:57:07.847 STDOUT [eks-istio] terraform_current:  - first_deployed = 1725665113 -19:57:07.847 STDOUT [eks-istio] terraform_current:  - last_deployed = 1725665113 -19:57:07.847 STDOUT [eks-istio] terraform_current:  - name = "istio-egressgateway" -19:57:07.847 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" -19:57:07.847 STDOUT [eks-istio] terraform_current:  - notes = <<-EOT -19:57:07.847 STDOUT [eks-istio] terraform_current:  "istio-egressgateway" successfully installed! -19:57:07.847 STDOUT [eks-istio] terraform_current:  -19:57:07.847 STDOUT [eks-istio] terraform_current:  To learn more about the release, try: -19:57:07.847 STDOUT [eks-istio] terraform_current:  $ helm status istio-egressgateway -n istio-system -19:57:07.847 STDOUT [eks-istio] terraform_current:  $ helm get all istio-egressgateway -n istio-system -19:57:07.847 STDOUT [eks-istio] terraform_current:  -19:57:07.847 STDOUT [eks-istio] terraform_current:  Next steps: -19:57:07.847 STDOUT [eks-istio] terraform_current:  * Deploy an HTTP Gateway: https://istio.io/latest/docs/tasks/traffic-management/ingress/ingress-control/ -19:57:07.847 STDOUT [eks-istio] terraform_current:  * Deploy an HTTPS Gateway: https://istio.io/latest/docs/tasks/traffic-management/ingress/secure-ingress/ -19:57:07.847 STDOUT [eks-istio] terraform_current:  EOT -19:57:07.847 STDOUT [eks-istio] terraform_current:  - revision = 1 -19:57:07.847 STDOUT [eks-istio] terraform_current:  - values = jsonencode( -19:57:07.847 STDOUT [eks-istio] terraform_current:  { -19:57:07.847 STDOUT [eks-istio] terraform_current:  - service = { -19:57:07.847 STDOUT [eks-istio] terraform_current:  - type = "ClusterIP" -19:57:07.847 STDOUT [eks-istio] terraform_current:  } -19:57:07.847 STDOUT [eks-istio] terraform_current:  } -19:57:07.847 STDOUT [eks-istio] terraform_current:  ) -19:57:07.847 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" -19:57:07.847 STDOUT [eks-istio] terraform_current:  }, -19:57:07.847 STDOUT [eks-istio] terraform_current:  ] -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - name = "istio-egressgateway" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - pass_credentials = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - recreate_pods = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - render_subchart_notes = true -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - replace = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - repository = "https://istio-release.storage.googleapis.com/charts" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - reset_values = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - reuse_values = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - skip_crds = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - status = "deployed" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - timeout = 90 -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - verify = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - wait = true -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - wait_for_jobs = false -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.847 STDOUT [eks-istio] terraform_current:  - name = "service.type" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  - value = "ClusterIP" -> null -19:57:07.847 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.847 STDOUT [eks-istio] terraform_current:  } -19:57:07.847 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  # helm_release.ingress will be destroyed -19:57:07.848 STDOUT [eks-istio] terraform_current:  - resource "helm_release" "ingress" { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - atomic = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - chart = "gateway" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - cleanup_on_fail = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - create_namespace = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - dependency_update = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - disable_crd_hooks = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - disable_openapi_validation = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - disable_webhooks = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - force_update = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - id = "istio-ingressgateway" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - lint = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - max_history = 0 -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - metadata = [ -19:57:07.848 STDOUT [eks-istio] terraform_current:  - { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - app_version = "1.22.1" -19:57:07.848 STDOUT [eks-istio] terraform_current:  - chart = "gateway" -19:57:07.848 STDOUT [eks-istio] terraform_current:  - first_deployed = 1725665114 -19:57:07.848 STDOUT [eks-istio] terraform_current:  - last_deployed = 1725665114 -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "istio-ingressgateway" -19:57:07.848 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" -19:57:07.848 STDOUT [eks-istio] terraform_current:  - notes = <<-EOT -19:57:07.848 STDOUT [eks-istio] terraform_current:  "istio-ingressgateway" successfully installed! -19:57:07.848 STDOUT [eks-istio] terraform_current:  -19:57:07.848 STDOUT [eks-istio] terraform_current:  To learn more about the release, try: -19:57:07.848 STDOUT [eks-istio] terraform_current:  $ helm status istio-ingressgateway -n istio-system -19:57:07.848 STDOUT [eks-istio] terraform_current:  $ helm get all istio-ingressgateway -n istio-system -19:57:07.848 STDOUT [eks-istio] terraform_current:  -19:57:07.848 STDOUT [eks-istio] terraform_current:  Next steps: -19:57:07.848 STDOUT [eks-istio] terraform_current:  * Deploy an HTTP Gateway: https://istio.io/latest/docs/tasks/traffic-management/ingress/ingress-control/ -19:57:07.848 STDOUT [eks-istio] terraform_current:  * Deploy an HTTPS Gateway: https://istio.io/latest/docs/tasks/traffic-management/ingress/secure-ingress/ -19:57:07.848 STDOUT [eks-istio] terraform_current:  EOT -19:57:07.848 STDOUT [eks-istio] terraform_current:  - revision = 1 -19:57:07.848 STDOUT [eks-istio] terraform_current:  - values = jsonencode( -19:57:07.848 STDOUT [eks-istio] terraform_current:  { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - service = { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - annotations = { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - "service.beta.kubernetes.io/aws-load-balancer-additional-resource-tags" = "Name=platform-eng-eks-mcm-istio-ingress,boc:tf_module_name=tfmod-istio,boc:tf_module_version=1.0.3,eks-cluster-name=platform-eng-eks-mcm" -19:57:07.848 STDOUT [eks-istio] terraform_current:  - "service.beta.kubernetes.io/aws-load-balancer-internal" = "true" -19:57:07.848 STDOUT [eks-istio] terraform_current:  - "service.beta.kubernetes.io/aws-load-balancer-type" = "nlb" -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  - ports = [ -19:57:07.848 STDOUT [eks-istio] terraform_current:  - { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "http2" -19:57:07.848 STDOUT [eks-istio] terraform_current:  - port = 80 -19:57:07.848 STDOUT [eks-istio] terraform_current:  - protocol = "TCP" -19:57:07.848 STDOUT [eks-istio] terraform_current:  - targetPort = 80 -19:57:07.848 STDOUT [eks-istio] terraform_current:  }, -19:57:07.848 STDOUT [eks-istio] terraform_current:  - { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "https" -19:57:07.848 STDOUT [eks-istio] terraform_current:  - port = 443 -19:57:07.848 STDOUT [eks-istio] terraform_current:  - protocol = "TCP" -19:57:07.848 STDOUT [eks-istio] terraform_current:  - targetPort = 443 -19:57:07.848 STDOUT [eks-istio] terraform_current:  }, -19:57:07.848 STDOUT [eks-istio] terraform_current:  - { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "status-port" -19:57:07.848 STDOUT [eks-istio] terraform_current:  - port = 15021 -19:57:07.848 STDOUT [eks-istio] terraform_current:  - protocol = "TCP" -19:57:07.848 STDOUT [eks-istio] terraform_current:  - targetPort = 15021 -19:57:07.848 STDOUT [eks-istio] terraform_current:  }, -19:57:07.848 STDOUT [eks-istio] terraform_current:  ] -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  ) -19:57:07.848 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" -19:57:07.848 STDOUT [eks-istio] terraform_current:  }, -19:57:07.848 STDOUT [eks-istio] terraform_current:  ] -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "istio-ingressgateway" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - pass_credentials = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - recreate_pods = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - render_subchart_notes = true -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - replace = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - repository = "https://istio-release.storage.googleapis.com/charts" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - reset_values = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - reuse_values = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - skip_crds = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - status = "deployed" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - timeout = 90 -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - verify = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - wait = true -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - wait_for_jobs = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.annotations.service\\.beta\\.kubernetes\\.io/aws-load-balancer-additional-resource-tags" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "Name=platform-eng-eks-mcm-istio-ingress\\,boc:tf_module_name=tfmod-istio\\,boc:tf_module_version=1.0.3\\,eks-cluster-name=platform-eng-eks-mcm" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.annotations.service\\.beta\\.kubernetes\\.io/aws-load-balancer-internal" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - type = "string" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "true" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.annotations.service\\.beta\\.kubernetes\\.io/aws-load-balancer-type" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "nlb" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[0].name" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "http2" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[0].port" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "80" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[0].protocol" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "TCP" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[0].targetPort" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "80" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[1].name" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "https" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[1].port" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "443" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[1].protocol" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "TCP" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[1].targetPort" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "443" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[2].name" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "status-port" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[2].port" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "15021" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[2].protocol" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "TCP" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[2].targetPort" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "15021" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  } -19:57:07.848 STDOUT [eks-istio] terraform_current:  # helm_release.istiod will be destroyed -19:57:07.848 STDOUT [eks-istio] terraform_current:  - resource "helm_release" "istiod" { -19:57:07.848 STDOUT [eks-istio] terraform_current:  - atomic = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - chart = "istiod" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - cleanup_on_fail = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - create_namespace = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - dependency_update = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - disable_crd_hooks = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - disable_openapi_validation = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - disable_webhooks = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - force_update = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - id = "istiod" -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - lint = false -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - max_history = 0 -> null -19:57:07.848 STDOUT [eks-istio] terraform_current:  - metadata = [ -19:57:07.848 STDOUT [eks-istio] terraform_current:  - { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - app_version = "1.22.1" -19:57:07.849 STDOUT [eks-istio] terraform_current:  - chart = "istiod" -19:57:07.849 STDOUT [eks-istio] terraform_current:  - first_deployed = 1725665099 -19:57:07.849 STDOUT [eks-istio] terraform_current:  - last_deployed = 1725665099 -19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "istiod" -19:57:07.849 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" -19:57:07.849 STDOUT [eks-istio] terraform_current:  - notes = <<-EOT -19:57:07.849 STDOUT [eks-istio] terraform_current:  "istiod" successfully installed! -19:57:07.849 STDOUT [eks-istio] terraform_current:  -19:57:07.849 STDOUT [eks-istio] terraform_current:  To learn more about the release, try: -19:57:07.849 STDOUT [eks-istio] terraform_current:  $ helm status istiod -n istio-system -19:57:07.849 STDOUT [eks-istio] terraform_current:  $ helm get all istiod -n istio-system -19:57:07.849 STDOUT [eks-istio] terraform_current:  -19:57:07.849 STDOUT [eks-istio] terraform_current:  Next steps: -19:57:07.849 STDOUT [eks-istio] terraform_current:  * Deploy a Gateway: https://istio.io/latest/docs/setup/additional-setup/gateway/ -19:57:07.849 STDOUT [eks-istio] terraform_current:  * Try out our tasks to get started on common configurations: -19:57:07.849 STDOUT [eks-istio] terraform_current:  * https://istio.io/latest/docs/tasks/traffic-management -19:57:07.849 STDOUT [eks-istio] terraform_current:  * https://istio.io/latest/docs/tasks/security/ -19:57:07.849 STDOUT [eks-istio] terraform_current:  * https://istio.io/latest/docs/tasks/policy-enforcement/ -19:57:07.849 STDOUT [eks-istio] terraform_current:  * Review the list of actively supported releases, CVE publications and our hardening guide: -19:57:07.849 STDOUT [eks-istio] terraform_current:  * https://istio.io/latest/docs/releases/supported-releases/ -19:57:07.849 STDOUT [eks-istio] terraform_current:  * https://istio.io/latest/news/security/ -19:57:07.849 STDOUT [eks-istio] terraform_current:  * https://istio.io/latest/docs/ops/best-practices/security/ -19:57:07.849 STDOUT [eks-istio] terraform_current:  -19:57:07.849 STDOUT [eks-istio] terraform_current:  For further documentation see https://istio.io website -19:57:07.849 STDOUT [eks-istio] terraform_current:  EOT -19:57:07.849 STDOUT [eks-istio] terraform_current:  - revision = 1 -19:57:07.849 STDOUT [eks-istio] terraform_current:  - values = jsonencode( -19:57:07.849 STDOUT [eks-istio] terraform_current:  { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - global = { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - hub = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -19:57:07.849 STDOUT [eks-istio] terraform_current:  - proxy = { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - image = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/proxyv2:1.22.1" -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  - proxy_init = { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - image = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/proxyv2:1.22.1" -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  - globalproxy = { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - excludeIPRanges = "172.20.0.1/32" -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  - meshConfig = { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - accessLogFile = "/dev/stdout" -19:57:07.849 STDOUT [eks-istio] terraform_current:  - enableTracing = true -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  - pilot = { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - image = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/pilot:1.22.1" -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  - telemetry = { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - enabled = true -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  ) -19:57:07.849 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" -19:57:07.849 STDOUT [eks-istio] terraform_current:  }, -19:57:07.849 STDOUT [eks-istio] terraform_current:  ] -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "istiod" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - pass_credentials = false -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - recreate_pods = false -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - render_subchart_notes = true -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - replace = false -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - repository = "https://istio-release.storage.googleapis.com/charts" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - reset_values = false -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - reuse_values = false -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - skip_crds = false -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - status = "deployed" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - timeout = 300 -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - verify = false -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - wait = true -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - wait_for_jobs = false -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "global.hub" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "global.proxy.image" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/proxyv2:1.22.1" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "global.proxy_init.image" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/proxyv2:1.22.1" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "globalproxy.excludeIPRanges" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "172.20.0.1/32" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "meshConfig.accessLogFile" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "/dev/stdout" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "meshConfig.enableTracing" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "true" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "pilot.image" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/pilot:1.22.1" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "telemetry.enabled" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "true" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  # kubernetes_namespace.ns will be destroyed -19:57:07.849 STDOUT [eks-istio] terraform_current:  - resource "kubernetes_namespace" "ns" { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - id = "istio-system" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - wait_for_default_service_account = false -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - metadata { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - annotations = {} -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - generation = 0 -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - labels = {} -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "istio-system" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - resource_version = "3104" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - uid = "cdbfe103-865b-4c34-93ce-ae9d8db996c6" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["istio/pilot"] will be destroyed -19:57:07.849 STDOUT [eks-istio] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - id = "platform-eng-eks-mcm/istio/pilot" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - policy = jsonencode( -19:57:07.849 STDOUT [eks-istio] terraform_current:  { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - rules = [ -19:57:07.849 STDOUT [eks-istio] terraform_current:  - { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - action = { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - type = "expire" -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  - description = "keep 5 images" -19:57:07.849 STDOUT [eks-istio] terraform_current:  - rulePriority = 1 -19:57:07.849 STDOUT [eks-istio] terraform_current:  - selection = { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - countNumber = 5 -19:57:07.849 STDOUT [eks-istio] terraform_current:  - countType = "imageCountMoreThan" -19:57:07.849 STDOUT [eks-istio] terraform_current:  - tagStatus = "any" -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  }, -19:57:07.849 STDOUT [eks-istio] terraform_current:  ] -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  ) -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - registry_id = "224384469011" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - repository = "platform-eng-eks-mcm/istio/pilot" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["istio/proxyv2"] will be destroyed -19:57:07.849 STDOUT [eks-istio] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - id = "platform-eng-eks-mcm/istio/proxyv2" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - policy = jsonencode( -19:57:07.849 STDOUT [eks-istio] terraform_current:  { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - rules = [ -19:57:07.849 STDOUT [eks-istio] terraform_current:  - { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - action = { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - type = "expire" -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  - description = "keep 5 images" -19:57:07.849 STDOUT [eks-istio] terraform_current:  - rulePriority = 1 -19:57:07.849 STDOUT [eks-istio] terraform_current:  - selection = { -19:57:07.849 STDOUT [eks-istio] terraform_current:  - countNumber = 5 -19:57:07.849 STDOUT [eks-istio] terraform_current:  - countType = "imageCountMoreThan" -19:57:07.849 STDOUT [eks-istio] terraform_current:  - tagStatus = "any" -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  }, -19:57:07.849 STDOUT [eks-istio] terraform_current:  ] -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.849 STDOUT [eks-istio] terraform_current:  ) -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - registry_id = "224384469011" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  - repository = "platform-eng-eks-mcm/istio/proxyv2" -> null -19:57:07.849 STDOUT [eks-istio] terraform_current:  } -19:57:07.877 STDOUT [eks-istio] terraform_current:  # module.images.aws_ecr_repository.image_repos["istio/pilot"] will be destroyed -19:57:07.877 STDOUT [eks-istio] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:57:07.877 STDOUT [eks-istio] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/istio/pilot" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - force_delete = true -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - id = "platform-eng-eks-mcm/istio/pilot" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - name = "platform-eng-eks-mcm/istio/pilot" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - registry_id = "224384469011" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/pilot" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - tags = { -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Environment" = "application" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/istio/pilot" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:created_by" = "terraform" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:57:07.877 STDOUT [eks-istio] terraform_current:  } -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - tags_all = { -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Environment" = "application" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/istio/pilot" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Organization" = "census:ocio:csvd" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Terraform" = "true" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Terragrunt" = "true" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:created_by" = "terraform" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:57:07.877 STDOUT [eks-istio] terraform_current:  } -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - encryption_configuration { -19:57:07.877 STDOUT [eks-istio] terraform_current:  - encryption_type = "KMS" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  } -19:57:07.877 STDOUT [eks-istio] terraform_current:  - image_scanning_configuration { -19:57:07.877 STDOUT [eks-istio] terraform_current:  - scan_on_push = true -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  } -19:57:07.877 STDOUT [eks-istio] terraform_current:  } -19:57:07.877 STDOUT [eks-istio] terraform_current:  # module.images.aws_ecr_repository.image_repos["istio/proxyv2"] will be destroyed -19:57:07.877 STDOUT [eks-istio] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:57:07.877 STDOUT [eks-istio] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/istio/proxyv2" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - force_delete = true -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - id = "platform-eng-eks-mcm/istio/proxyv2" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - name = "platform-eng-eks-mcm/istio/proxyv2" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - registry_id = "224384469011" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/proxyv2" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - tags = { -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Environment" = "application" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/istio/proxyv2" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:created_by" = "terraform" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:57:07.877 STDOUT [eks-istio] terraform_current:  } -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - tags_all = { -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Environment" = "application" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/istio/proxyv2" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Organization" = "census:ocio:csvd" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Terraform" = "true" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Terragrunt" = "true" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:created_by" = "terraform" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:57:07.877 STDOUT [eks-istio] terraform_current:  } -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - encryption_configuration { -19:57:07.877 STDOUT [eks-istio] terraform_current:  - encryption_type = "KMS" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  } -19:57:07.877 STDOUT [eks-istio] terraform_current:  - image_scanning_configuration { -19:57:07.877 STDOUT [eks-istio] terraform_current:  - scan_on_push = true -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  } -19:57:07.877 STDOUT [eks-istio] terraform_current:  } -19:57:07.877 STDOUT [eks-istio] terraform_current:  # module.images.null_resource.copy_images["istio/pilot#1.22.1"] will be destroyed -19:57:07.877 STDOUT [eks-istio] terraform_current:  - resource "null_resource" "copy_images" { -19:57:07.877 STDOUT [eks-istio] terraform_current:  - id = "6525359393711592378" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - triggers = { -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "region" = "us-gov-east-1" -19:57:07.877 STDOUT [eks-istio] terraform_current:  } -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  } -19:57:07.877 STDOUT [eks-istio] terraform_current:  # module.images.null_resource.copy_images["istio/proxyv2#1.22.1"] will be destroyed -19:57:07.877 STDOUT [eks-istio] terraform_current:  - resource "null_resource" "copy_images" { -19:57:07.877 STDOUT [eks-istio] terraform_current:  - id = "4423650552927619903" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - triggers = { -19:57:07.877 STDOUT [eks-istio] terraform_current:  - "region" = "us-gov-east-1" -19:57:07.877 STDOUT [eks-istio] terraform_current:  } -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  } -19:57:07.877 STDOUT [eks-istio] terraform_current: Plan: 0 to add, 0 to change, 11 to destroy. -19:57:07.877 STDOUT [eks-istio] terraform_current:  -19:57:07.877 STDOUT [eks-istio] terraform_current: Changes to Outputs: -19:57:07.877 STDOUT [eks-istio] terraform_current:  - module_name = "tfmod-istio" -> null -19:57:07.877 STDOUT [eks-istio] terraform_current:  - module_version = "1.0.3" -> null -19:57:08.412 STDOUT [eks-istio] terraform_current: helm_release.egress[0]: Destroying... [id=istio-egressgateway] -19:57:08.412 STDOUT [eks-istio] terraform_current: helm_release.ingress: Destroying... [id=istio-ingressgateway] -19:57:09.851 STDOUT [eks-config] terraform_current: kubernetes_namespace.operators: Destruction complete after 8s -19:57:10.733 STDOUT [eks-istio] terraform_current: helm_release.egress[0]: Destruction complete after 3s -19:57:12.747 STDOUT [eks-istio] terraform_current: helm_release.ingress: Destruction complete after 5s -19:57:12.758 STDOUT [eks-istio] terraform_current: helm_release.istiod: Destroying... [id=istiod] -19:57:13.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[0]: Still destroying... [id=fsmt-029ae74adf10349bb, 10s elapsed] -19:57:13.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[1]: Still destroying... [id=fsmt-06c0f6fe90e4a1ddc, 10s elapsed] -19:57:13.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[2]: Still destroying... [id=fsmt-0eb95a734315675b7, 10s elapsed] -19:57:15.639 STDOUT [eks-istio] terraform_current: helm_release.istiod: Destruction complete after 3s -19:57:15.641 STDOUT [eks-istio] terraform_current: helm_release.base: Destroying... [id=istio-base] -19:57:16.477 STDOUT [eks-istio] terraform_current: helm_release.base: Destruction complete after 0s -19:57:16.491 STDOUT [eks-istio] terraform_current: kubernetes_namespace.ns: Destroying... [id=istio-system] -19:57:16.491 STDOUT [eks-istio] terraform_current: module.images.null_resource.copy_images["istio/proxyv2#1.22.1"]: Destroying... [id=4423650552927619903] -19:57:16.496 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["istio/proxyv2"]: Destroying... [id=platform-eng-eks-mcm/istio/proxyv2] -19:57:16.496 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["istio/pilot"]: Destroying... [id=platform-eng-eks-mcm/istio/pilot] -19:57:16.501 STDOUT [eks-istio] terraform_current: module.images.null_resource.copy_images["istio/pilot#1.22.1"]: Destroying... [id=6525359393711592378] -19:57:16.501 STDOUT [eks-istio] terraform_current: module.images.null_resource.copy_images["istio/proxyv2#1.22.1"]: Destruction complete after 1s -19:57:16.502 STDOUT [eks-istio] terraform_current: module.images.null_resource.copy_images["istio/pilot#1.22.1"]: Destruction complete after 0s -19:57:16.657 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["istio/proxyv2"]: Destruction complete after 1s -19:57:16.657 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["istio/pilot"]: Destruction complete after 1s -19:57:16.659 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_repository.image_repos["istio/pilot"]: Destroying... [id=platform-eng-eks-mcm/istio/pilot] -19:57:16.659 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_repository.image_repos["istio/proxyv2"]: Destroying... [id=platform-eng-eks-mcm/istio/proxyv2] -19:57:16.860 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_repository.image_repos["istio/pilot"]: Destruction complete after 0s -19:57:16.866 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_repository.image_repos["istio/proxyv2"]: Destruction complete after 0s -19:57:23.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[2]: Still destroying... [id=fsmt-0eb95a734315675b7, 20s elapsed] -19:57:23.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[1]: Still destroying... [id=fsmt-06c0f6fe90e4a1ddc, 20s elapsed] -19:57:23.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[0]: Still destroying... [id=fsmt-029ae74adf10349bb, 20s elapsed] -19:57:23.741 STDOUT [eks-istio] terraform_current: kubernetes_namespace.ns: Destruction complete after 8s -19:57:23.975 STDOUT [eks-istio] terraform_current:  -19:57:23.975 STDOUT [eks-istio] terraform_current: Destroy complete! Resources: 11 destroyed. -19:57:23.975 STDOUT [eks-istio] terraform_current:  -19:57:25.004 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[2]: Destruction complete after 22s -19:57:25.213 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[1]: Destruction complete after 22s -19:57:25.213 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[0]: Destruction complete after 22s -19:57:25.214 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_efs_file_system.fs: Destroying... [id=fs-01737a6222633f706] -19:57:27.346 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_efs_file_system.fs: Destruction complete after 2s -19:57:27.350 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_kms_key.key[0]: Destroying... [id=815b2daf-8e10-42cd-a038-00424726df2e] -19:57:27.500 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_kms_key.key[0]: Destruction complete after 0s -19:57:27.657 STDOUT [eks-config] terraform_current:  -19:57:27.657 STDOUT [eks-config] terraform_current: Destroy complete! Resources: 15 destroyed. -19:57:27.657 STDOUT [eks-config] terraform_current:  -19:57:31.969 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.tls_private_key.certificate: Refreshing state... [id=ae6e5b5654c32ad1098e6ad42a22c7d99cf18f23] -19:57:31.971 STDOUT [eks-cert-manager] terraform_current: data.kubernetes_namespace.cert_manager: Reading... -19:57:31.971 STDOUT [eks-cert-manager] terraform_current: kubernetes_namespace.cert_manager: Refreshing state... [id=cert-manager] -19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_region.current: Reading... -19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_ssm_parameter.ca_longterm: Reading... -19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.data.aws_region.current: Reading... -19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_caller_identity.current: Reading... -19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.data.aws_caller_identity.current: Reading... -19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... -19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zones.zones: Reading... -19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... -19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:57:32.600 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_region.current: Reading... -19:57:32.600 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... -19:57:32.600 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:57:32.601 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s -19:57:32.601 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_ssm_parameter.ca_shortterm: Reading... -19:57:32.603 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_caller_identity.current: Reading... -19:57:32.627 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:57:32.629 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_arn.current: Reading... -19:57:32.631 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -19:57:32.634 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.tls_cert_request.certificate: Refreshing state... [id=64d67b231f99677dca495c34e105cc607fd6fb57] -19:57:32.658 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:57:32.660 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.data.aws_arn.current: Reading... -19:57:32.661 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -19:57:32.690 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:57:32.692 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_arn.current: Reading... -19:57:32.692 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -19:57:32.696 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-controller"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-controller] -19:57:32.696 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-cainjector"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-cainjector] -19:57:32.697 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-webhook"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-webhook] -19:57:32.728 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 0s [id=us-gov-east-1] -19:57:32.730 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-startupapicheck"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck] -19:57:32.730 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_ssm_parameter.ca_longterm: Read complete after 0s [id=/enterprise/pki/ca1] -19:57:32.735 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_ssm_parameter.ca_shortterm: Read complete after 0s [id=/enterprise/pki/ca2] -19:57:32.739 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.aws_acmpca_certificate.certificate: Refreshing state... [id=arn:aws-us-gov:acm-pca:us-gov-east-1:269222635945:certificate-authority/e928587e-c254-4a87-a2c3-31a972e76d21/certificate/4ca26227928051641831bcd9eb842020] -19:57:32.744 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 0s [id=us-gov-east-1] -19:57:32.746 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... -19:57:32.746 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... -19:57:32.798 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] -19:57:32.800 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... -19:57:32.823 STDOUT [eks-cert-manager] terraform_current: data.kubernetes_namespace.cert_manager: Read complete after 1s [id=cert-manager] -19:57:32.850 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] -19:57:32.889 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] -19:57:32.914 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-webhook"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-webhook] -19:57:32.914 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-startupapicheck"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck] -19:57:32.914 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-controller"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-controller] -19:57:32.914 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-cainjector"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-cainjector] -19:57:32.926 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-cainjector#v1.15.1"]: Refreshing state... [id=2605876329532083347] -19:57:32.927 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-startupapicheck#v1.15.1"]: Refreshing state... [id=6900975909197805264] -19:57:32.927 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-webhook#v1.15.1"]: Refreshing state... [id=5737089486470790152] -19:57:32.930 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-controller#v1.15.1"]: Refreshing state... [id=2232048202721537040] -19:57:32.936 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.tls_certificate.certificate: Reading... -19:57:32.936 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.tls_certificate.issuer: Reading... -19:57:32.940 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.tls_certificate.issuer: Read complete after 0s [id=b773586549574e6a4a47ab72d74da2043c8ae7b7] -19:57:32.941 STDOUT [eks-cert-manager] terraform_current: kubernetes_secret.ca_key_pair: Refreshing state... [id=cert-manager/ca-key-pair] -19:57:32.943 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.tls_certificate.certificate: Read complete after 0s [id=971422b009668a7b3039123ee42dc789659e7cb1] -19:57:32.946 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 0s [id=lab-dev-gov] -19:57:32.988 STDOUT [eks-cert-manager] terraform_current: helm_release.cert_manager: Refreshing state... [id=cert-manager] -19:57:36.509 STDOUT [eks-cert-manager] terraform_current: kubectl_manifest.clusterissuer: Refreshing state... [id=/apis/cert-manager.io/v1/clusterissuers/clusterissuer] -19:57:38.827 STDOUT [eks-cert-manager] terraform_current: Terraform used the selected providers to generate the following execution -19:57:38.827 STDOUT [eks-cert-manager] terraform_current: plan. Resource actions are indicated with the following symbols: -19:57:38.827 STDOUT [eks-cert-manager] terraform_current:  - destroy -19:57:38.827 STDOUT [eks-cert-manager] terraform_current: Terraform will perform the following actions: -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # helm_release.cert_manager will be destroyed -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - resource "helm_release" "cert_manager" { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - atomic = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - chart = "cert-manager" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - cleanup_on_fail = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - create_namespace = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - dependency_update = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - disable_crd_hooks = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - disable_openapi_validation = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - disable_webhooks = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - force_update = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - id = "cert-manager" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - lint = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - max_history = 0 -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - metadata = [ -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - app_version = "v1.15.1" -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - chart = "cert-manager" -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - first_deployed = 1725664989 -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - last_deployed = 1725664989 -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "cert-manager" -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - namespace = "cert-manager" -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - notes = <<-EOT -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  ⚠️ WARNING: `installCRDs` is deprecated, use `crds.enabled` instead. -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  cert-manager v1.15.1 has been deployed successfully! -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  In order to begin issuing certificates, you will need to set up a ClusterIssuer -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  or Issuer resource (for example, by creating a 'letsencrypt-staging' issuer). -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  More information on the different types of issuers and how to configure them -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  can be found in our documentation: -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  https://cert-manager.io/docs/configuration/ -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  For information on how to configure cert-manager to automatically provision -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  Certificates for Ingress resources, take a look at the `ingress-shim` -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  documentation: -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  https://cert-manager.io/docs/usage/ingress/ -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  EOT -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - revision = 1 -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - values = jsonencode( -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - cainjector = { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - image = { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - tag = "v1.15.1" -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - extraArgs = [ -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - "--enable-certificate-owner-ref=true", -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  ] -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - image = { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-controller" -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - tag = "v1.15.1" -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - installCRDs = true -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - startupapicheck = { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - image = { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - tag = "v1.15.1" -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - webhook = { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - image = { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-webhook" -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - tag = "v1.15.1" -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  ) -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - version = "v1.15.1" -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  }, -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  ] -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "cert-manager" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - namespace = "cert-manager" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - pass_credentials = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - recreate_pods = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - render_subchart_notes = true -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - replace = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - repository = "https://charts.jetstack.io" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - reset_values = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - reuse_values = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - skip_crds = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - status = "deployed" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - timeout = 180 -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - verify = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - version = "v1.15.1" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - wait = true -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - wait_for_jobs = false -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "cainjector.image.repository" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "cainjector.image.tag" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "v1.15.1" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "extraArgs" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "{--enable-certificate-owner-ref=true}" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "image.repository" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-controller" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "image.tag" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "v1.15.1" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "installCRDs" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "true" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "startupapicheck.image.repository" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "startupapicheck.image.tag" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "v1.15.1" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "webhook.image.repository" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-webhook" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "webhook.image.tag" -> null -19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "v1.15.1" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  # kubectl_manifest.clusterissuer will be destroyed -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - resource "kubectl_manifest" "clusterissuer" { -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - api_version = "cert-manager.io/v1" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - apply_only = false -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - force_conflicts = false -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - force_new = false -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - id = "/apis/cert-manager.io/v1/clusterissuers/clusterissuer" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - kind = "ClusterIssuer" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - live_manifest_incluster = (sensitive value) -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - live_uid = "0098f82c-b5f2-4c51-bf2f-e1bd670a3737" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - name = "clusterissuer" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - server_side_apply = false -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - uid = "0098f82c-b5f2-4c51-bf2f-e1bd670a3737" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - validate_schema = true -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - wait_for_rollout = true -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - yaml_body = (sensitive value) -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - yaml_body_parsed = <<-EOT -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  apiVersion: cert-manager.io/v1 -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  kind: ClusterIssuer -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  metadata: -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  name: clusterissuer -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  spec: -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  ca: -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  secretName: ca-key-pair -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  EOT -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - yaml_incluster = (sensitive value) -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  # kubernetes_namespace.cert_manager will be destroyed -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - resource "kubernetes_namespace" "cert_manager" { -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - id = "cert-manager" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - wait_for_default_service_account = false -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - metadata { -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - annotations = {} -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - generation = 0 -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - labels = {} -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - name = "cert-manager" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - resource_version = "2533" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - uid = "b8d5bbdc-a1a6-4bac-88a9-4f1848e0ac3b" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  # kubernetes_secret.ca_key_pair will be destroyed -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - resource "kubernetes_secret" "ca_key_pair" { -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - binary_data = (sensitive value) -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - data = (sensitive value) -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - id = "cert-manager/ca-key-pair" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - immutable = false -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - type = "Opaque" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - wait_for_service_account_token = true -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - metadata { -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - annotations = {} -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - generation = 0 -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - labels = {} -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - name = "ca-key-pair" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - namespace = "cert-manager" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - resource_version = "2543" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - uid = "869445dd-f6c4-43b5-ae5c-aa7b8c11d811" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-cainjector"] will be destroyed -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -> null -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - policy = jsonencode( -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  { -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - rules = [ -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - { -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - action = { -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - type = "expire" -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - description = "keep 5 images" -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - rulePriority = 1 -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - selection = { -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - countNumber = 5 -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - countType = "imageCountMoreThan" -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - tagStatus = "any" -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  }, -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ] -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ) -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - repository = "platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-controller"] will be destroyed -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-controller" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - policy = jsonencode( -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - rules = [ -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - action = { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - type = "expire" -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - description = "keep 5 images" -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - rulePriority = 1 -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - selection = { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - countNumber = 5 -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - countType = "imageCountMoreThan" -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - tagStatus = "any" -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  }, -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ] -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ) -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - repository = "platform-eng-eks-mcm/jetstack/cert-manager-controller" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-startupapicheck"] will be destroyed -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - policy = jsonencode( -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - rules = [ -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - action = { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - type = "expire" -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - description = "keep 5 images" -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - rulePriority = 1 -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - selection = { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - countNumber = 5 -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - countType = "imageCountMoreThan" -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - tagStatus = "any" -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  }, -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ] -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ) -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - repository = "platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-webhook"] will be destroyed -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-webhook" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - policy = jsonencode( -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - rules = [ -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - action = { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - type = "expire" -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - description = "keep 5 images" -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - rulePriority = 1 -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - selection = { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - countNumber = 5 -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - countType = "imageCountMoreThan" -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - tagStatus = "any" -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  }, -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ] -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ) -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - repository = "platform-eng-eks-mcm/jetstack/cert-manager-webhook" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-cainjector"] will be destroyed -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - force_delete = true -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - name = "platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -> null -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - tags = { -19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - tags_all = { -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Organization" = "census:ocio:csvd" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Terraform" = "true" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Terragrunt" = "true" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - encryption_configuration { -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - encryption_type = "KMS" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - image_scanning_configuration { -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - scan_on_push = true -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-controller"] will be destroyed -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/jetstack/cert-manager-controller" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - force_delete = true -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-controller" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - name = "platform-eng-eks-mcm/jetstack/cert-manager-controller" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-controller" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - tags = { -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-controller" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - tags_all = { -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-controller" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Organization" = "census:ocio:csvd" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Terraform" = "true" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Terragrunt" = "true" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - encryption_configuration { -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - encryption_type = "KMS" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - image_scanning_configuration { -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - scan_on_push = true -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-startupapicheck"] will be destroyed -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - force_delete = true -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - name = "platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - tags = { -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - tags_all = { -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Organization" = "census:ocio:csvd" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Terraform" = "true" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Terragrunt" = "true" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -> null -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - encryption_configuration { -19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - encryption_type = "KMS" -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - image_scanning_configuration { -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - scan_on_push = true -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-webhook"] will be destroyed -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_repository" "image_repos" { -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/jetstack/cert-manager-webhook" -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - force_delete = true -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-webhook" -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - name = "platform-eng-eks-mcm/jetstack/cert-manager-webhook" -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-webhook" -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - tags = { -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-webhook" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - tags_all = { -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-webhook" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Organization" = "census:ocio:csvd" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Terraform" = "true" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Terragrunt" = "true" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - encryption_configuration { -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - encryption_type = "KMS" -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - image_scanning_configuration { -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - scan_on_push = true -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  # module.images.null_resource.copy_images["jetstack/cert-manager-cainjector#v1.15.1"] will be destroyed -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - resource "null_resource" "copy_images" { -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - id = "2605876329532083347" -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - triggers = { -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "region" = "us-gov-east-1" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  # module.images.null_resource.copy_images["jetstack/cert-manager-controller#v1.15.1"] will be destroyed -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - resource "null_resource" "copy_images" { -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - id = "2232048202721537040" -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - triggers = { -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "region" = "us-gov-east-1" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  # module.images.null_resource.copy_images["jetstack/cert-manager-startupapicheck#v1.15.1"] will be destroyed -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - resource "null_resource" "copy_images" { -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - id = "6900975909197805264" -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - triggers = { -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "region" = "us-gov-east-1" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  # module.images.null_resource.copy_images["jetstack/cert-manager-webhook#v1.15.1"] will be destroyed -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - resource "null_resource" "copy_images" { -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - id = "5737089486470790152" -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - triggers = { -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "region" = "us-gov-east-1" -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  # module.subordinate_ca.module.certificate.aws_acmpca_certificate.certificate will be destroyed -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_acmpca_certificate" "certificate" { -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - arn = "arn:aws-us-gov:acm-pca:us-gov-east-1:269222635945:certificate-authority/e928587e-c254-4a87-a2c3-31a972e76d21/certificate/4ca26227928051641831bcd9eb842020" -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - certificate = <<-EOT -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  -----BEGIN CERTIFICATE----- -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  MIIFLTCCAxWgAwIBAgIQTKJiJ5KAUWQYMbzZ64QgIDANBgkqhkiG9w0BAQwFADBk -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  MQswCQYDVQQGEwJVUzEbMBkGA1UEChMSVS5TLiBDZW5zdXMgQnVyZWF1MQwwCgYD -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  VQQLEwNQS0kxKjAoBgNVBAMTIVVTIENlbnN1cyBCdXJlYXUgQVdTIExhYiB1Z2Ux -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  IENBMTAeFw0yNDA5MDYyMjIyMzFaFw0yNTA5MDYyMzIyMzBaMGcxCzAJBgNVBAYT -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  AlVTMRswGQYDVQQKExJVLlMuIENlbnN1cyBCdXJlYXUxEDAOBgNVBAsTB1BLSS1F -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  S1MxKTAnBgNVBAMTIHVnZTEgcGxhdGZvcm0tZW5nLWVrcy1tY20gSXNzdWVyMIIB -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6DU8ZcRedb/rwbFWrn7XBYpH -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  FSaGgTCCN68DGPsjoiThCo7NUn2k5WzPgCsfXWYEc3tMEmUWk/z7oFp0WrD89mPN -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  HByyAQNr7h2fW5h55T0A0OLn1wxJrw/1HzJEZno73kRnbsN+0094KQ/dFD+Oqh8E -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  1WEOaZvZdfT7/VCm8a/ycVRWAcvF9U1LTgRawpkRqN7ddLzT2CICBxiQIWUQxeh0 -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  Ztc84DSemOTUHFPgbG/0ThEkseI1Za1ZHt6AOqAr0xX3o1Jh9M5TlC8VAk3iaO3p -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  kah0TmmBI/zSbxvSsfBYvF9Ms0b5rF0nb1s7FjBQSWyEL5VQ5eAfhMhRdFzf/QID -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  AQABo4HXMIHUMBIGA1UdEwEB/wQIMAYBAf8CAQAwHwYDVR0jBBgwFoAUBOav+Lwa -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  3brgrfOD4xjQAf8wVPEwHQYDVR0OBBYEFBQFbFadZMVMZ84uqsycTtrkImjeMA4G -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  A1UdDwEB/wQEAwIBhjBuBgNVHR8EZzBlMGOgYaBfhl1odHRwOi8vY3JsLmNhMS11 -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  Z2UxLnNlcnZpY2VzLmxhYi5jc3AyLmNlbnN1cy5nb3YvY3JsL2U5Mjg1ODdlLWMy -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  NTQtNGE4Ny1hMmMzLTMxYTk3MmU3NmQyMS5jcmwwDQYJKoZIhvcNAQEMBQADggIB -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  ALg6MNuv6sUjqyxaI7LS0MztsfWHdgllwv6Ym7ht+Mhm75JMYEns4Hzvo3p7YA4D -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  HM80JUtsPbpkfx/dR00i3CB14IXXG9qFDcQxX2I5jzBp9qdhDFtv5qpjK2wzfQ0e -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  LUP5V3x4wA631rIfzdlc2zN36ZvW9Go2mmq9AK5bPcGdxrO3D3tgNltD4k/SnugY -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  hrYikLpGYsG64dGCfQlV/MsOT2lxEudIsJj+00St2o29+G/p2WJFSo0bId4b9hN6 -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  oldH0cP3k8/UGNN0RtvYvl4vHHv5rN3VCNxidacnZfx+qY09UKdQXVoc7dkhcyWo -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  OxeKaleQtnP4mkwnTG2z5037kh2o2A5MCWbJk1+tfIs07bnVHEVNHrHH8a7SdRTC -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  MCOivSCpTeOScFgvJoG9QvjHCV97TmbzmdhqHLwL+yoaWSCxiRWVPPb3Ejlc/or6 -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  aWnDFIikqlhT7xhEo26GjbBZmEVzxgLVFW7o0yU5noAvF8ECyvS2sMMyYWyNXD4j -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  JfHuY12tXHzf06TXOWHLrvV4I+KvmzKKa5PwAcnOtEr8l4LCSUQpfbVqY2q6dN+N -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  0SWjWZGTZRYnTBTadXGG+m9E4rmuIqg6PGfhVHUy3wk00oN37DRs+M5pVuAAhwPl -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  CPoXAmYzdUL25G4eqUvsTwzHc0+aM+eHPnEhdXyKtWwP -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  -----END CERTIFICATE----- -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  EOT -> null -19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - certificate_authority_arn = (sensitive value) -> null -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - certificate_chain = <<-EOT -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----BEGIN CERTIFICATE----- -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MIIGBTCCBO2gAwIBAgITHQAAABsMiYV6sE/qtAAAAAAAGzANBgkqhkiG9w0BAQsF -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  ADBpMRMwEQYKCZImiZPyLGQBGRYDZ292MRYwFAYKCZImiZPyLGQBGRYGY2Vuc3Vz -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MRMwEQYKCZImiZPyLGQBGRYDZWFkMSUwIwYDVQQDExxVUyBDZW5zdXMgQnVyZWF1 -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  IExBQiBDQSBTdWIxMB4XDTI0MDMwNTIxMTI1N1oXDTI2MDMwNTIxMTI1N1owZDEL -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MAkGA1UEBhMCVVMxGzAZBgNVBAoTElUuUy4gQ2Vuc3VzIEJ1cmVhdTEMMAoGA1UE -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  CxMDUEtJMSowKAYDVQQDEyFVUyBDZW5zdXMgQnVyZWF1IEFXUyBMYWIgdWdlMSBD -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  QTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDpDDwrxM3gdUOcgkRw -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  jl4XcWB/w9Fo/+cM2FcVpR6phaRn44cG6NE/vCEt8qcDWf54wvtCQR+EKtnZhy7J -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  Wo7WBsLFV/j7Mo6gJ/Z2S4do8TQTATSCpfcibdlQjPTUYZH6VHoZ/VN8IeKacebB -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  yyDgxbB8xCRC9GATuvDNcab9bVWrJvannyQWaml6x9zrdcoYULXeU2EFUemyODK3 -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  a7f6Wm//dPzLSeUWENVn/szAX12QswAp14b52h8o7JEDkRBPwGja5DEDzVaHQlHU -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  5o+3mt0caZy1Ngr7lQUO7f9Uq1XRjUrgDF1XCv4HB0FX9n2XSYit1Bf/kuOydNn5 -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  J1tSzsB0GNBPrU8QHXhIPxf4XqalhHCCMJ06ruh5Jdsyjh7hz/YxwgTWgcRgPyrG -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  dg6jglG3NUZs+61OPPzC40Le7027NbW0K2OeB07ppoJmJdLoWBwHHq0JKR3CFSjj -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  5+DLMErqGgEIwgGzrE4aTiexciv2cusiliznfpOl0ayrMpN8J/ao2/f1ydJNHBG0 -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  TUh/04gSuxW+XbwVL1JEuhqfVu4Wm4FYaf9GiKi3YXdkH0rnmuo3tr3ha/rwK4VW -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  7oIRHtQIHCam2rlDQcRZPZLQ9cgfVpgrc0LGEJqkEonPukCn67IuiC5XFmLgwepu -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  W3fcoNQbzG4ee1LvmgxaUMFOSwIDAQABo4IBqTCCAaUwDwYDVR0TAQH/BAUwAwEB -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  /zAdBgNVHQ4EFgQUBOav+Lwa3brgrfOD4xjQAf8wVPEwHwYDVR0jBBgwFoAUUUW5 -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  Srfrs/8PDbuag0EDT4eEYQYwYwYDVR0fBFwwWjBYoFagVIZSaHR0cDovL3BraWxh -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  Yi50Y28uY2Vuc3VzLmdvdi9DZXJ0RW5yb2xsL1VTJTIwQ2Vuc3VzJTIwQnVyZWF1 -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  JTIwTEFCJTIwQ0ElMjBTdWIxLmNybDCBnwYIKwYBBQUHAQEEgZIwgY8wXgYIKwYB -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  BQUHMAKGUmh0dHA6Ly9wa2lsYWIudGNvLmNlbnN1cy5nb3YvQ2VydEVucm9sbC9V -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  UyUyMENlbnN1cyUyMEJ1cmVhdSUyMExBQiUyMENBJTIwU3ViMS5jcnQwLQYIKwYB -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  BQUHMAGGIWh0dHA6Ly9wa2lsYWIudGNvLmNlbnN1cy5nb3Yvb2NzcDAOBgNVHQ8B -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  Af8EBAMCAYYwOwYJKwYBBAGCNxUHBC4wLAYkKwYBBAGCNxUIgsWocoS3x02FpZM6 -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  g730MYeJ81kupIYlquFUAgFkAgECMA0GCSqGSIb3DQEBCwUAA4IBAQCMqDYPtg8q -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  BOQHE/eol1ADAhfv0YLOi9hyyBFhx0FzoGykewMsPTrnqzKzbEwHJ2+DozLstN+v -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  9dBu+X7KigaA/4d/tGwigFyMwatHOmpNUPdVx6jYXsEWRo4iVRD4PnNGI0MyPY+E -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  +42PIjf+MrSWEGADJNC2yH1Wh7ufmA7y1m559fayjBftSv5dFozeVVbd7f2f2A70 -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  5t7yPsQ5SOjhltTA4nkJNCkz5Q3U9GY3t2ndJQBZUeuJK76GXUuqTGmyTEZrNDrC -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  CcbiV0mhZPwWo7nOcQ6XVzaw3QBvyr3ymePbffos+sHIxisJcxFmrB6rVk5gbMVB -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  zypvBHAkVAeP -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----END CERTIFICATE----- -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----BEGIN CERTIFICATE----- -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MIIEfTCCA2WgAwIBAgITGwAAAAYT1yV2z7sOjgAAAAAABjANBgkqhkiG9w0BAQsF -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  ADAnMSUwIwYDVQQDExxVUyBDZW5zdXMgQnVyZWF1IExhYiBSb290IENBMB4XDTIx -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MTEyNjIwMTYxOVoXDTI2MTEyNjIwMjYxOVowaTETMBEGCgmSJomT8ixkARkWA2dv -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  djEWMBQGCgmSJomT8ixkARkWBmNlbnN1czETMBEGCgmSJomT8ixkARkWA2VhZDEl -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MCMGA1UEAxMcVVMgQ2Vuc3VzIEJ1cmVhdSBMQUIgQ0EgU3ViMTCCASIwDQYJKoZI -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  hvcNAQEBBQADggEPADCCAQoCggEBAKrCmRIvbSY/bdBqsyWoFz48+6wOO7ogTjOy -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  gq4Wg9u+aCo/Q8GRqJblXlwoi4gwFkkuUWzYNo8AqOOKja963vWNEMoGbBxSuD2y -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  cuil9lH8Jj3IzXfRk/GxrvUdDS5Py44BkuxDgGHf+bH0oqR8cnSetRRG4QTNYaiX -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  eamnFDZ+eTvMIUGR2POWW2ug/7Q7XhFqjgbQmiBc5CAM5cEOTv5PxYwasukhfh+N -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  qla3eGFAoBNcExPM6P3HC3BEc6XGPV3C/zGyUCx8C9/NQJg4P/5fzbD6fbvi4QT0 -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  cjN04wycaPrtbFGvFfx0hPIiGe8wx2AwKOLNFY0x5Dev6i9/XmkCAwEAAaOCAV4w -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  ggFaMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRRRblKt+uz/w8Nu5qDQQNP -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  h4RhBjAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBS4tDTlYPaCI9CLxl/V9DgWkf1rRzBg -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  BgNVHR8EWTBXMFWgU6BRhk9odHRwOi8vcGtpLnRjby5jZW5zdXMuZ292L0NlcnRF -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  bnJvbGwvVVMlMjBDZW5zdXMlMjBCdXJlYXUlMjBMYWIlMjBSb290JTIwQ0EuY3Js -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MGsGCCsGAQUFBwEBBF8wXTBbBggrBgEFBQcwAoZPaHR0cDovL3BraS50Y28uY2Vu -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  c3VzLmdvdi9DZXJ0RW5yb2xsL1VTJTIwQ2Vuc3VzJTIwQnVyZWF1JTIwTGFiJTIw -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  Um9vdCUyMENBLmNydDANBgkqhkiG9w0BAQsFAAOCAQEAfmW2+ziP9KZROJCRLqCp -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  CrGp/1SSaB0ujzWQsptkPuRPeANxjHckpuwoyI79/x8N/U5ms07huAmIPkQCTZ9X -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  N9seXVWpC13/KHpyAL39yi2FFrusdhWs2KzTK1VJ0j/zezxEmo74SH/xVhgWgmk0 -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  asuYCFrnrjQuBE8HeulkLdJaP0FEjHfjtyS3jpobXonEqL1n26R+2dUf3NmMCkeU -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  n6BRAgntlwRkcN1vsaNfkmAEY6G8+4pjq5Nsw+/VPu/QryXqr9REcG61ZsVGPDE4 -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  xbjL7J7IPjhShfwUPkjPwavjrgMSG6zhnvCIB3goOKNw1C4I/xvEwMDVUmxdQkOi -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  +g== -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----END CERTIFICATE----- -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----BEGIN CERTIFICATE----- -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MIIDKTCCAhGgAwIBAgIQcOQ4n0XKkatBwiq9ZSN+PDANBgkqhkiG9w0BAQsFADAn -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MSUwIwYDVQQDExxVUyBDZW5zdXMgQnVyZWF1IExhYiBSb290IENBMB4XDTIxMDEy -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  NTE1MjMyN1oXDTMxMDEyNTE1MzMyNFowJzElMCMGA1UEAxMcVVMgQ2Vuc3VzIEJ1 -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  cmVhdSBMYWIgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  AOLx6Ja6IHWtN/LhfNBJI/xVcE9sFhDzhWrevbCl1Yjm/4o2mPl4xa3D8XqsPwHd -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  2U5tekSUHQaKbNpUpNrKmjPnvW3CoddP+pnGvEnngG1ufkjFj58Oc8s48mJZd79j -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  BDfe7HohLTA6eCrYUvftPLv408ZSeCRIJEinokiS5TEBCie0Sg7qthSxOeBAdfmY -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  R48jrDE1aeu0RCZoQOj9eGLCUOGpQf8FDCe7kzOeAZQtpGXIaoZyJ1H0iZJ/1Tss -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  KCwqN43LfIdFoPmdJqVxcSFUMnzA+TI7oZc7Omih3EP6kWtTC/snUHk2dApANdL6 -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  fmVTntPAmKS+UKzU3flYEt8CAwEAAaNRME8wCwYDVR0PBAQDAgGGMA8GA1UdEwEB -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  /wQFMAMBAf8wHQYDVR0OBBYEFLi0NOVg9oIj0IvGX9X0OBaR/WtHMBAGCSsGAQQB -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  gjcVAQQDAgEAMA0GCSqGSIb3DQEBCwUAA4IBAQBzBeiQ6mFoGfUSYE+JFwsG4+sQ -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  7673ysWEN+3ZpQibkzVuTCKMv/2h1HaspX7UBpbjlFI2OCfPk3vF71rXE9T458+H -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  5/FzeWrgBaSwglIotNwV17ObaHtVFjtkOHo5Tm5DW28Xf1bskkez8cIo2mgPqSxX -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  5SN2P3eW4nj95mqNN/LOOybBoHbWaIZPy5R74QweJ/rPVYpex9psD5lSoJxgjZcr -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  wVXx/61oHNfghAB1xQu3z3COHUKq8xszlOeb3KxxRPLPW28Ue4FvWYosaVMOo6eu -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  FSIHxFZu9sxCG2fhS0VgYEFWuXnfYGn8gBE3tbFZxnJklnnzPmnNUXGpurgE -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----END CERTIFICATE----- -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  EOT -> null -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - certificate_signing_request = <<-EOT -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----BEGIN CERTIFICATE REQUEST----- -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MIICrDCCAZQCAQAwZzELMAkGA1UEBhMCVVMxGzAZBgNVBAoTElUuUy4gQ2Vuc3Vz -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  IEJ1cmVhdTEQMA4GA1UECxMHUEtJLUVLUzEpMCcGA1UEAxMgdWdlMSBwbGF0Zm9y -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  bS1lbmctZWtzLW1jbSBJc3N1ZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  AoIBAQDoNTxlxF51v+vBsVauftcFikcVJoaBMII3rwMY+yOiJOEKjs1SfaTlbM+A -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  Kx9dZgRze0wSZRaT/PugWnRasPz2Y80cHLIBA2vuHZ9bmHnlPQDQ4ufXDEmvD/Uf -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MkRmejveRGduw37TT3gpD90UP46qHwTVYQ5pm9l19Pv9UKbxr/JxVFYBy8X1TUtO -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  BFrCmRGo3t10vNPYIgIHGJAhZRDF6HRm1zzgNJ6Y5NQcU+Bsb/ROESSx4jVlrVke -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  3oA6oCvTFfejUmH0zlOULxUCTeJo7emRqHROaYEj/NJvG9Kx8Fi8X0yzRvmsXSdv -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  WzsWMFBJbIQvlVDl4B+EyFF0XN/9AgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEA -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  KLfR5S5rDetfEuQjRWokkA8B9iF0PRfAyRcdTLxsN81skAyjRfpzTl/pbPZDEt0T -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  rGZf46C8IoPkAyaiTC1fqyEhnwkqE3g9CaGJK/watA9gsum5+Dk1Q9p3MyijqOSn -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  eherNpXl7B6KzKjQ2ASzfxEwWSCuQa9j1Lkk6+jdhXedqQW9UNyos1MJk5VKZKDg -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  zDi9KMy26geUdFvpZ9++hh+R5qd0JaWsIb2Ml+xmh6Gme3oidKLhV3kmeExDX7iJ -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  QO1Zui0cYtDgNftm5t7uPFvBNIR97hgklFn+3LxBVxGQE0nsN3/HV9bgfCwGcPka -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  bGTYXnS0SDFxNU0NjSvg9w== -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----END CERTIFICATE REQUEST----- -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  EOT -> null -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - id = "arn:aws-us-gov:acm-pca:us-gov-east-1:269222635945:certificate-authority/e928587e-c254-4a87-a2c3-31a972e76d21/certificate/4ca26227928051641831bcd9eb842020" -> null -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - signing_algorithm = "SHA384WITHRSA" -> null -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - template_arn = (sensitive value) -> null -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - validity { -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - type = "DAYS" -> null -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - value = "365" -> null -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  # module.subordinate_ca.module.certificate.tls_cert_request.certificate will be destroyed -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - resource "tls_cert_request" "certificate" { -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - cert_request_pem = <<-EOT -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----BEGIN CERTIFICATE REQUEST----- -19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MIICrDCCAZQCAQAwZzELMAkGA1UEBhMCVVMxGzAZBgNVBAoTElUuUy4gQ2Vuc3Vz -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  IEJ1cmVhdTEQMA4GA1UECxMHUEtJLUVLUzEpMCcGA1UEAxMgdWdlMSBwbGF0Zm9y -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  bS1lbmctZWtzLW1jbSBJc3N1ZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  AoIBAQDoNTxlxF51v+vBsVauftcFikcVJoaBMII3rwMY+yOiJOEKjs1SfaTlbM+A -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  Kx9dZgRze0wSZRaT/PugWnRasPz2Y80cHLIBA2vuHZ9bmHnlPQDQ4ufXDEmvD/Uf -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  MkRmejveRGduw37TT3gpD90UP46qHwTVYQ5pm9l19Pv9UKbxr/JxVFYBy8X1TUtO -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  BFrCmRGo3t10vNPYIgIHGJAhZRDF6HRm1zzgNJ6Y5NQcU+Bsb/ROESSx4jVlrVke -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  3oA6oCvTFfejUmH0zlOULxUCTeJo7emRqHROaYEj/NJvG9Kx8Fi8X0yzRvmsXSdv -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  WzsWMFBJbIQvlVDl4B+EyFF0XN/9AgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEA -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  KLfR5S5rDetfEuQjRWokkA8B9iF0PRfAyRcdTLxsN81skAyjRfpzTl/pbPZDEt0T -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  rGZf46C8IoPkAyaiTC1fqyEhnwkqE3g9CaGJK/watA9gsum5+Dk1Q9p3MyijqOSn -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  eherNpXl7B6KzKjQ2ASzfxEwWSCuQa9j1Lkk6+jdhXedqQW9UNyos1MJk5VKZKDg -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  zDi9KMy26geUdFvpZ9++hh+R5qd0JaWsIb2Ml+xmh6Gme3oidKLhV3kmeExDX7iJ -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  QO1Zui0cYtDgNftm5t7uPFvBNIR97hgklFn+3LxBVxGQE0nsN3/HV9bgfCwGcPka -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  bGTYXnS0SDFxNU0NjSvg9w== -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  -----END CERTIFICATE REQUEST----- -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  EOT -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - dns_names = [] -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - id = "64d67b231f99677dca495c34e105cc607fd6fb57" -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - ip_addresses = [] -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - key_algorithm = "RSA" -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - private_key_pem = (sensitive value) -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - uris = [] -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - subject { -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - common_name = "uge1 platform-eng-eks-mcm Issuer" -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - country = "US" -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - organization = "U.S. Census Bureau" -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - organizational_unit = "PKI-EKS" -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  # module.subordinate_ca.module.certificate.tls_private_key.certificate will be destroyed -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - resource "tls_private_key" "certificate" { -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - algorithm = "RSA" -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - ecdsa_curve = "P224" -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - id = "ae6e5b5654c32ad1098e6ad42a22c7d99cf18f23" -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - private_key_openssh = (sensitive value) -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - private_key_pem = (sensitive value) -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - private_key_pem_pkcs8 = (sensitive value) -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - public_key_fingerprint_md5 = "75:af:85:36:87:41:a7:e6:da:d8:40:94:0a:92:c9:68" -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - public_key_fingerprint_sha256 = "SHA256:TVuwWEMd0s3nqCHfp5zWj+pA23hz5SKWHkZ6N2Kh2YE" -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - public_key_openssh = <<-EOT -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoNTxlxF51v+vBsVauftcFikcVJoaBMII3rwMY+yOiJOEKjs1SfaTlbM+AKx9dZgRze0wSZRaT/PugWnRasPz2Y80cHLIBA2vuHZ9bmHnlPQDQ4ufXDEmvD/UfMkRmejveRGduw37TT3gpD90UP46qHwTVYQ5pm9l19Pv9UKbxr/JxVFYBy8X1TUtOBFrCmRGo3t10vNPYIgIHGJAhZRDF6HRm1zzgNJ6Y5NQcU+Bsb/ROESSx4jVlrVke3oA6oCvTFfejUmH0zlOULxUCTeJo7emRqHROaYEj/NJvG9Kx8Fi8X0yzRvmsXSdvWzsWMFBJbIQvlVDl4B+EyFF0XN/9 -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  EOT -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - public_key_pem = <<-EOT -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  -----BEGIN PUBLIC KEY----- -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6DU8ZcRedb/rwbFWrn7X -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  BYpHFSaGgTCCN68DGPsjoiThCo7NUn2k5WzPgCsfXWYEc3tMEmUWk/z7oFp0WrD8 -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  9mPNHByyAQNr7h2fW5h55T0A0OLn1wxJrw/1HzJEZno73kRnbsN+0094KQ/dFD+O -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  qh8E1WEOaZvZdfT7/VCm8a/ycVRWAcvF9U1LTgRawpkRqN7ddLzT2CICBxiQIWUQ -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  xeh0Ztc84DSemOTUHFPgbG/0ThEkseI1Za1ZHt6AOqAr0xX3o1Jh9M5TlC8VAk3i -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  aO3pkah0TmmBI/zSbxvSsfBYvF9Ms0b5rF0nb1s7FjBQSWyEL5VQ5eAfhMhRdFzf -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  /QIDAQAB -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  -----END PUBLIC KEY----- -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  EOT -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - rsa_bits = 2048 -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  } -19:57:38.834 STDOUT [eks-cert-manager] terraform_current: Plan: 0 to add, 0 to change, 19 to destroy. -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  -19:57:38.834 STDOUT [eks-cert-manager] terraform_current: Changes to Outputs: -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - cluster_issuer_name = "cert-manager" -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - module_name = "tfmod-cert-mgr" -> null -19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - module_version = "0.0.2" -> null -19:57:39.447 STDOUT [eks-cert-manager] terraform_current: kubectl_manifest.clusterissuer: Destroying... [id=/apis/cert-manager.io/v1/clusterissuers/clusterissuer] -19:57:40.304 STDOUT [eks-cert-manager] terraform_current: kubectl_manifest.clusterissuer: Destruction complete after 1s -19:57:40.309 STDOUT [eks-cert-manager] terraform_current: kubernetes_secret.ca_key_pair: Destroying... [id=cert-manager/ca-key-pair] -19:57:40.312 STDOUT [eks-cert-manager] terraform_current: helm_release.cert_manager: Destroying... [id=cert-manager] -19:57:41.171 STDOUT [eks-cert-manager] terraform_current: kubernetes_secret.ca_key_pair: Destruction complete after 1s -19:57:41.180 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.aws_acmpca_certificate.certificate: Destroying... [id=arn:aws-us-gov:acm-pca:us-gov-east-1:269222635945:certificate-authority/e928587e-c254-4a87-a2c3-31a972e76d21/certificate/4ca26227928051641831bcd9eb842020] -19:57:41.409 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.aws_acmpca_certificate.certificate: Destruction complete after 0s -19:57:41.412 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.tls_cert_request.certificate: Destroying... [id=64d67b231f99677dca495c34e105cc607fd6fb57] -19:57:41.413 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.tls_cert_request.certificate: Destruction complete after 0s -19:57:41.414 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.tls_private_key.certificate: Destroying... [id=ae6e5b5654c32ad1098e6ad42a22c7d99cf18f23] -19:57:41.415 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.tls_private_key.certificate: Destruction complete after 0s -19:57:46.620 STDOUT [eks-cert-manager] terraform_current: helm_release.cert_manager: Destruction complete after 7s -19:57:46.621 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-cainjector"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-cainjector] -19:57:46.622 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-startupapicheck#v1.15.1"]: Destroying... [id=6900975909197805264] -19:57:46.627 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-webhook#v1.15.1"]: Destroying... [id=5737089486470790152] -19:57:46.627 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-webhook"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-webhook] -19:57:46.627 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-cainjector#v1.15.1"]: Destroying... [id=2605876329532083347] -19:57:46.627 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-startupapicheck"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck] -19:57:46.628 STDOUT [eks-cert-manager] terraform_current: kubernetes_namespace.cert_manager: Destroying... [id=cert-manager] -19:57:46.628 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-webhook#v1.15.1"]: Destruction complete after 0s -19:57:46.628 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-startupapicheck#v1.15.1"]: Destruction complete after 0s -19:57:46.628 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-controller#v1.15.1"]: Destroying... [id=2232048202721537040] -19:57:46.628 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-controller"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-controller] -19:57:46.628 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-cainjector#v1.15.1"]: Destruction complete after 0s -19:57:46.629 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-controller#v1.15.1"]: Destruction complete after 0s -19:57:46.766 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-controller"]: Destruction complete after 0s -19:57:46.772 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-startupapicheck"]: Destruction complete after 0s -19:57:46.773 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-webhook"]: Destruction complete after 0s -19:57:46.773 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-cainjector"]: Destruction complete after 0s -19:57:46.775 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-controller"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-controller] -19:57:46.775 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-cainjector"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-cainjector] -19:57:46.775 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-startupapicheck"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck] -19:57:46.775 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-webhook"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-webhook] -19:57:46.972 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-webhook"]: Destruction complete after 0s -19:57:46.973 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-startupapicheck"]: Destruction complete after 0s -19:57:46.976 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-controller"]: Destruction complete after 0s -19:57:46.979 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-cainjector"]: Destruction complete after 0s -19:57:53.076 STDOUT [eks-cert-manager] terraform_current: kubernetes_namespace.cert_manager: Destruction complete after 6s -19:57:53.249 STDOUT [eks-cert-manager] terraform_current: ╷ -19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ Warning: Helm uninstall returned an information message -19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │  -19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ These resources were kept due to the resource policy: -19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ [CustomResourceDefinition] certificaterequests.cert-manager.io -19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ [CustomResourceDefinition] certificates.cert-manager.io -19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ [CustomResourceDefinition] challenges.acme.cert-manager.io -19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ [CustomResourceDefinition] clusterissuers.cert-manager.io -19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ [CustomResourceDefinition] issuers.cert-manager.io -19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ [CustomResourceDefinition] orders.acme.cert-manager.io -19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │  -19:57:53.249 STDOUT [eks-cert-manager] terraform_current: ╵ -19:57:53.312 STDOUT [eks-cert-manager] terraform_current:  -19:57:53.312 STDOUT [eks-cert-manager] terraform_current: Destroy complete! Resources: 19 destroyed. -19:57:53.312 STDOUT [eks-cert-manager] terraform_current:  -19:58:03.325 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_caller_identity.current[0]: Reading... -19:58:03.325 STDOUT [eks] terraform_current: data.aws_caller_identity.current: Reading... -19:58:03.325 STDOUT [eks] terraform_current: data.aws_iam_roles.roles: Reading... -19:58:03.325 STDOUT [eks] terraform_current: data.aws_ebs_default_kms_key.current: Reading... -19:58:03.325 STDOUT [eks] terraform_current: data.aws_vpc.eks_vpc: Reading... -19:58:03.325 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_partition.current: Reading... -19:58:03.325 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_caller_identity.current: Reading... -19:58:03.325 STDOUT [eks] terraform_current: data.aws_region.current: Reading... -19:58:03.325 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_region.current: Reading... -19:58:03.327 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_partition.current[0]: Reading... -19:58:03.329 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] -19:58:03.329 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_partition.current[0]: Read complete after 0s [id=aws-us-gov] -19:58:03.329 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:58:03.329 STDOUT [eks] terraform_current: data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:58:03.330 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_partition.current: Reading... -19:58:03.330 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_caller_identity.current: Reading... -19:58:03.331 STDOUT [eks] terraform_current: module.cluster.aws_cloudwatch_log_group.this[0]: Refreshing state... [id=/aws/eks/platform-eng-eks-mcm/cluster] -19:58:03.331 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] -19:58:03.331 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.efs_csi[0]: Reading... -19:58:03.334 STDOUT [eks] terraform_current: module.cluster.data.aws_partition.current: Reading... -19:58:03.334 STDOUT [eks] terraform_current: module.cluster.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] -19:58:03.334 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_caller_identity.current: Reading... -19:58:03.335 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.efs_csi[0]: Read complete after 0s [id=3064053908] -19:58:03.337 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_partition.current: Reading... -19:58:03.337 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] -19:58:03.338 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_region.current: Reading... -19:58:03.338 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:58:03.339 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_partition.current: Reading... -19:58:03.340 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] -19:58:03.340 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_region.current: Reading... -19:58:03.341 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:58:03.342 STDOUT [eks] terraform_current: module.cluster.data.aws_caller_identity.current: Reading... -19:58:03.357 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_caller_identity.current[0]: Read complete after 0s [id=224384469011] -19:58:03.358 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_caller_identity.current: Reading... -19:58:03.387 STDOUT [eks] terraform_current: data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:58:03.390 STDOUT [eks] terraform_current: aws_vpc.vpc: Refreshing state... [id=vpc-06a2a192783bb40aa] -19:58:03.418 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:58:03.418 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_region.current: Reading... -19:58:03.420 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] -19:58:03.421 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_policy_document.assume_role_policy[0]: Reading... -19:58:03.423 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_policy_document.assume_role_policy[0]: Read complete after 0s [id=2764486067] -19:58:03.446 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_policy.efs_csi[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EFS_CSI_Policy-20240906231012047900000001] -19:58:03.448 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:58:03.450 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:58:03.452 STDOUT [eks] terraform_current: data.aws_arn.current: Reading... -19:58:03.453 STDOUT [eks] terraform_current: data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -19:58:03.453 STDOUT [eks] terraform_current: module.cluster.aws_iam_role.this[0]: Refreshing state... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004] -19:58:03.454 STDOUT [eks] terraform_current: module.cluster.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:58:03.455 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.vpc_cni[0]: Reading... -19:58:03.457 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.vpc_cni[0]: Read complete after 0s [id=3004485257] -19:58:03.459 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.ebs_csi[0]: Reading... -19:58:03.460 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:58:03.465 STDOUT [eks] terraform_current: data.aws_ebs_default_kms_key.current: Read complete after 0s [id=us-gov-east-1] -19:58:03.466 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.ebs_csi[0]: Read complete after 0s [id=4196553001] -19:58:03.674 STDOUT [eks] terraform_current: data.aws_iam_roles.roles: Read complete after 1s [id=us-gov-east-1] -19:58:03.815 STDOUT [eks] terraform_current: data.aws_vpc.eks_vpc: Read complete after 1s [id=vpc-0280f77b373744eaa] -19:58:03.920 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_session_context.current: Reading... -19:58:03.920 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_policy.vpc_cni[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_CNI_Policy-20240906231012049100000003] -19:58:03.923 STDOUT [eks] terraform_current: data.aws_kms_key.ebs_key: Reading... -19:58:03.924 STDOUT [eks] terraform_current: data.aws_subnets.container_subnets: Reading... -19:58:03.928 STDOUT [eks] terraform_current: data.aws_subnets.subnets: Reading... -19:58:03.940 STDOUT [eks] terraform_current: data.aws_subnets.lb_subnets: Reading... -19:58:04.029 STDOUT [eks] terraform_current: data.aws_kms_key.ebs_key: Read complete after 0s [id=e0543b2b-c3f1-49a5-bfa7-87eec859be03] -19:58:04.031 STDOUT [eks] terraform_current: data.aws_subnets.container_subnets: Read complete after 0s [id=us-gov-east-1] -19:58:04.031 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EBS_CSI_Policy-20240906231012048000000002] -19:58:04.037 STDOUT [eks] terraform_current: aws_security_group.all_worker_mgmt: Refreshing state... [id=sg-0117da2c13b4caf21] -19:58:04.041 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_session_context.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] -19:58:04.042 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Refreshing state... [id=subnet-02c2250b9ec2dd6a2,kubernetes.io/cluster/platform-eng-eks-mcm] -19:58:04.048 STDOUT [eks] terraform_current: data.aws_subnets.subnets: Read complete after 0s [id=us-gov-east-1] -19:58:04.049 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Refreshing state... [id=subnet-078b228071c609a50,kubernetes.io/cluster/platform-eng-eks-mcm] -19:58:04.052 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Refreshing state... [id=subnet-07a6339be3670fb41,kubernetes.io/cluster/platform-eng-eks-mcm] -19:58:04.098 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Refreshing state... [id=sg-0b4880f2bae65a949] -19:58:04.101 STDOUT [eks] terraform_current: data.aws_subnets.lb_subnets: Read complete after 0s [id=us-gov-east-1] -19:58:04.101 STDOUT [eks] terraform_current: module.cluster.aws_security_group.cluster[0]: Refreshing state... [id=sg-0ebcc111357300f20] -19:58:04.111 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-078b228071c609a50"]: Reading... -19:58:04.113 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-02c2250b9ec2dd6a2"]: Reading... -19:58:04.133 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-07a6339be3670fb41"]: Reading... -19:58:04.149 STDOUT [eks] terraform_current: data.aws_vpc.dummy_vpc[0]: Reading... -19:58:04.152 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"]: Refreshing state... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004-20240906231013127100000009] -19:58:04.181 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"]: Refreshing state... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004-20240906231013126400000008] -19:58:04.189 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-078b228071c609a50"]: Read complete after 0s [id=subnet-078b228071c609a50] -19:58:04.190 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-01e04b945b2bfe1de"]: Refreshing state... [id=subnet-01e04b945b2bfe1de,kubernetes.io/role/internal-nlb] -19:58:04.197 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-0e3786cf42e38af3d"]: Refreshing state... [id=subnet-0e3786cf42e38af3d,kubernetes.io/role/internal-nlb] -19:58:04.250 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-046047345c5af7fb1"]: Refreshing state... [id=subnet-046047345c5af7fb1,kubernetes.io/role/internal-nlb] -19:58:04.261 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-07a6339be3670fb41"]: Read complete after 0s [id=subnet-07a6339be3670fb41] -19:58:04.261 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-02c2250b9ec2dd6a2"]: Read complete after 0s [id=subnet-02c2250b9ec2dd6a2] -19:58:04.265 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_caller_identity.current: Reading... -19:58:04.265 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_partition.current: Reading... -19:58:04.267 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_partition.current: Read complete after 0s [id=aws-us-gov] -19:58:04.271 STDOUT [eks] terraform_current: aws_security_group.additional_eks_cluster_sg: Refreshing state... [id=sg-0fac44214371189c5] -19:58:04.276 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_6443_webhook"]: Refreshing state... [id=sgrule-2139797237] -19:58:04.277 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["egress_all"]: Refreshing state... [id=sgrule-2399073099] -19:58:04.292 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_iam_policy_document.this[0]: Reading... -19:58:04.296 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_udp"]: Refreshing state... [id=sgrule-155164117] -19:58:04.296 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=2915671129] -19:58:04.299 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_8443_webhook"]: Refreshing state... [id=sgrule-1825999572] -19:58:04.301 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_caller_identity.current: Read complete after 0s [id=224384469011] -19:58:04.302 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_443"]: Refreshing state... [id=sgrule-1028926182] -19:58:04.309 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_kubelet"]: Refreshing state... [id=sgrule-1630915307] -19:58:04.362 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_9443_webhook"]: Refreshing state... [id=sgrule-142063903] -19:58:04.413 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_tcp"]: Refreshing state... [id=sgrule-2908765754] -19:58:04.418 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_nodes_ephemeral"]: Refreshing state... [id=sgrule-3683901971] -19:58:04.426 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_4443_webhook"]: Refreshing state... [id=sgrule-3066614115] -19:58:04.433 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_iam_policy_document.assume_role_policy[0]: Reading... -19:58:04.433 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.cluster["ingress_nodes_443"]: Refreshing state... [id=sgrule-2999123215] -19:58:04.434 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_iam_policy_document.assume_role_policy[0]: Read complete after 0s [id=2560088296] -19:58:04.437 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_key.this[0]: Refreshing state... [id=548a1f15-3b65-467e-b6cf-4e1aa13bb9fc] -19:58:04.451 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role.this[0]: Refreshing state... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007] -19:58:04.483 STDOUT [eks] terraform_current: data.aws_vpc.dummy_vpc[0]: Read complete after 0s [id=vpc-06a2a192783bb40aa] -19:58:04.485 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Refreshing state... [id=Z0123131367CLDFLTDGZ4] -19:58:04.581 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_alias.this["cluster"]: Refreshing state... [id=alias/eks/platform-eng-eks-mcm] -19:58:04.582 STDOUT [eks] terraform_current: module.cluster.aws_iam_policy.cluster_encryption[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/platform-eng-eks-mcm-cluster-ClusterEncryption2024090623103380160000000e] -19:58:04.583 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Refreshing state... [id=platform-eng-eks-mcm] -19:58:04.798 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.cluster_encryption[0]: Refreshing state... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004-2024090623103435260000000f] -19:58:04.803 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"]: Refreshing state... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101328910000000b] -19:58:04.803 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"]: Refreshing state... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101328450000000a] -19:58:04.804 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"]: Refreshing state... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101329060000000c] -19:58:04.851 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t2"]: Refreshing state... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa] -19:58:04.852 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t4"]: Refreshing state... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06] -19:58:04.852 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["cluster_creator"]: Refreshing state... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/r-inf-terraform] -19:58:04.854 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t1"]: Refreshing state... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c] -19:58:04.906 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t3"]: Refreshing state... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8] -19:58:04.909 STDOUT [eks] terraform_current: module.cluster.data.tls_certificate.this[0]: Reading... -19:58:04.909 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["CostAllocation"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,CostAllocation] -19:58:04.914 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:created_by"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,boc:created_by] -19:58:05.047 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["cluster:size"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,cluster:size] -19:58:05.053 STDOUT [eks] terraform_current: module.cluster.data.tls_certificate.this[0]: Read complete after 0s [id=a7b75161712f0d7327a9fabac7ee5068c8ef141d] -19:58:05.054 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["slim:schedule"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,slim:schedule] -19:58:05.056 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["Environment"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,Environment] -19:58:05.067 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["eks-cluster-name"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,eks-cluster-name] -19:58:05.114 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_name"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,boc:tf_module_name] -19:58:05.122 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_version"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,boc:tf_module_version] -19:58:05.133 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Refreshing state... [id=2024-09-06T23:19:27Z] -19:58:05.139 STDOUT [eks] terraform_current: aws_security_group_rule.allow_sidecar_injection: Refreshing state... [id=sgrule-3033127033] -19:58:05.162 STDOUT [eks] terraform_current: module.cluster.aws_iam_openid_connect_provider.oidc_provider[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926] -19:58:05.169 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].module.user_data.null_resource.validate_cluster_service_cidr: Refreshing state... [id=4612407423035214643] -19:58:05.188 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_launch_template.this[0]: Refreshing state... [id=lt-0cab502ac2f52bb98] -19:58:05.279 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_iam_policy_document.this[0]: Reading... -19:58:05.279 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Reading... -19:58:05.282 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.this[0]: Reading... -19:58:05.282 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Reading... -19:58:05.282 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=3292555451] -19:58:05.283 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=3983450380] -19:58:05.283 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=4013958737] -19:58:05.283 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=1901716639] -19:58:05.283 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role.this[0]: Refreshing state... [id=platform-eng-eks-mcm-cloudwatch-observability] -19:58:05.286 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role.this[0]: Refreshing state... [id=platform-eng-eks-mcm-ebs-csi-driver] -19:58:05.286 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role.this[0]: Refreshing state... [id=platform-eng-eks-mcm-efs-csi-driver] -19:58:05.287 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role.this[0]: Refreshing state... [id=platform-eng-eks-mcm-vpc-cni] -19:58:05.328 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Refreshing state... [id=platform-eng-eks-mcm:eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017] -19:58:05.596 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role_policy_attachment.efs_csi[0]: Refreshing state... [id=platform-eng-eks-mcm-efs-csi-driver-20240906231859316700000011] -19:58:05.601 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role_policy_attachment.vpc_cni[0]: Refreshing state... [id=platform-eng-eks-mcm-vpc-cni-20240906231859418300000013] -19:58:05.612 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0]: Refreshing state... [id=platform-eng-eks-mcm-ebs-csi-driver-20240906231859237400000010] -19:58:05.622 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["kube-proxy"]: Reading... -19:58:05.622 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["eks-pod-identity-agent"]: Reading... -19:58:05.622 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-ebs-csi-driver"]: Reading... -19:58:05.622 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["amazon-cloudwatch-observability"]: Reading... -19:58:05.642 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["snapshot-controller"]: Reading... -19:58:05.700 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-efs-csi-driver"]: Reading... -19:58:05.701 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["vpc-cni"]: Reading... -19:58:05.723 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["coredns"]: Reading... -19:58:05.801 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["eks-pod-identity-agent"]: Read complete after 0s [id=eks-pod-identity-agent] -19:58:05.802 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["AWSXrayWriteOnlyAccess"]: Refreshing state... [id=platform-eng-eks-mcm-cloudwatch-observability-20240906231859417100000012] -19:58:05.858 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["coredns"]: Read complete after 0s [id=coredns] -19:58:05.859 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["CloudWatchAgentServerPolicy"]: Refreshing state... [id=platform-eng-eks-mcm-cloudwatch-observability-20240906231859464700000014] -19:58:05.863 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["kube-proxy"]: Read complete after 0s [id=kube-proxy] -19:58:05.870 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["snapshot-controller"]: Read complete after 0s [id=snapshot-controller] -19:58:05.884 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["amazon-cloudwatch-observability"]: Read complete after 0s [id=amazon-cloudwatch-observability] -19:58:05.885 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-efs-csi-driver"]: Read complete after 0s [id=aws-efs-csi-driver] -19:58:06.146 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t1_admin"]: Refreshing state... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] -19:58:06.146 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t3_admin"]: Refreshing state... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] -19:58:06.146 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["cluster_creator_admin"]: Refreshing state... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/r-inf-terraform#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] -19:58:06.146 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t4_admin"]: Refreshing state... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] -19:58:06.146 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t2_admin"]: Refreshing state... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] -19:58:06.234 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["vpc-cni"]: Read complete after 0s [id=vpc-cni] -19:58:06.336 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-ebs-csi-driver"]: Read complete after 0s [id=aws-ebs-csi-driver] -19:58:06.338 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Refreshing state... [id=platform-eng-eks-mcm:amazon-cloudwatch-observability] -19:58:06.339 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Refreshing state... [id=platform-eng-eks-mcm:vpc-cni] -19:58:06.339 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Refreshing state... [id=platform-eng-eks-mcm:aws-efs-csi-driver] -19:58:06.339 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Refreshing state... [id=platform-eng-eks-mcm:eks-pod-identity-agent] -19:58:06.339 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Refreshing state... [id=platform-eng-eks-mcm:aws-ebs-csi-driver] -19:58:06.495 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Refreshing state... [id=platform-eng-eks-mcm:snapshot-controller] -19:58:06.496 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Refreshing state... [id=platform-eng-eks-mcm:coredns] -19:58:06.511 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Refreshing state... [id=platform-eng-eks-mcm:kube-proxy] -19:58:10.334 STDOUT [eks] terraform_current: null_resource.kube_config_create: Refreshing state... [id=1982734664315419478] -19:58:12.137 STDOUT [eks] terraform_current: Terraform used the selected providers to generate the following execution -19:58:12.137 STDOUT [eks] terraform_current: plan. Resource actions are indicated with the following symbols: -19:58:12.137 STDOUT [eks] terraform_current:  - destroy -19:58:12.137 STDOUT [eks] terraform_current: Terraform will perform the following actions: -19:58:12.137 STDOUT [eks] terraform_current:  # aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"] will be destroyed -19:58:12.137 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "container_subnets" { -19:58:12.137 STDOUT [eks] terraform_current:  - id = "subnet-02c2250b9ec2dd6a2,kubernetes.io/cluster/platform-eng-eks-mcm" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - key = "kubernetes.io/cluster/platform-eng-eks-mcm" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - resource_id = "subnet-02c2250b9ec2dd6a2" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - value = "shared" -> null -19:58:12.137 STDOUT [eks] terraform_current:  } -19:58:12.137 STDOUT [eks] terraform_current:  # aws_ec2_tag.container_subnets["subnet-078b228071c609a50"] will be destroyed -19:58:12.137 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "container_subnets" { -19:58:12.137 STDOUT [eks] terraform_current:  - id = "subnet-078b228071c609a50,kubernetes.io/cluster/platform-eng-eks-mcm" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - key = "kubernetes.io/cluster/platform-eng-eks-mcm" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - resource_id = "subnet-078b228071c609a50" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - value = "shared" -> null -19:58:12.137 STDOUT [eks] terraform_current:  } -19:58:12.137 STDOUT [eks] terraform_current:  # aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"] will be destroyed -19:58:12.137 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "container_subnets" { -19:58:12.137 STDOUT [eks] terraform_current:  - id = "subnet-07a6339be3670fb41,kubernetes.io/cluster/platform-eng-eks-mcm" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - key = "kubernetes.io/cluster/platform-eng-eks-mcm" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - resource_id = "subnet-07a6339be3670fb41" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - value = "shared" -> null -19:58:12.137 STDOUT [eks] terraform_current:  } -19:58:12.137 STDOUT [eks] terraform_current:  # aws_ec2_tag.lb_subnets["subnet-01e04b945b2bfe1de"] will be destroyed -19:58:12.137 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "lb_subnets" { -19:58:12.137 STDOUT [eks] terraform_current:  - id = "subnet-01e04b945b2bfe1de,kubernetes.io/role/internal-nlb" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - key = "kubernetes.io/role/internal-nlb" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - resource_id = "subnet-01e04b945b2bfe1de" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - value = "1" -> null -19:58:12.137 STDOUT [eks] terraform_current:  } -19:58:12.137 STDOUT [eks] terraform_current:  # aws_ec2_tag.lb_subnets["subnet-046047345c5af7fb1"] will be destroyed -19:58:12.137 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "lb_subnets" { -19:58:12.137 STDOUT [eks] terraform_current:  - id = "subnet-046047345c5af7fb1,kubernetes.io/role/internal-nlb" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - key = "kubernetes.io/role/internal-nlb" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - resource_id = "subnet-046047345c5af7fb1" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - value = "1" -> null -19:58:12.137 STDOUT [eks] terraform_current:  } -19:58:12.137 STDOUT [eks] terraform_current:  # aws_ec2_tag.lb_subnets["subnet-0e3786cf42e38af3d"] will be destroyed -19:58:12.137 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "lb_subnets" { -19:58:12.137 STDOUT [eks] terraform_current:  - id = "subnet-0e3786cf42e38af3d,kubernetes.io/role/internal-nlb" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - key = "kubernetes.io/role/internal-nlb" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - resource_id = "subnet-0e3786cf42e38af3d" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - value = "1" -> null -19:58:12.137 STDOUT [eks] terraform_current:  } -19:58:12.137 STDOUT [eks] terraform_current:  # aws_route53_zone.cluster_domain will be destroyed -19:58:12.137 STDOUT [eks] terraform_current:  - resource "aws_route53_zone" "cluster_domain" { -19:58:12.137 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:route53:::hostedzone/Z0123131367CLDFLTDGZ4" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - comment = "platform-eng-eks-mcm EKS Cluster DNS Zone" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - force_destroy = false -> null -19:58:12.137 STDOUT [eks] terraform_current:  - id = "Z0123131367CLDFLTDGZ4" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - name_servers = [ -19:58:12.137 STDOUT [eks] terraform_current:  - "ns-0.awsdns-us-gov-00.com.", -19:58:12.137 STDOUT [eks] terraform_current:  - "ns-1024.awsdns-us-gov-00.org.", -19:58:12.137 STDOUT [eks] terraform_current:  - "ns-1536.awsdns-us-gov-00.us.", -19:58:12.137 STDOUT [eks] terraform_current:  - "ns-512.awsdns-us-gov-00.net.", -19:58:12.137 STDOUT [eks] terraform_current:  ] -> null -19:58:12.137 STDOUT [eks] terraform_current:  - primary_name_server = "ns-0.awsdns-us-gov-00.com." -> null -19:58:12.137 STDOUT [eks] terraform_current:  - tags = { -19:58:12.137 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.137 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" -19:58:12.137 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.137 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.137 STDOUT [eks] terraform_current:  } -> null -19:58:12.137 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.137 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.137 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" -19:58:12.137 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.137 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.137 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.137 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.137 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.137 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.137 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.137 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.137 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.137 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.137 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.137 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.137 STDOUT [eks] terraform_current:  } -> null -19:58:12.137 STDOUT [eks] terraform_current:  - zone_id = "Z0123131367CLDFLTDGZ4" -> null -19:58:12.137 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.137 STDOUT [eks] terraform_current:  - vpc { -19:58:12.137 STDOUT [eks] terraform_current:  - vpc_id = "vpc-06a2a192783bb40aa" -> null -19:58:12.137 STDOUT [eks] terraform_current:  - vpc_region = "us-gov-east-1" -> null -19:58:12.137 STDOUT [eks] terraform_current:  } -19:58:12.137 STDOUT [eks] terraform_current:  } -19:58:12.137 STDOUT [eks] terraform_current:  # aws_security_group.additional_eks_cluster_sg will be destroyed -19:58:12.138 STDOUT [eks] terraform_current:  - resource "aws_security_group" "additional_eks_cluster_sg" { -19:58:12.138 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:security-group/sg-0fac44214371189c5" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - description = "Managed by Terraform" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - egress = [ -19:58:12.138 STDOUT [eks] terraform_current:  - { -19:58:12.138 STDOUT [eks] terraform_current:  - cidr_blocks = [ -19:58:12.138 STDOUT [eks] terraform_current:  - "0.0.0.0/0", -19:58:12.138 STDOUT [eks] terraform_current:  ] -19:58:12.138 STDOUT [eks] terraform_current:  - from_port = 0 -19:58:12.138 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.138 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.138 STDOUT [eks] terraform_current:  - protocol = "-1" -19:58:12.138 STDOUT [eks] terraform_current:  - security_groups = [] -19:58:12.138 STDOUT [eks] terraform_current:  - self = false -19:58:12.138 STDOUT [eks] terraform_current:  - to_port = 0 -19:58:12.138 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.138 STDOUT [eks] terraform_current:  }, -19:58:12.138 STDOUT [eks] terraform_current:  ] -> null -19:58:12.138 STDOUT [eks] terraform_current:  - id = "sg-0fac44214371189c5" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - ingress = [ -19:58:12.138 STDOUT [eks] terraform_current:  - { -19:58:12.138 STDOUT [eks] terraform_current:  - cidr_blocks = [ -19:58:12.138 STDOUT [eks] terraform_current:  - "148.129.0.0/16", -19:58:12.138 STDOUT [eks] terraform_current:  - "172.16.0.0/12", -19:58:12.138 STDOUT [eks] terraform_current:  - "192.168.0.0/16", -19:58:12.138 STDOUT [eks] terraform_current:  - "10.0.0.0/8", -19:58:12.138 STDOUT [eks] terraform_current:  ] -19:58:12.138 STDOUT [eks] terraform_current:  - from_port = 443 -19:58:12.138 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.138 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.138 STDOUT [eks] terraform_current:  - protocol = "tcp" -19:58:12.138 STDOUT [eks] terraform_current:  - security_groups = [] -19:58:12.138 STDOUT [eks] terraform_current:  - self = false -19:58:12.138 STDOUT [eks] terraform_current:  - to_port = 443 -19:58:12.138 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.138 STDOUT [eks] terraform_current:  }, -19:58:12.138 STDOUT [eks] terraform_current:  - { -19:58:12.138 STDOUT [eks] terraform_current:  - cidr_blocks = [] -19:58:12.138 STDOUT [eks] terraform_current:  - from_port = 0 -19:58:12.138 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.138 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.138 STDOUT [eks] terraform_current:  - protocol = "-1" -19:58:12.138 STDOUT [eks] terraform_current:  - security_groups = [ -19:58:12.138 STDOUT [eks] terraform_current:  - "sg-0117da2c13b4caf21", -19:58:12.138 STDOUT [eks] terraform_current:  ] -19:58:12.138 STDOUT [eks] terraform_current:  - self = false -19:58:12.138 STDOUT [eks] terraform_current:  - to_port = 0 -19:58:12.138 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.138 STDOUT [eks] terraform_current:  }, -19:58:12.138 STDOUT [eks] terraform_current:  ] -> null -19:58:12.138 STDOUT [eks] terraform_current:  - name = "eks-platform-eng-eks-mcm-cluster" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - owner_id = "224384469011" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - revoke_rules_on_delete = false -> null -19:58:12.138 STDOUT [eks] terraform_current:  - tags = { -19:58:12.138 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.138 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.138 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-cluster" -19:58:12.138 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.138 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.138 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.138 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.138 STDOUT [eks] terraform_current:  } -> null -19:58:12.138 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.138 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.138 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.138 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-cluster" -19:58:12.138 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.138 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.138 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.138 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.138 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.138 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.138 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.138 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.138 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.138 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.138 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.138 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.138 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.138 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.138 STDOUT [eks] terraform_current:  } -> null -19:58:12.138 STDOUT [eks] terraform_current:  - vpc_id = "vpc-0280f77b373744eaa" -> null -19:58:12.138 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.138 STDOUT [eks] terraform_current:  } -19:58:12.138 STDOUT [eks] terraform_current:  # aws_security_group.all_worker_mgmt will be destroyed -19:58:12.138 STDOUT [eks] terraform_current:  - resource "aws_security_group" "all_worker_mgmt" { -19:58:12.138 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:security-group/sg-0117da2c13b4caf21" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - description = "Managed by Terraform" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - egress = [ -19:58:12.138 STDOUT [eks] terraform_current:  - { -19:58:12.138 STDOUT [eks] terraform_current:  - cidr_blocks = [ -19:58:12.138 STDOUT [eks] terraform_current:  - "0.0.0.0/0", -19:58:12.138 STDOUT [eks] terraform_current:  ] -19:58:12.138 STDOUT [eks] terraform_current:  - from_port = 0 -19:58:12.138 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.138 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.138 STDOUT [eks] terraform_current:  - protocol = "-1" -19:58:12.138 STDOUT [eks] terraform_current:  - security_groups = [] -19:58:12.138 STDOUT [eks] terraform_current:  - self = false -19:58:12.138 STDOUT [eks] terraform_current:  - to_port = 0 -19:58:12.138 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.138 STDOUT [eks] terraform_current:  }, -19:58:12.138 STDOUT [eks] terraform_current:  ] -> null -19:58:12.138 STDOUT [eks] terraform_current:  - id = "sg-0117da2c13b4caf21" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - ingress = [ -19:58:12.138 STDOUT [eks] terraform_current:  - { -19:58:12.138 STDOUT [eks] terraform_current:  - cidr_blocks = [ -19:58:12.138 STDOUT [eks] terraform_current:  - "10.129.32.0/19", -19:58:12.138 STDOUT [eks] terraform_current:  ] -19:58:12.138 STDOUT [eks] terraform_current:  - from_port = 0 -19:58:12.138 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.138 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.138 STDOUT [eks] terraform_current:  - protocol = "-1" -19:58:12.138 STDOUT [eks] terraform_current:  - security_groups = [] -19:58:12.138 STDOUT [eks] terraform_current:  - self = false -19:58:12.138 STDOUT [eks] terraform_current:  - to_port = 0 -19:58:12.138 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.138 STDOUT [eks] terraform_current:  }, -19:58:12.138 STDOUT [eks] terraform_current:  ] -> null -19:58:12.138 STDOUT [eks] terraform_current:  - name = "eks-platform-eng-eks-mcm-all-worker-mgmt" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - owner_id = "224384469011" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - revoke_rules_on_delete = false -> null -19:58:12.138 STDOUT [eks] terraform_current:  - tags = { -19:58:12.138 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.138 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.138 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-all-worker-mgmt" -19:58:12.138 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.138 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.138 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.138 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.138 STDOUT [eks] terraform_current:  } -> null -19:58:12.138 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.138 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.138 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.138 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-all-worker-mgmt" -19:58:12.138 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.138 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.138 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.138 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.138 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.138 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.138 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.138 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.138 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.138 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.138 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.138 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.138 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.138 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.138 STDOUT [eks] terraform_current:  } -> null -19:58:12.138 STDOUT [eks] terraform_current:  - vpc_id = "vpc-0280f77b373744eaa" -> null -19:58:12.138 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.138 STDOUT [eks] terraform_current:  } -19:58:12.138 STDOUT [eks] terraform_current:  # aws_security_group_rule.allow_sidecar_injection will be destroyed -19:58:12.138 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "allow_sidecar_injection" { -19:58:12.138 STDOUT [eks] terraform_current:  - description = "Webhook container port, from Control Plane" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - from_port = 15017 -> null -19:58:12.138 STDOUT [eks] terraform_current:  - id = "sgrule-3033127033" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-0dea60d34332ea498" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - self = false -> null -19:58:12.138 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-08e15e3b8fb3384d2" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - to_port = 15017 -> null -19:58:12.138 STDOUT [eks] terraform_current:  - type = "ingress" -> null -19:58:12.138 STDOUT [eks] terraform_current:  } -19:58:12.138 STDOUT [eks] terraform_current:  # aws_vpc.vpc will be destroyed -19:58:12.138 STDOUT [eks] terraform_current:  - resource "aws_vpc" "vpc" { -19:58:12.138 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:vpc/vpc-06a2a192783bb40aa" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - assign_generated_ipv6_cidr_block = false -> null -19:58:12.138 STDOUT [eks] terraform_current:  - cidr_block = "192.168.0.0/24" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - default_network_acl_id = "acl-01ccefcdd28c53d21" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - default_route_table_id = "rtb-0ca3e7e5feb126598" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - default_security_group_id = "sg-0618fd50cdfb33d3c" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - dhcp_options_id = "dopt-0b1d01ed725ca4b4d" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - enable_dns_hostnames = false -> null -19:58:12.138 STDOUT [eks] terraform_current:  - enable_dns_support = false -> null -19:58:12.138 STDOUT [eks] terraform_current:  - enable_network_address_usage_metrics = false -> null -19:58:12.138 STDOUT [eks] terraform_current:  - id = "vpc-06a2a192783bb40aa" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - instance_tenancy = "default" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - ipv6_netmask_length = 0 -> null -19:58:12.138 STDOUT [eks] terraform_current:  - main_route_table_id = "rtb-0ca3e7e5feb126598" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - owner_id = "224384469011" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - tags = { -19:58:12.138 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.138 STDOUT [eks] terraform_current:  - "Name" = "vpc0-dummy" -19:58:12.138 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.138 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.138 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.138 STDOUT [eks] terraform_current:  } -> null -19:58:12.138 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.138 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.138 STDOUT [eks] terraform_current:  - "Name" = "vpc0-dummy" -19:58:12.138 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.138 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.138 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.138 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.138 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.138 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.138 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.138 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.138 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.138 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.138 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.138 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.138 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.138 STDOUT [eks] terraform_current:  } -> null -19:58:12.138 STDOUT [eks] terraform_current:  # (4 unchanged attributes hidden) -19:58:12.138 STDOUT [eks] terraform_current:  } -19:58:12.138 STDOUT [eks] terraform_current:  # null_resource.kube_config_create will be destroyed -19:58:12.138 STDOUT [eks] terraform_current:  - resource "null_resource" "kube_config_create" { -19:58:12.138 STDOUT [eks] terraform_current:  - id = "1982734664315419478" -> null -19:58:12.138 STDOUT [eks] terraform_current:  } -19:58:12.138 STDOUT [eks] terraform_current:  # module.cloudwatch_observability_irsa_role.aws_iam_role.this[0] will be destroyed -19:58:12.138 STDOUT [eks] terraform_current:  - resource "aws_iam_role" "this" { -19:58:12.138 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cloudwatch-observability" -> null -19:58:12.138 STDOUT [eks] terraform_current:  - assume_role_policy = jsonencode( -19:58:12.138 STDOUT [eks] terraform_current:  { -19:58:12.139 STDOUT [eks] terraform_current:  - Statement = [ -19:58:12.139 STDOUT [eks] terraform_current:  - { -19:58:12.139 STDOUT [eks] terraform_current:  - Action = "sts:AssumeRoleWithWebIdentity" -19:58:12.139 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.139 STDOUT [eks] terraform_current:  - StringEquals = { -19:58:12.139 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:aud" = "sts.amazonaws.com" -19:58:12.139 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:sub" = "system:serviceaccount:amazon-cloudwatch:cloudwatch-agent" -19:58:12.139 STDOUT [eks] terraform_current:  } -19:58:12.139 STDOUT [eks] terraform_current:  } -19:58:12.139 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.139 STDOUT [eks] terraform_current:  - Principal = { -19:58:12.139 STDOUT [eks] terraform_current:  - Federated = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -19:58:12.139 STDOUT [eks] terraform_current:  } -19:58:12.139 STDOUT [eks] terraform_current:  }, -19:58:12.139 STDOUT [eks] terraform_current:  ] -19:58:12.139 STDOUT [eks] terraform_current:  - Version = "2012-10-17" -19:58:12.139 STDOUT [eks] terraform_current:  } -19:58:12.139 STDOUT [eks] terraform_current:  ) -> null -19:58:12.139 STDOUT [eks] terraform_current:  - create_date = "2024-09-06T23:18:58Z" -> null -19:58:12.139 STDOUT [eks] terraform_current:  - force_detach_policies = true -> null -19:58:12.139 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-cloudwatch-observability" -> null -19:58:12.139 STDOUT [eks] terraform_current:  - managed_policy_arns = [ -19:58:12.139 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess", -19:58:12.139 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/CloudWatchAgentServerPolicy", -19:58:12.139 STDOUT [eks] terraform_current:  ] -> null -19:58:12.139 STDOUT [eks] terraform_current:  - max_session_duration = 3600 -> null -19:58:12.139 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-cloudwatch-observability" -> null -19:58:12.139 STDOUT [eks] terraform_current:  - path = "/" -> null -19:58:12.139 STDOUT [eks] terraform_current:  - tags = { -19:58:12.139 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.139 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.139 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.139 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.139 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.139 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.139 STDOUT [eks] terraform_current:  } -> null -19:58:12.139 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.139 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.139 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.139 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.139 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.139 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.139 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.139 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.139 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.139 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.139 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.139 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.139 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.139 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.139 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.139 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.139 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.139 STDOUT [eks] terraform_current:  } -> null -19:58:12.139 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJ4OAQYV5YC" -> null -19:58:12.139 STDOUT [eks] terraform_current:  # (3 unchanged attributes hidden) -19:58:12.139 STDOUT [eks] terraform_current:  } -19:58:12.139 STDOUT [eks] terraform_current:  # module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["AWSXrayWriteOnlyAccess"] will be destroyed -19:58:12.139 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "amazon_cloudwatch_observability" { -19:58:12.139 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-cloudwatch-observability-20240906231859417100000012" -> null -19:58:12.139 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess" -> null -19:58:12.139 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-cloudwatch-observability" -> null -19:58:12.139 STDOUT [eks] terraform_current:  } -19:58:12.139 STDOUT [eks] terraform_current:  # module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["CloudWatchAgentServerPolicy"] will be destroyed -19:58:12.139 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "amazon_cloudwatch_observability" { -19:58:12.139 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-cloudwatch-observability-20240906231859464700000014" -> null -19:58:12.139 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/CloudWatchAgentServerPolicy" -> null -19:58:12.139 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-cloudwatch-observability" -> null -19:58:12.139 STDOUT [eks] terraform_current:  } -19:58:12.139 STDOUT [eks] terraform_current:  # module.cluster.aws_cloudwatch_log_group.this[0] will be destroyed -19:58:12.139 STDOUT [eks] terraform_current:  - resource "aws_cloudwatch_log_group" "this" { -19:58:12.139 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:logs:us-gov-east-1:224384469011:log-group:/aws/eks/platform-eng-eks-mcm/cluster" -> null -19:58:12.139 STDOUT [eks] terraform_current:  - id = "/aws/eks/platform-eng-eks-mcm/cluster" -> null -19:58:12.139 STDOUT [eks] terraform_current:  - log_group_class = "STANDARD" -> null -19:58:12.139 STDOUT [eks] terraform_current:  - name = "/aws/eks/platform-eng-eks-mcm/cluster" -> null -19:58:12.139 STDOUT [eks] terraform_current:  - retention_in_days = 90 -> null -19:58:12.139 STDOUT [eks] terraform_current:  - skip_destroy = false -> null -19:58:12.139 STDOUT [eks] terraform_current:  - tags = { -19:58:12.139 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.139 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.139 STDOUT [eks] terraform_current:  - "Name" = "/aws/eks/platform-eng-eks-mcm/cluster" -19:58:12.139 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.139 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.139 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.139 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.139 STDOUT [eks] terraform_current:  } -> null -19:58:12.139 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.139 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.139 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.139 STDOUT [eks] terraform_current:  - "Name" = "/aws/eks/platform-eng-eks-mcm/cluster" -19:58:12.139 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.139 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.139 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.139 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.139 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.139 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.139 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.139 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.139 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.139 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.139 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.139 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.139 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.140 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.140 STDOUT [eks] terraform_current:  } -> null -19:58:12.140 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) -19:58:12.140 STDOUT [eks] terraform_current:  } -19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["CostAllocation"] will be destroyed -19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { -19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,CostAllocation" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - key = "CostAllocation" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - value = "csvd:infrastructure" -> null -19:58:12.140 STDOUT [eks] terraform_current:  } -19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["Environment"] will be destroyed -19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { -19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,Environment" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - key = "Environment" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - value = "dev" -> null -19:58:12.140 STDOUT [eks] terraform_current:  } -19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:created_by"] will be destroyed -19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { -19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,boc:created_by" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - key = "boc:created_by" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - value = "terraform" -> null -19:58:12.140 STDOUT [eks] terraform_current:  } -19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_name"] will be destroyed -19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { -19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,boc:tf_module_name" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - key = "boc:tf_module_name" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - value = "tfmod-eks" -> null -19:58:12.140 STDOUT [eks] terraform_current:  } -19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_version"] will be destroyed -19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { -19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,boc:tf_module_version" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - key = "boc:tf_module_version" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - value = "0.1.0" -> null -19:58:12.140 STDOUT [eks] terraform_current:  } -19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["cluster:size"] will be destroyed -19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { -19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,cluster:size" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - key = "cluster:size" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - value = "min:2-max:10-desired:2" -> null -19:58:12.140 STDOUT [eks] terraform_current:  } -19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["eks-cluster-name"] will be destroyed -19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { -19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,eks-cluster-name" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - key = "eks-cluster-name" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - value = "platform-eng-eks-mcm" -> null -19:58:12.140 STDOUT [eks] terraform_current:  } -19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["slim:schedule"] will be destroyed -19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { -19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,slim:schedule" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - key = "slim:schedule" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - value = "8:00-17:00" -> null -19:58:12.140 STDOUT [eks] terraform_current:  } -19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["cluster_creator"] will be destroyed -19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_eks_access_entry" "this" { -19:58:12.140 STDOUT [eks] terraform_current:  - access_entry_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:access-entry/platform-eng-eks-mcm/role/224384469011/r-inf-terraform/44c8e4d1-1cb2-d879-3039-106077cdfece" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:18:59Z" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/r-inf-terraform" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - kubernetes_groups = [] -> null -19:58:12.140 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:18:59Z" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/r-inf-terraform" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - tags = { -19:58:12.140 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.140 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.140 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.140 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.140 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.140 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.140 STDOUT [eks] terraform_current:  } -> null -19:58:12.140 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.140 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.140 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.140 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.140 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.140 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.140 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.140 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.140 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.140 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.140 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.140 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.140 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.140 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.140 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.140 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.140 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.140 STDOUT [eks] terraform_current:  } -> null -19:58:12.140 STDOUT [eks] terraform_current:  - type = "STANDARD" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - user_name = "arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/{{SessionName}}" -> null -19:58:12.140 STDOUT [eks] terraform_current:  } -19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t1"] will be destroyed -19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_eks_access_entry" "this" { -19:58:12.140 STDOUT [eks] terraform_current:  - access_entry_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:access-entry/platform-eng-eks-mcm/role/224384469011/AWSReservedSSO_inf-admin-t1_bff436a09282202c/b6c8e4d1-1cab-d5cd-4664-174f19358e27" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:18:57Z" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - kubernetes_groups = [] -> null -19:58:12.140 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:18:57Z" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - tags = { -19:58:12.140 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.140 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.140 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.140 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.140 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.140 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.140 STDOUT [eks] terraform_current:  } -> null -19:58:12.140 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.140 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.140 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.140 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.140 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.140 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.140 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.140 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.140 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.140 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.140 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.140 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.140 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.140 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.140 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.140 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.140 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.140 STDOUT [eks] terraform_current:  } -> null -19:58:12.140 STDOUT [eks] terraform_current:  - type = "STANDARD" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - user_name = "arn:aws-us-gov:sts::224384469011:assumed-role/AWSReservedSSO_inf-admin-t1_bff436a09282202c/{{SessionName}}" -> null -19:58:12.140 STDOUT [eks] terraform_current:  } -19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t2"] will be destroyed -19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_eks_access_entry" "this" { -19:58:12.140 STDOUT [eks] terraform_current:  - access_entry_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:access-entry/platform-eng-eks-mcm/role/224384469011/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa/76c8e4d1-1cad-fcc2-5484-f0828c9a8066" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:18:57Z" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - kubernetes_groups = [] -> null -19:58:12.140 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:18:57Z" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa" -> null -19:58:12.140 STDOUT [eks] terraform_current:  - tags = { -19:58:12.140 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.140 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.140 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.140 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.140 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.140 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.140 STDOUT [eks] terraform_current:  } -> null -19:58:12.141 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.141 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.141 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.141 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.141 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.141 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.141 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.141 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.141 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.141 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.141 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.141 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.141 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.141 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.141 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.141 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.141 STDOUT [eks] terraform_current:  } -> null -19:58:12.141 STDOUT [eks] terraform_current:  - type = "STANDARD" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - user_name = "arn:aws-us-gov:sts::224384469011:assumed-role/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa/{{SessionName}}" -> null -19:58:12.141 STDOUT [eks] terraform_current:  } -19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t3"] will be destroyed -19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_access_entry" "this" { -19:58:12.141 STDOUT [eks] terraform_current:  - access_entry_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:access-entry/platform-eng-eks-mcm/role/224384469011/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8/00c8e4d1-1c5a-98f6-acdd-02759274b1bd" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:18:58Z" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - kubernetes_groups = [] -> null -19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:18:58Z" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - tags = { -19:58:12.141 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.141 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.141 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.141 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.141 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.141 STDOUT [eks] terraform_current:  } -> null -19:58:12.141 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.141 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.141 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.141 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.141 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.141 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.141 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.141 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.141 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.141 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.141 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.141 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.141 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.141 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.141 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.141 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.141 STDOUT [eks] terraform_current:  } -> null -19:58:12.141 STDOUT [eks] terraform_current:  - type = "STANDARD" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - user_name = "arn:aws-us-gov:sts::224384469011:assumed-role/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8/{{SessionName}}" -> null -19:58:12.141 STDOUT [eks] terraform_current:  } -19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t4"] will be destroyed -19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_access_entry" "this" { -19:58:12.141 STDOUT [eks] terraform_current:  - access_entry_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:access-entry/platform-eng-eks-mcm/role/224384469011/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06/0cc8e4d1-1c55-bd3c-fddf-976e9d46d5a2" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:18:57Z" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - kubernetes_groups = [] -> null -19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:18:57Z" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - tags = { -19:58:12.141 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.141 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.141 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.141 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.141 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.141 STDOUT [eks] terraform_current:  } -> null -19:58:12.141 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.141 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.141 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.141 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.141 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.141 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.141 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.141 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.141 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.141 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.141 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.141 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.141 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.141 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.141 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.141 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.141 STDOUT [eks] terraform_current:  } -> null -19:58:12.141 STDOUT [eks] terraform_current:  - type = "STANDARD" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - user_name = "arn:aws-us-gov:sts::224384469011:assumed-role/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06/{{SessionName}}" -> null -19:58:12.141 STDOUT [eks] terraform_current:  } -19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["cluster_creator_admin"] will be destroyed -19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_access_policy_association" "this" { -19:58:12.141 STDOUT [eks] terraform_current:  - associated_at = "2024-09-06 23:19:00.059 +0000 UTC" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/r-inf-terraform#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06 23:19:00.059 +0000 UTC" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/r-inf-terraform" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - access_scope { -19:58:12.141 STDOUT [eks] terraform_current:  - namespaces = [] -> null -19:58:12.141 STDOUT [eks] terraform_current:  - type = "cluster" -> null -19:58:12.141 STDOUT [eks] terraform_current:  } -19:58:12.141 STDOUT [eks] terraform_current:  } -19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t1_admin"] will be destroyed -19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_access_policy_association" "this" { -19:58:12.141 STDOUT [eks] terraform_current:  - associated_at = "2024-09-06 23:19:00.098 +0000 UTC" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06 23:19:00.098 +0000 UTC" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - access_scope { -19:58:12.141 STDOUT [eks] terraform_current:  - namespaces = [] -> null -19:58:12.141 STDOUT [eks] terraform_current:  - type = "cluster" -> null -19:58:12.141 STDOUT [eks] terraform_current:  } -19:58:12.141 STDOUT [eks] terraform_current:  } -19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t2_admin"] will be destroyed -19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_access_policy_association" "this" { -19:58:12.141 STDOUT [eks] terraform_current:  - associated_at = "2024-09-06 23:19:00.358 +0000 UTC" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06 23:19:00.358 +0000 UTC" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - access_scope { -19:58:12.141 STDOUT [eks] terraform_current:  - namespaces = [] -> null -19:58:12.141 STDOUT [eks] terraform_current:  - type = "cluster" -> null -19:58:12.141 STDOUT [eks] terraform_current:  } -19:58:12.141 STDOUT [eks] terraform_current:  } -19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t3_admin"] will be destroyed -19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_access_policy_association" "this" { -19:58:12.141 STDOUT [eks] terraform_current:  - associated_at = "2024-09-06 23:19:00.034 +0000 UTC" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06 23:19:00.034 +0000 UTC" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - access_scope { -19:58:12.141 STDOUT [eks] terraform_current:  - namespaces = [] -> null -19:58:12.141 STDOUT [eks] terraform_current:  - type = "cluster" -> null -19:58:12.141 STDOUT [eks] terraform_current:  } -19:58:12.141 STDOUT [eks] terraform_current:  } -19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t4_admin"] will be destroyed -19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_access_policy_association" "this" { -19:58:12.141 STDOUT [eks] terraform_current:  - associated_at = "2024-09-06 23:19:00.952 +0000 UTC" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06 23:19:00.952 +0000 UTC" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - access_scope { -19:58:12.141 STDOUT [eks] terraform_current:  - namespaces = [] -> null -19:58:12.141 STDOUT [eks] terraform_current:  - type = "cluster" -> null -19:58:12.141 STDOUT [eks] terraform_current:  } -19:58:12.141 STDOUT [eks] terraform_current:  } -19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"] will be destroyed -19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { -19:58:12.141 STDOUT [eks] terraform_current:  - addon_name = "amazon-cloudwatch-observability" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - addon_version = "v2.0.1-eksbuild.1" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/amazon-cloudwatch-observability/2ac8e4d2-2c04-6704-27b0-a1bb60118d9d" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:17Z" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:amazon-cloudwatch-observability" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:51Z" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - preserve = true -> null -19:58:12.141 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cloudwatch-observability" -> null -19:58:12.141 STDOUT [eks] terraform_current:  - tags = { -19:58:12.141 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.141 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.141 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.141 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.141 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.141 STDOUT [eks] terraform_current:  } -> null -19:58:12.141 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.141 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.141 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.141 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.141 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.142 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.142 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.142 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.142 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.142 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.142 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.142 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.142 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.142 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.142 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.142 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.142 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.142 STDOUT [eks] terraform_current:  } -> null -19:58:12.142 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.142 STDOUT [eks] terraform_current:  - timeouts {} -19:58:12.142 STDOUT [eks] terraform_current:  } -19:58:12.142 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"] will be destroyed -19:58:12.142 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { -19:58:12.142 STDOUT [eks] terraform_current:  - addon_name = "aws-ebs-csi-driver" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - addon_version = "v1.34.0-eksbuild.1" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/aws-ebs-csi-driver/62c8e4d2-2bef-0957-943e-07efc3b80681" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:aws-ebs-csi-driver" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:04Z" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - preserve = true -> null -19:58:12.142 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-ebs-csi-driver" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - tags = { -19:58:12.142 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.142 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.142 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.142 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.142 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.142 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.142 STDOUT [eks] terraform_current:  } -> null -19:58:12.142 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.142 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.142 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.142 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.142 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.142 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.142 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.142 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.142 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.142 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.142 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.142 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.142 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.142 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.142 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.142 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.142 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.142 STDOUT [eks] terraform_current:  } -> null -19:58:12.142 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.142 STDOUT [eks] terraform_current:  - timeouts {} -19:58:12.142 STDOUT [eks] terraform_current:  } -19:58:12.142 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["aws-efs-csi-driver"] will be destroyed -19:58:12.142 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { -19:58:12.142 STDOUT [eks] terraform_current:  - addon_name = "aws-efs-csi-driver" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - addon_version = "v2.0.7-eksbuild.1" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/aws-efs-csi-driver/28c8e4d2-2bf4-26d6-f4f0-ccf8aace8809" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:aws-efs-csi-driver" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:00Z" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - preserve = true -> null -19:58:12.142 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-efs-csi-driver" -> null -19:58:12.142 STDOUT [eks] terraform_current:  - tags = { -19:58:12.142 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.142 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.142 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.142 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.142 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.142 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.142 STDOUT [eks] terraform_current:  } -> null -19:58:12.142 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.142 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.142 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.142 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.142 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.142 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.142 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.142 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.142 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.142 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.142 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.142 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.142 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.142 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.142 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.143 STDOUT [eks] terraform_current:  } -> null -19:58:12.143 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.143 STDOUT [eks] terraform_current:  - timeouts {} -19:58:12.143 STDOUT [eks] terraform_current:  } -19:58:12.143 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["coredns"] will be destroyed -19:58:12.143 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { -19:58:12.143 STDOUT [eks] terraform_current:  - addon_name = "coredns" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - addon_version = "v1.11.3-eksbuild.1" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/coredns/5ac8e4d2-2bfa-f4ad-ab07-4e665df2f85a" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:coredns" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:01Z" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - preserve = true -> null -19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - tags = { -19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.143 STDOUT [eks] terraform_current:  } -> null -19:58:12.143 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.143 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.143 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.143 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.143 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.143 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.143 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.143 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.143 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.143 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.143 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.143 STDOUT [eks] terraform_current:  } -> null -19:58:12.143 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) -19:58:12.143 STDOUT [eks] terraform_current:  - timeouts {} -19:58:12.143 STDOUT [eks] terraform_current:  } -19:58:12.143 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["eks-pod-identity-agent"] will be destroyed -19:58:12.143 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { -19:58:12.143 STDOUT [eks] terraform_current:  - addon_name = "eks-pod-identity-agent" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - addon_version = "v1.3.2-eksbuild.2" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/eks-pod-identity-agent/e0c8e4d2-2bf6-9e6b-b631-4771b0216ea6" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:eks-pod-identity-agent" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:53Z" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - preserve = true -> null -19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - tags = { -19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.143 STDOUT [eks] terraform_current:  } -> null -19:58:12.143 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.143 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.143 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.143 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.143 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.143 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.143 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.143 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.143 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.143 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.143 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.143 STDOUT [eks] terraform_current:  } -> null -19:58:12.143 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) -19:58:12.143 STDOUT [eks] terraform_current:  - timeouts {} -19:58:12.143 STDOUT [eks] terraform_current:  } -19:58:12.143 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["kube-proxy"] will be destroyed -19:58:12.143 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { -19:58:12.143 STDOUT [eks] terraform_current:  - addon_name = "kube-proxy" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - addon_version = "v1.30.3-eksbuild.2" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/kube-proxy/d6c8e4d2-2bf2-1909-954c-94d27c6dac91" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:kube-proxy" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:56Z" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - preserve = true -> null -19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - tags = { -19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.143 STDOUT [eks] terraform_current:  } -> null -19:58:12.143 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.143 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.143 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.143 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.143 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.143 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.143 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.143 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.143 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.143 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.143 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.143 STDOUT [eks] terraform_current:  } -> null -19:58:12.143 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) -19:58:12.143 STDOUT [eks] terraform_current:  - timeouts {} -19:58:12.143 STDOUT [eks] terraform_current:  } -19:58:12.143 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["snapshot-controller"] will be destroyed -19:58:12.143 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { -19:58:12.143 STDOUT [eks] terraform_current:  - addon_name = "snapshot-controller" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - addon_version = "v8.0.0-eksbuild.1" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/snapshot-controller/56c8e4d2-2bfb-634a-35b4-2a9352ccba8f" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:snapshot-controller" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:03Z" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - preserve = true -> null -19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - tags = { -19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.143 STDOUT [eks] terraform_current:  } -> null -19:58:12.143 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.143 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.143 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.143 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.143 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.143 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.143 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.143 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.143 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.143 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.143 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.143 STDOUT [eks] terraform_current:  } -> null -19:58:12.143 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) -19:58:12.143 STDOUT [eks] terraform_current:  - timeouts {} -19:58:12.143 STDOUT [eks] terraform_current:  } -19:58:12.143 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["vpc-cni"] will be destroyed -19:58:12.143 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { -19:58:12.143 STDOUT [eks] terraform_current:  - addon_name = "vpc-cni" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - addon_version = "v1.18.3-eksbuild.2" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/vpc-cni/b8c8e4d2-2bef-7cd0-25c0-8093ffbfd4b0" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:17Z" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:vpc-cni" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:54Z" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - preserve = true -> null -19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-vpc-cni" -> null -19:58:12.143 STDOUT [eks] terraform_current:  - tags = { -19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.143 STDOUT [eks] terraform_current:  } -> null -19:58:12.143 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.143 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.143 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.143 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.143 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.143 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.143 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.143 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.144 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.144 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.144 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.144 STDOUT [eks] terraform_current:  } -> null -19:58:12.144 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.144 STDOUT [eks] terraform_current:  - timeouts {} -19:58:12.144 STDOUT [eks] terraform_current:  } -19:58:12.144 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_cluster.this[0] will be destroyed -19:58:12.144 STDOUT [eks] terraform_current:  - resource "aws_eks_cluster" "this" { -19:58:12.144 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:cluster/platform-eng-eks-mcm" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - bootstrap_self_managed_addons = true -> null -19:58:12.144 STDOUT [eks] terraform_current:  - certificate_authority = [ -19:58:12.144 STDOUT [eks] terraform_current:  - { -19:58:12.144 STDOUT [eks] terraform_current:  - data = "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" -19:58:12.144 STDOUT [eks] terraform_current:  }, -19:58:12.144 STDOUT [eks] terraform_current:  ] -> null -19:58:12.144 STDOUT [eks] terraform_current:  - created_at = "2024-09-06 23:10:35.295 +0000 UTC" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - enabled_cluster_log_types = [ -19:58:12.144 STDOUT [eks] terraform_current:  - "api", -19:58:12.144 STDOUT [eks] terraform_current:  - "audit", -19:58:12.144 STDOUT [eks] terraform_current:  - "authenticator", -19:58:12.144 STDOUT [eks] terraform_current:  - "controllerManager", -19:58:12.144 STDOUT [eks] terraform_current:  - "scheduler", -19:58:12.144 STDOUT [eks] terraform_current:  ] -> null -19:58:12.144 STDOUT [eks] terraform_current:  - endpoint = "https://D896BC3B83782F01D590ACB83BB75926.yl4.us-gov-east-1.eks.amazonaws.com" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - identity = [ -19:58:12.144 STDOUT [eks] terraform_current:  - { -19:58:12.144 STDOUT [eks] terraform_current:  - oidc = [ -19:58:12.144 STDOUT [eks] terraform_current:  - { -19:58:12.144 STDOUT [eks] terraform_current:  - issuer = "https://oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -19:58:12.144 STDOUT [eks] terraform_current:  }, -19:58:12.144 STDOUT [eks] terraform_current:  ] -19:58:12.144 STDOUT [eks] terraform_current:  }, -19:58:12.144 STDOUT [eks] terraform_current:  ] -> null -19:58:12.144 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - platform_version = "eks.8" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cluster-20240906231012049800000004" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - status = "ACTIVE" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - tags = { -19:58:12.144 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.144 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.144 STDOUT [eks] terraform_current:  - "terraform-aws-modules" = "eks" -19:58:12.144 STDOUT [eks] terraform_current:  } -> null -19:58:12.144 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.144 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.144 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.144 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.144 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.144 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.144 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.144 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.144 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.144 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.144 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.144 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.144 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.144 STDOUT [eks] terraform_current:  - "terraform-aws-modules" = "eks" -19:58:12.144 STDOUT [eks] terraform_current:  } -> null -19:58:12.144 STDOUT [eks] terraform_current:  - version = "1.30" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - access_config { -19:58:12.144 STDOUT [eks] terraform_current:  - authentication_mode = "API_AND_CONFIG_MAP" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - bootstrap_cluster_creator_admin_permissions = false -> null -19:58:12.144 STDOUT [eks] terraform_current:  } -19:58:12.144 STDOUT [eks] terraform_current:  - encryption_config { -19:58:12.144 STDOUT [eks] terraform_current:  - resources = [ -19:58:12.144 STDOUT [eks] terraform_current:  - "secrets", -19:58:12.144 STDOUT [eks] terraform_current:  ] -> null -19:58:12.144 STDOUT [eks] terraform_current:  - provider { -19:58:12.144 STDOUT [eks] terraform_current:  - key_arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null -19:58:12.144 STDOUT [eks] terraform_current:  } -19:58:12.144 STDOUT [eks] terraform_current:  } -19:58:12.144 STDOUT [eks] terraform_current:  - kubernetes_network_config { -19:58:12.144 STDOUT [eks] terraform_current:  - ip_family = "ipv4" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - service_ipv4_cidr = "172.20.0.0/16" -> null -19:58:12.144 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.144 STDOUT [eks] terraform_current:  } -19:58:12.144 STDOUT [eks] terraform_current:  - timeouts {} -19:58:12.144 STDOUT [eks] terraform_current:  - upgrade_policy { -19:58:12.144 STDOUT [eks] terraform_current:  - support_type = "EXTENDED" -> null -19:58:12.144 STDOUT [eks] terraform_current:  } -19:58:12.144 STDOUT [eks] terraform_current:  - vpc_config { -19:58:12.144 STDOUT [eks] terraform_current:  - cluster_security_group_id = "sg-08e15e3b8fb3384d2" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - endpoint_private_access = true -> null -19:58:12.144 STDOUT [eks] terraform_current:  - endpoint_public_access = true -> null -19:58:12.144 STDOUT [eks] terraform_current:  - public_access_cidrs = [ -19:58:12.144 STDOUT [eks] terraform_current:  - "0.0.0.0/0", -19:58:12.144 STDOUT [eks] terraform_current:  ] -> null -19:58:12.144 STDOUT [eks] terraform_current:  - security_group_ids = [ -19:58:12.144 STDOUT [eks] terraform_current:  - "sg-0ebcc111357300f20", -19:58:12.144 STDOUT [eks] terraform_current:  ] -> null -19:58:12.144 STDOUT [eks] terraform_current:  - subnet_ids = [ -19:58:12.144 STDOUT [eks] terraform_current:  - "subnet-02c2250b9ec2dd6a2", -19:58:12.144 STDOUT [eks] terraform_current:  - "subnet-078b228071c609a50", -19:58:12.144 STDOUT [eks] terraform_current:  - "subnet-07a6339be3670fb41", -19:58:12.144 STDOUT [eks] terraform_current:  ] -> null -19:58:12.144 STDOUT [eks] terraform_current:  - vpc_id = "vpc-0280f77b373744eaa" -> null -19:58:12.144 STDOUT [eks] terraform_current:  } -19:58:12.144 STDOUT [eks] terraform_current:  } -19:58:12.144 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_openid_connect_provider.oidc_provider[0] will be destroyed -19:58:12.144 STDOUT [eks] terraform_current:  - resource "aws_iam_openid_connect_provider" "oidc_provider" { -19:58:12.144 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - client_id_list = [ -19:58:12.144 STDOUT [eks] terraform_current:  - "sts.amazonaws.com", -19:58:12.144 STDOUT [eks] terraform_current:  ] -> null -19:58:12.144 STDOUT [eks] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - tags = { -19:58:12.144 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.144 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.144 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm-eks-irsa" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.144 STDOUT [eks] terraform_current:  } -> null -19:58:12.144 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.144 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.144 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.144 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm-eks-irsa" -19:58:12.144 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.144 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.144 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.144 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.144 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.144 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.144 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.144 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.144 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.144 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.144 STDOUT [eks] terraform_current:  } -> null -19:58:12.144 STDOUT [eks] terraform_current:  - thumbprint_list = [ -19:58:12.144 STDOUT [eks] terraform_current:  - "9e99a48a9960b14926bb7f3b02e22da2b0ab7280", -19:58:12.144 STDOUT [eks] terraform_current:  ] -> null -19:58:12.144 STDOUT [eks] terraform_current:  - url = "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -> null -19:58:12.144 STDOUT [eks] terraform_current:  } -19:58:12.144 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_policy.cluster_encryption[0] will be destroyed -19:58:12.144 STDOUT [eks] terraform_current:  - resource "aws_iam_policy" "cluster_encryption" { -19:58:12.144 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/platform-eng-eks-mcm-cluster-ClusterEncryption2024090623103380160000000e" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - attachment_count = 1 -> null -19:58:12.144 STDOUT [eks] terraform_current:  - description = "Cluster encryption policy to allow cluster role to utilize CMK provided" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/platform-eng-eks-mcm-cluster-ClusterEncryption2024090623103380160000000e" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-cluster-ClusterEncryption2024090623103380160000000e" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - name_prefix = "platform-eng-eks-mcm-cluster-ClusterEncryption" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - path = "/" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - policy = jsonencode( -19:58:12.144 STDOUT [eks] terraform_current:  { -19:58:12.144 STDOUT [eks] terraform_current:  - Statement = [ -19:58:12.144 STDOUT [eks] terraform_current:  - { -19:58:12.144 STDOUT [eks] terraform_current:  - Action = [ -19:58:12.144 STDOUT [eks] terraform_current:  - "kms:Encrypt", -19:58:12.144 STDOUT [eks] terraform_current:  - "kms:Decrypt", -19:58:12.144 STDOUT [eks] terraform_current:  - "kms:ListGrants", -19:58:12.144 STDOUT [eks] terraform_current:  - "kms:DescribeKey", -19:58:12.144 STDOUT [eks] terraform_current:  ] -19:58:12.144 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.144 STDOUT [eks] terraform_current:  - Resource = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -19:58:12.144 STDOUT [eks] terraform_current:  }, -19:58:12.144 STDOUT [eks] terraform_current:  ] -19:58:12.144 STDOUT [eks] terraform_current:  - Version = "2012-10-17" -19:58:12.144 STDOUT [eks] terraform_current:  } -19:58:12.144 STDOUT [eks] terraform_current:  ) -> null -19:58:12.144 STDOUT [eks] terraform_current:  - policy_id = "ANPATIPS3JAJVQJ4M3C2W" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - tags = { -19:58:12.144 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.144 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.144 STDOUT [eks] terraform_current:  } -> null -19:58:12.144 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.144 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.144 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.144 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.144 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.144 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.144 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.144 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.144 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.144 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.144 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.144 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.144 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.144 STDOUT [eks] terraform_current:  } -> null -19:58:12.144 STDOUT [eks] terraform_current:  } -19:58:12.144 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role.this[0] will be destroyed -19:58:12.144 STDOUT [eks] terraform_current:  - resource "aws_iam_role" "this" { -19:58:12.144 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cluster-20240906231012049800000004" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - assume_role_policy = jsonencode( -19:58:12.144 STDOUT [eks] terraform_current:  { -19:58:12.144 STDOUT [eks] terraform_current:  - Statement = [ -19:58:12.144 STDOUT [eks] terraform_current:  - { -19:58:12.144 STDOUT [eks] terraform_current:  - Action = "sts:AssumeRole" -19:58:12.144 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.144 STDOUT [eks] terraform_current:  - Principal = { -19:58:12.144 STDOUT [eks] terraform_current:  - Service = "eks.amazonaws.com" -19:58:12.144 STDOUT [eks] terraform_current:  } -19:58:12.144 STDOUT [eks] terraform_current:  - Sid = "EKSClusterAssumeRole" -19:58:12.144 STDOUT [eks] terraform_current:  }, -19:58:12.144 STDOUT [eks] terraform_current:  ] -19:58:12.144 STDOUT [eks] terraform_current:  - Version = "2012-10-17" -19:58:12.144 STDOUT [eks] terraform_current:  } -19:58:12.144 STDOUT [eks] terraform_current:  ) -> null -19:58:12.144 STDOUT [eks] terraform_current:  - create_date = "2024-09-06T23:10:12Z" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - force_detach_policies = true -> null -19:58:12.144 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-cluster-20240906231012049800000004" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - managed_policy_arns = [ -19:58:12.144 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/platform-eng-eks-mcm-cluster-ClusterEncryption2024090623103380160000000e", -19:58:12.144 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEKSClusterPolicy", -19:58:12.144 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEKSVPCResourceController", -19:58:12.144 STDOUT [eks] terraform_current:  ] -> null -19:58:12.144 STDOUT [eks] terraform_current:  - max_session_duration = 3600 -> null -19:58:12.144 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-cluster-20240906231012049800000004" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - name_prefix = "platform-eng-eks-mcm-cluster-" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - path = "/" -> null -19:58:12.144 STDOUT [eks] terraform_current:  - tags = { -19:58:12.144 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.144 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.145 STDOUT [eks] terraform_current:  } -> null -19:58:12.145 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.145 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.145 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.145 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.145 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.145 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.145 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.145 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.145 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.145 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.145 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.145 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.145 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.145 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.145 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.145 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.145 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.145 STDOUT [eks] terraform_current:  } -> null -19:58:12.145 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJ6HHWK2XZX" -> null -19:58:12.145 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) -19:58:12.145 STDOUT [eks] terraform_current:  - inline_policy { -19:58:12.145 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-cluster" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - policy = jsonencode( -19:58:12.145 STDOUT [eks] terraform_current:  { -19:58:12.145 STDOUT [eks] terraform_current:  - Statement = [ -19:58:12.145 STDOUT [eks] terraform_current:  - { -19:58:12.145 STDOUT [eks] terraform_current:  - Action = [ -19:58:12.145 STDOUT [eks] terraform_current:  - "logs:CreateLogGroup", -19:58:12.145 STDOUT [eks] terraform_current:  ] -19:58:12.145 STDOUT [eks] terraform_current:  - Effect = "Deny" -19:58:12.145 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.145 STDOUT [eks] terraform_current:  }, -19:58:12.145 STDOUT [eks] terraform_current:  ] -19:58:12.145 STDOUT [eks] terraform_current:  - Version = "2012-10-17" -19:58:12.145 STDOUT [eks] terraform_current:  } -19:58:12.145 STDOUT [eks] terraform_current:  ) -> null -19:58:12.145 STDOUT [eks] terraform_current:  } -19:58:12.145 STDOUT [eks] terraform_current:  } -19:58:12.145 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role_policy_attachment.cluster_encryption[0] will be destroyed -19:58:12.145 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "cluster_encryption" { -19:58:12.145 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-cluster-20240906231012049800000004-2024090623103435260000000f" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/platform-eng-eks-mcm-cluster-ClusterEncryption2024090623103380160000000e" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-cluster-20240906231012049800000004" -> null -19:58:12.145 STDOUT [eks] terraform_current:  } -19:58:12.145 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"] will be destroyed -19:58:12.145 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "this" { -19:58:12.145 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-cluster-20240906231012049800000004-20240906231013127100000009" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKSClusterPolicy" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-cluster-20240906231012049800000004" -> null -19:58:12.145 STDOUT [eks] terraform_current:  } -19:58:12.145 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"] will be destroyed -19:58:12.145 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "this" { -19:58:12.145 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-cluster-20240906231012049800000004-20240906231013126400000008" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKSVPCResourceController" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-cluster-20240906231012049800000004" -> null -19:58:12.145 STDOUT [eks] terraform_current:  } -19:58:12.145 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group.cluster[0] will be destroyed -19:58:12.145 STDOUT [eks] terraform_current:  - resource "aws_security_group" "cluster" { -19:58:12.145 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:security-group/sg-0ebcc111357300f20" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - description = "EKS cluster security group" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - egress = [] -> null -19:58:12.145 STDOUT [eks] terraform_current:  - id = "sg-0ebcc111357300f20" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - ingress = [ -19:58:12.145 STDOUT [eks] terraform_current:  - { -19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - description = "Node groups to cluster API" -19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 443 -19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" -19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ -19:58:12.145 STDOUT [eks] terraform_current:  - "sg-0b4880f2bae65a949", -19:58:12.145 STDOUT [eks] terraform_current:  ] -19:58:12.145 STDOUT [eks] terraform_current:  - self = false -19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 443 -19:58:12.145 STDOUT [eks] terraform_current:  }, -19:58:12.145 STDOUT [eks] terraform_current:  ] -> null -19:58:12.145 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-cluster-20240906231012411100000005" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - name_prefix = "platform-eng-eks-mcm-cluster-" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - owner_id = "224384469011" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - revoke_rules_on_delete = false -> null -19:58:12.145 STDOUT [eks] terraform_current:  - tags = { -19:58:12.145 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.145 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.145 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm-cluster" -19:58:12.145 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.145 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.145 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.145 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.145 STDOUT [eks] terraform_current:  } -> null -19:58:12.145 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.145 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.145 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.145 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm-cluster" -19:58:12.145 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.145 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.145 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.145 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.145 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.145 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.145 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.145 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.145 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.145 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.145 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.145 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.145 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.145 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.145 STDOUT [eks] terraform_current:  } -> null -19:58:12.145 STDOUT [eks] terraform_current:  - vpc_id = "vpc-0280f77b373744eaa" -> null -19:58:12.145 STDOUT [eks] terraform_current:  } -19:58:12.145 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group.node[0] will be destroyed -19:58:12.145 STDOUT [eks] terraform_current:  - resource "aws_security_group" "node" { -19:58:12.145 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:security-group/sg-0b4880f2bae65a949" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - description = "EKS node shared security group" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - egress = [ -19:58:12.145 STDOUT [eks] terraform_current:  - { -19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [ -19:58:12.145 STDOUT [eks] terraform_current:  - "0.0.0.0/0", -19:58:12.145 STDOUT [eks] terraform_current:  ] -19:58:12.145 STDOUT [eks] terraform_current:  - description = "Allow all egress" -19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 0 -19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "-1" -19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [] -19:58:12.145 STDOUT [eks] terraform_current:  - self = false -19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 0 -19:58:12.145 STDOUT [eks] terraform_current:  }, -19:58:12.145 STDOUT [eks] terraform_current:  ] -> null -19:58:12.145 STDOUT [eks] terraform_current:  - id = "sg-0b4880f2bae65a949" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - ingress = [ -19:58:12.145 STDOUT [eks] terraform_current:  - { -19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - description = "Cluster API to node 4443/tcp webhook" -19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 4443 -19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" -19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ -19:58:12.145 STDOUT [eks] terraform_current:  - "sg-0ebcc111357300f20", -19:58:12.145 STDOUT [eks] terraform_current:  ] -19:58:12.145 STDOUT [eks] terraform_current:  - self = false -19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 4443 -19:58:12.145 STDOUT [eks] terraform_current:  }, -19:58:12.145 STDOUT [eks] terraform_current:  - { -19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - description = "Cluster API to node 6443/tcp webhook" -19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 6443 -19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" -19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ -19:58:12.145 STDOUT [eks] terraform_current:  - "sg-0ebcc111357300f20", -19:58:12.145 STDOUT [eks] terraform_current:  ] -19:58:12.145 STDOUT [eks] terraform_current:  - self = false -19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 6443 -19:58:12.145 STDOUT [eks] terraform_current:  }, -19:58:12.145 STDOUT [eks] terraform_current:  - { -19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - description = "Cluster API to node 8443/tcp webhook" -19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 8443 -19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" -19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ -19:58:12.145 STDOUT [eks] terraform_current:  - "sg-0ebcc111357300f20", -19:58:12.145 STDOUT [eks] terraform_current:  ] -19:58:12.145 STDOUT [eks] terraform_current:  - self = false -19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 8443 -19:58:12.145 STDOUT [eks] terraform_current:  }, -19:58:12.145 STDOUT [eks] terraform_current:  - { -19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - description = "Cluster API to node 9443/tcp webhook" -19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 9443 -19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" -19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ -19:58:12.145 STDOUT [eks] terraform_current:  - "sg-0ebcc111357300f20", -19:58:12.145 STDOUT [eks] terraform_current:  ] -19:58:12.145 STDOUT [eks] terraform_current:  - self = false -19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 9443 -19:58:12.145 STDOUT [eks] terraform_current:  }, -19:58:12.145 STDOUT [eks] terraform_current:  - { -19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - description = "Cluster API to node groups" -19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 443 -19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" -19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ -19:58:12.145 STDOUT [eks] terraform_current:  - "sg-0ebcc111357300f20", -19:58:12.145 STDOUT [eks] terraform_current:  ] -19:58:12.145 STDOUT [eks] terraform_current:  - self = false -19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 443 -19:58:12.145 STDOUT [eks] terraform_current:  }, -19:58:12.145 STDOUT [eks] terraform_current:  - { -19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - description = "Cluster API to node kubelets" -19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 10250 -19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" -19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ -19:58:12.145 STDOUT [eks] terraform_current:  - "sg-0ebcc111357300f20", -19:58:12.145 STDOUT [eks] terraform_current:  ] -19:58:12.145 STDOUT [eks] terraform_current:  - self = false -19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 10250 -19:58:12.145 STDOUT [eks] terraform_current:  }, -19:58:12.145 STDOUT [eks] terraform_current:  - { -19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - description = "Node to node CoreDNS UDP" -19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 53 -19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "udp" -19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [] -19:58:12.145 STDOUT [eks] terraform_current:  - self = true -19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 53 -19:58:12.145 STDOUT [eks] terraform_current:  }, -19:58:12.145 STDOUT [eks] terraform_current:  - { -19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - description = "Node to node CoreDNS" -19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 53 -19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" -19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [] -19:58:12.145 STDOUT [eks] terraform_current:  - self = true -19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 53 -19:58:12.145 STDOUT [eks] terraform_current:  }, -19:58:12.145 STDOUT [eks] terraform_current:  - { -19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - description = "Node to node ingress on ephemeral ports" -19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 80 -19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" -19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [] -19:58:12.145 STDOUT [eks] terraform_current:  - self = true -19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 65535 -19:58:12.145 STDOUT [eks] terraform_current:  }, -19:58:12.145 STDOUT [eks] terraform_current:  - { -19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - description = "Webhook container port, from Control Plane" -19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 15017 -19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] -19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" -19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ -19:58:12.145 STDOUT [eks] terraform_current:  - "sg-08e15e3b8fb3384d2", -19:58:12.145 STDOUT [eks] terraform_current:  ] -19:58:12.145 STDOUT [eks] terraform_current:  - self = false -19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 15017 -19:58:12.145 STDOUT [eks] terraform_current:  }, -19:58:12.145 STDOUT [eks] terraform_current:  ] -> null -19:58:12.145 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-node-20240906231012432000000006" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - name_prefix = "platform-eng-eks-mcm-node-" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - owner_id = "224384469011" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - revoke_rules_on_delete = false -> null -19:58:12.145 STDOUT [eks] terraform_current:  - tags = { -19:58:12.145 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.145 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.145 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm-node" -19:58:12.145 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.145 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.145 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.145 STDOUT [eks] terraform_current:  - "kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" -19:58:12.145 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.145 STDOUT [eks] terraform_current:  } -> null -19:58:12.145 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.145 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.145 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.145 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm-node" -19:58:12.145 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.145 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.145 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.145 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.145 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.145 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.145 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.145 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.145 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.145 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.145 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.145 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.145 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.145 STDOUT [eks] terraform_current:  - "kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" -19:58:12.145 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.145 STDOUT [eks] terraform_current:  } -> null -19:58:12.145 STDOUT [eks] terraform_current:  - vpc_id = "vpc-0280f77b373744eaa" -> null -19:58:12.145 STDOUT [eks] terraform_current:  } -19:58:12.145 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.cluster["ingress_nodes_443"] will be destroyed -19:58:12.145 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "cluster" { -19:58:12.145 STDOUT [eks] terraform_current:  - description = "Node groups to cluster API" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 443 -> null -19:58:12.145 STDOUT [eks] terraform_current:  - id = "sgrule-2999123215" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - security_group_id = "sg-0ebcc111357300f20" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-001d4aa53331ba106" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - self = false -> null -19:58:12.145 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-0b4880f2bae65a949" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 443 -> null -19:58:12.145 STDOUT [eks] terraform_current:  - type = "ingress" -> null -19:58:12.145 STDOUT [eks] terraform_current:  } -19:58:12.145 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["egress_all"] will be destroyed -19:58:12.145 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { -19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [ -19:58:12.145 STDOUT [eks] terraform_current:  - "0.0.0.0/0", -19:58:12.145 STDOUT [eks] terraform_current:  ] -> null -19:58:12.145 STDOUT [eks] terraform_current:  - description = "Allow all egress" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 0 -> null -19:58:12.145 STDOUT [eks] terraform_current:  - id = "sgrule-2399073099" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null -19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "-1" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null -19:58:12.145 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-03b198488d4b5751c" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - self = false -> null -19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 0 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - type = "egress" -> null -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_443"] will be destroyed -19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { -19:58:12.146 STDOUT [eks] terraform_current:  - description = "Cluster API to node groups" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 443 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-1028926182" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null -19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-02bd8ee4f76b1dd52" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - self = false -> null -19:58:12.146 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-0ebcc111357300f20" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 443 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_4443_webhook"] will be destroyed -19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { -19:58:12.146 STDOUT [eks] terraform_current:  - description = "Cluster API to node 4443/tcp webhook" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 4443 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-3066614115" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null -19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-0c9e44ecc24e15434" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - self = false -> null -19:58:12.146 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-0ebcc111357300f20" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 4443 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_6443_webhook"] will be destroyed -19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { -19:58:12.146 STDOUT [eks] terraform_current:  - description = "Cluster API to node 6443/tcp webhook" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 6443 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-2139797237" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null -19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-0771960c9c3e4bfbc" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - self = false -> null -19:58:12.146 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-0ebcc111357300f20" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 6443 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_8443_webhook"] will be destroyed -19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { -19:58:12.146 STDOUT [eks] terraform_current:  - description = "Cluster API to node 8443/tcp webhook" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 8443 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-1825999572" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null -19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-06aa306a2020ae0e1" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - self = false -> null -19:58:12.146 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-0ebcc111357300f20" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 8443 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_9443_webhook"] will be destroyed -19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { -19:58:12.146 STDOUT [eks] terraform_current:  - description = "Cluster API to node 9443/tcp webhook" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 9443 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-142063903" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null -19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-0cedcadf2ab481871" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - self = false -> null -19:58:12.146 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-0ebcc111357300f20" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 9443 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_kubelet"] will be destroyed -19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { -19:58:12.146 STDOUT [eks] terraform_current:  - description = "Cluster API to node kubelets" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 10250 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-1630915307" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null -19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-0929373661f73dd3f" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - self = false -> null -19:58:12.146 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-0ebcc111357300f20" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 10250 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_nodes_ephemeral"] will be destroyed -19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { -19:58:12.146 STDOUT [eks] terraform_current:  - description = "Node to node ingress on ephemeral ports" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 80 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-3683901971" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null -19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-09aa20b51ae07fb2b" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - self = true -> null -19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 65535 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_self_coredns_tcp"] will be destroyed -19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { -19:58:12.146 STDOUT [eks] terraform_current:  - description = "Node to node CoreDNS" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 53 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-2908765754" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null -19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-025828ae34e42f821" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - self = true -> null -19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 53 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_self_coredns_udp"] will be destroyed -19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { -19:58:12.146 STDOUT [eks] terraform_current:  - description = "Node to node CoreDNS UDP" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 53 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-155164117" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null -19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "udp" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-0b7c2ef27754510d4" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - self = true -> null -19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 53 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.time_sleep.this[0] will be destroyed -19:58:12.146 STDOUT [eks] terraform_current:  - resource "time_sleep" "this" { -19:58:12.146 STDOUT [eks] terraform_current:  - create_duration = "30s" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - id = "2024-09-06T23:19:27Z" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - triggers = { -19:58:12.146 STDOUT [eks] terraform_current:  - "cluster_certificate_authority_data" = "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" -19:58:12.146 STDOUT [eks] terraform_current:  - "cluster_endpoint" = "https://D896BC3B83782F01D590ACB83BB75926.yl4.us-gov-east-1.eks.amazonaws.com" -19:58:12.146 STDOUT [eks] terraform_current:  - "cluster_name" = "platform-eng-eks-mcm" -19:58:12.146 STDOUT [eks] terraform_current:  - "cluster_service_cidr" = "172.20.0.0/16" -19:58:12.146 STDOUT [eks] terraform_current:  - "cluster_version" = "1.30" -19:58:12.146 STDOUT [eks] terraform_current:  } -> null -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  # module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0] will be destroyed -19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_iam_policy" "ebs_csi" { -19:58:12.146 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EBS_CSI_Policy-20240906231012048000000002" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - attachment_count = 1 -> null -19:58:12.146 STDOUT [eks] terraform_current:  - description = "Provides permissions to manage EBS volumes via the container storage interface driver" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EBS_CSI_Policy-20240906231012048000000002" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - name = "AmazonEKS_EBS_CSI_Policy-20240906231012048000000002" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - name_prefix = "AmazonEKS_EBS_CSI_Policy-" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - path = "/" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - policy = jsonencode( -19:58:12.146 STDOUT [eks] terraform_current:  { -19:58:12.146 STDOUT [eks] terraform_current:  - Statement = [ -19:58:12.146 STDOUT [eks] terraform_current:  - { -19:58:12.146 STDOUT [eks] terraform_current:  - Action = [ -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:ModifyVolume", -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:EnableFastSnapshotRestores", -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:DetachVolume", -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:DescribeVolumesModifications", -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:DescribeVolumes", -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:DescribeTags", -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:DescribeSnapshots", -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:DescribeInstances", -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:DescribeAvailabilityZones", -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:CreateSnapshot", -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:AttachVolume", -19:58:12.146 STDOUT [eks] terraform_current:  ] -19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.146 STDOUT [eks] terraform_current:  }, -19:58:12.146 STDOUT [eks] terraform_current:  - { -19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:CreateTags" -19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.146 STDOUT [eks] terraform_current:  - StringEquals = { -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:CreateAction" = [ -19:58:12.146 STDOUT [eks] terraform_current:  - "CreateVolume", -19:58:12.146 STDOUT [eks] terraform_current:  - "CreateSnapshot", -19:58:12.146 STDOUT [eks] terraform_current:  ] -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.146 STDOUT [eks] terraform_current:  - Resource = [ -19:58:12.146 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:ec2:*:*:volume/*", -19:58:12.146 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:ec2:*:*:snapshot/*", -19:58:12.146 STDOUT [eks] terraform_current:  ] -19:58:12.146 STDOUT [eks] terraform_current:  }, -19:58:12.146 STDOUT [eks] terraform_current:  - { -19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:DeleteTags" -19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.146 STDOUT [eks] terraform_current:  - Resource = [ -19:58:12.146 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:ec2:*:*:volume/*", -19:58:12.146 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:ec2:*:*:snapshot/*", -19:58:12.146 STDOUT [eks] terraform_current:  ] -19:58:12.146 STDOUT [eks] terraform_current:  }, -19:58:12.146 STDOUT [eks] terraform_current:  - { -19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:CreateVolume" -19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { -19:58:12.146 STDOUT [eks] terraform_current:  - "aws:RequestTag/ebs.csi.aws.com/cluster" = "true" -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.146 STDOUT [eks] terraform_current:  }, -19:58:12.146 STDOUT [eks] terraform_current:  - { -19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:CreateVolume" -19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { -19:58:12.146 STDOUT [eks] terraform_current:  - "aws:RequestTag/CSIVolumeName" = "*" -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.146 STDOUT [eks] terraform_current:  }, -19:58:12.146 STDOUT [eks] terraform_current:  - { -19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:CreateVolume" -19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { -19:58:12.146 STDOUT [eks] terraform_current:  - "aws:RequestTag/kubernetes.io/cluster/*" = "owned" -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.146 STDOUT [eks] terraform_current:  }, -19:58:12.146 STDOUT [eks] terraform_current:  - { -19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:DeleteVolume" -19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:ResourceTag/ebs.csi.aws.com/cluster" = "true" -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.146 STDOUT [eks] terraform_current:  }, -19:58:12.146 STDOUT [eks] terraform_current:  - { -19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:DeleteVolume" -19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:ResourceTag/CSIVolumeName" = "*" -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.146 STDOUT [eks] terraform_current:  }, -19:58:12.146 STDOUT [eks] terraform_current:  - { -19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:DeleteVolume" -19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:ResourceTag/kubernetes.io/cluster/*" = "owned" -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.146 STDOUT [eks] terraform_current:  }, -19:58:12.146 STDOUT [eks] terraform_current:  - { -19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:DeleteVolume" -19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:ResourceTag/kubernetes.io/created-for/pvc/name" = "*" -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.146 STDOUT [eks] terraform_current:  }, -19:58:12.146 STDOUT [eks] terraform_current:  - { -19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:DeleteSnapshot" -19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:ResourceTag/CSIVolumeSnapshotName" = "*" -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.146 STDOUT [eks] terraform_current:  }, -19:58:12.146 STDOUT [eks] terraform_current:  - { -19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:DeleteSnapshot" -19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { -19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:ResourceTag/ebs.csi.aws.com/cluster" = "true" -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.146 STDOUT [eks] terraform_current:  }, -19:58:12.146 STDOUT [eks] terraform_current:  ] -19:58:12.146 STDOUT [eks] terraform_current:  - Version = "2012-10-17" -19:58:12.146 STDOUT [eks] terraform_current:  } -19:58:12.146 STDOUT [eks] terraform_current:  ) -> null -19:58:12.146 STDOUT [eks] terraform_current:  - policy_id = "ANPATIPS3JAJWQRSSH3IA" -> null -19:58:12.146 STDOUT [eks] terraform_current:  - tags = { -19:58:12.146 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.146 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.146 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.146 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.146 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.146 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.146 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.146 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.146 STDOUT [eks] terraform_current:  } -> null -19:58:12.146 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.146 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.146 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.147 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.147 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.147 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.147 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.147 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.147 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.147 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.147 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.147 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.147 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.147 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.147 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.147 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.147 STDOUT [eks] terraform_current:  } -> null -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  # module.ebs_csi_irsa_role.aws_iam_role.this[0] will be destroyed -19:58:12.147 STDOUT [eks] terraform_current:  - resource "aws_iam_role" "this" { -19:58:12.147 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-ebs-csi-driver" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - assume_role_policy = jsonencode( -19:58:12.147 STDOUT [eks] terraform_current:  { -19:58:12.147 STDOUT [eks] terraform_current:  - Statement = [ -19:58:12.147 STDOUT [eks] terraform_current:  - { -19:58:12.147 STDOUT [eks] terraform_current:  - Action = "sts:AssumeRoleWithWebIdentity" -19:58:12.147 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.147 STDOUT [eks] terraform_current:  - StringEquals = { -19:58:12.147 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:aud" = "sts.amazonaws.com" -19:58:12.147 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:sub" = "system:serviceaccount:kube-system:ebs-csi-controller-sa" -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.147 STDOUT [eks] terraform_current:  - Principal = { -19:58:12.147 STDOUT [eks] terraform_current:  - Federated = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  }, -19:58:12.147 STDOUT [eks] terraform_current:  ] -19:58:12.147 STDOUT [eks] terraform_current:  - Version = "2012-10-17" -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  ) -> null -19:58:12.147 STDOUT [eks] terraform_current:  - create_date = "2024-09-06T23:18:58Z" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - force_detach_policies = true -> null -19:58:12.147 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-ebs-csi-driver" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - managed_policy_arns = [ -19:58:12.147 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EBS_CSI_Policy-20240906231012048000000002", -19:58:12.147 STDOUT [eks] terraform_current:  ] -> null -19:58:12.147 STDOUT [eks] terraform_current:  - max_session_duration = 3600 -> null -19:58:12.147 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-ebs-csi-driver" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - path = "/" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - tags = { -19:58:12.147 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.147 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.147 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.147 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.147 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.147 STDOUT [eks] terraform_current:  } -> null -19:58:12.147 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.147 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.147 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.147 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.147 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.147 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.147 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.147 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.147 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.147 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.147 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.147 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.147 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.147 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.147 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.147 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.147 STDOUT [eks] terraform_current:  } -> null -19:58:12.147 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJSHP2YMKHZ" -> null -19:58:12.147 STDOUT [eks] terraform_current:  # (3 unchanged attributes hidden) -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  # module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0] will be destroyed -19:58:12.147 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "ebs_csi" { -19:58:12.147 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-ebs-csi-driver-20240906231859237400000010" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EBS_CSI_Policy-20240906231012048000000002" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-ebs-csi-driver" -> null -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  # module.efs_csi_irsa_role.aws_iam_policy.efs_csi[0] will be destroyed -19:58:12.147 STDOUT [eks] terraform_current:  - resource "aws_iam_policy" "efs_csi" { -19:58:12.147 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EFS_CSI_Policy-20240906231012047900000001" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - attachment_count = 1 -> null -19:58:12.147 STDOUT [eks] terraform_current:  - description = "Provides permissions to manage EFS volumes via the container storage interface driver" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EFS_CSI_Policy-20240906231012047900000001" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - name = "AmazonEKS_EFS_CSI_Policy-20240906231012047900000001" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - name_prefix = "AmazonEKS_EFS_CSI_Policy-" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - path = "/" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - policy = jsonencode( -19:58:12.147 STDOUT [eks] terraform_current:  { -19:58:12.147 STDOUT [eks] terraform_current:  - Statement = [ -19:58:12.147 STDOUT [eks] terraform_current:  - { -19:58:12.147 STDOUT [eks] terraform_current:  - Action = [ -19:58:12.147 STDOUT [eks] terraform_current:  - "elasticfilesystem:DescribeMountTargets", -19:58:12.147 STDOUT [eks] terraform_current:  - "elasticfilesystem:DescribeFileSystems", -19:58:12.147 STDOUT [eks] terraform_current:  - "elasticfilesystem:DescribeAccessPoints", -19:58:12.147 STDOUT [eks] terraform_current:  - "ec2:DescribeAvailabilityZones", -19:58:12.147 STDOUT [eks] terraform_current:  ] -19:58:12.147 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.147 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.147 STDOUT [eks] terraform_current:  }, -19:58:12.147 STDOUT [eks] terraform_current:  - { -19:58:12.147 STDOUT [eks] terraform_current:  - Action = "elasticfilesystem:CreateAccessPoint" -19:58:12.147 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.147 STDOUT [eks] terraform_current:  - StringLike = { -19:58:12.147 STDOUT [eks] terraform_current:  - "aws:RequestTag/efs.csi.aws.com/cluster" = "true" -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.147 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.147 STDOUT [eks] terraform_current:  }, -19:58:12.147 STDOUT [eks] terraform_current:  - { -19:58:12.147 STDOUT [eks] terraform_current:  - Action = "elasticfilesystem:TagResource" -19:58:12.147 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.147 STDOUT [eks] terraform_current:  - StringLike = { -19:58:12.147 STDOUT [eks] terraform_current:  - "aws:RequestTag/efs.csi.aws.com/cluster" = "true" -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.147 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.147 STDOUT [eks] terraform_current:  }, -19:58:12.147 STDOUT [eks] terraform_current:  - { -19:58:12.147 STDOUT [eks] terraform_current:  - Action = "elasticfilesystem:DeleteAccessPoint" -19:58:12.147 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.147 STDOUT [eks] terraform_current:  - StringEquals = { -19:58:12.147 STDOUT [eks] terraform_current:  - "aws:ResourceTag/efs.csi.aws.com/cluster" = "true" -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.147 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.147 STDOUT [eks] terraform_current:  }, -19:58:12.147 STDOUT [eks] terraform_current:  ] -19:58:12.147 STDOUT [eks] terraform_current:  - Version = "2012-10-17" -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  ) -> null -19:58:12.147 STDOUT [eks] terraform_current:  - policy_id = "ANPATIPS3JAJ75LS5DHRC" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - tags = { -19:58:12.147 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.147 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.147 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.147 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.147 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.147 STDOUT [eks] terraform_current:  } -> null -19:58:12.147 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.147 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.147 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.147 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.147 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.147 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.147 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.147 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.147 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.147 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.147 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.147 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.147 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.147 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.147 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.147 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.147 STDOUT [eks] terraform_current:  } -> null -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  # module.efs_csi_irsa_role.aws_iam_role.this[0] will be destroyed -19:58:12.147 STDOUT [eks] terraform_current:  - resource "aws_iam_role" "this" { -19:58:12.147 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-efs-csi-driver" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - assume_role_policy = jsonencode( -19:58:12.147 STDOUT [eks] terraform_current:  { -19:58:12.147 STDOUT [eks] terraform_current:  - Statement = [ -19:58:12.147 STDOUT [eks] terraform_current:  - { -19:58:12.147 STDOUT [eks] terraform_current:  - Action = "sts:AssumeRoleWithWebIdentity" -19:58:12.147 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.147 STDOUT [eks] terraform_current:  - StringEquals = { -19:58:12.147 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:aud" = "sts.amazonaws.com" -19:58:12.147 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:sub" = "system:serviceaccount:kube-system:efs-csi-controller-sa" -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.147 STDOUT [eks] terraform_current:  - Principal = { -19:58:12.147 STDOUT [eks] terraform_current:  - Federated = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  }, -19:58:12.147 STDOUT [eks] terraform_current:  ] -19:58:12.147 STDOUT [eks] terraform_current:  - Version = "2012-10-17" -19:58:12.147 STDOUT [eks] terraform_current:  } -19:58:12.147 STDOUT [eks] terraform_current:  ) -> null -19:58:12.147 STDOUT [eks] terraform_current:  - create_date = "2024-09-06T23:18:58Z" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - force_detach_policies = true -> null -19:58:12.147 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-efs-csi-driver" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - managed_policy_arns = [ -19:58:12.147 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EFS_CSI_Policy-20240906231012047900000001", -19:58:12.147 STDOUT [eks] terraform_current:  ] -> null -19:58:12.147 STDOUT [eks] terraform_current:  - max_session_duration = 3600 -> null -19:58:12.147 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-efs-csi-driver" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - path = "/" -> null -19:58:12.147 STDOUT [eks] terraform_current:  - tags = { -19:58:12.147 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.147 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.147 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.147 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.147 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.147 STDOUT [eks] terraform_current:  } -> null -19:58:12.147 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.147 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.147 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.147 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.147 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.147 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.147 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.147 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.147 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.147 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.148 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.148 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.148 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.148 STDOUT [eks] terraform_current:  } -> null -19:58:12.148 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJ5LM4S5YEZ" -> null -19:58:12.148 STDOUT [eks] terraform_current:  # (3 unchanged attributes hidden) -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  # module.efs_csi_irsa_role.aws_iam_role_policy_attachment.efs_csi[0] will be destroyed -19:58:12.148 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "efs_csi" { -19:58:12.148 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-efs-csi-driver-20240906231859316700000011" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EFS_CSI_Policy-20240906231012047900000001" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-efs-csi-driver" -> null -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  # module.vpc_cni_irsa_role.aws_iam_policy.vpc_cni[0] will be destroyed -19:58:12.148 STDOUT [eks] terraform_current:  - resource "aws_iam_policy" "vpc_cni" { -19:58:12.148 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_CNI_Policy-20240906231012049100000003" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - attachment_count = 1 -> null -19:58:12.148 STDOUT [eks] terraform_current:  - description = "Provides the Amazon VPC CNI Plugin (amazon-vpc-cni-k8s) the permissions it requires to modify the IPv4/IPv6 address configuration on your EKS worker nodes" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_CNI_Policy-20240906231012049100000003" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - name = "AmazonEKS_CNI_Policy-20240906231012049100000003" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - name_prefix = "AmazonEKS_CNI_Policy-" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - path = "/" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - policy = jsonencode( -19:58:12.148 STDOUT [eks] terraform_current:  { -19:58:12.148 STDOUT [eks] terraform_current:  - Statement = [ -19:58:12.148 STDOUT [eks] terraform_current:  - { -19:58:12.148 STDOUT [eks] terraform_current:  - Action = [ -19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:UnassignPrivateIpAddresses", -19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:ModifyNetworkInterfaceAttribute", -19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:DetachNetworkInterface", -19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:DescribeTags", -19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:DescribeSubnets", -19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:DescribeNetworkInterfaces", -19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:DescribeInstances", -19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:DescribeInstanceTypes", -19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:DeleteNetworkInterface", -19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:CreateNetworkInterface", -19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:AttachNetworkInterface", -19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:AssignPrivateIpAddresses", -19:58:12.148 STDOUT [eks] terraform_current:  ] -19:58:12.148 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.148 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.148 STDOUT [eks] terraform_current:  - Sid = "IPV4" -19:58:12.148 STDOUT [eks] terraform_current:  }, -19:58:12.148 STDOUT [eks] terraform_current:  - { -19:58:12.148 STDOUT [eks] terraform_current:  - Action = "ec2:CreateTags" -19:58:12.148 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.148 STDOUT [eks] terraform_current:  - Resource = "arn:aws-us-gov:ec2:*:*:network-interface/*" -19:58:12.148 STDOUT [eks] terraform_current:  - Sid = "CreateTags" -19:58:12.148 STDOUT [eks] terraform_current:  }, -19:58:12.148 STDOUT [eks] terraform_current:  ] -19:58:12.148 STDOUT [eks] terraform_current:  - Version = "2012-10-17" -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  ) -> null -19:58:12.148 STDOUT [eks] terraform_current:  - policy_id = "ANPATIPS3JAJQSVZLLNUM" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - tags = { -19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.148 STDOUT [eks] terraform_current:  } -> null -19:58:12.148 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.148 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.148 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.148 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.148 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.148 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.148 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.148 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.148 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.148 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.148 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.148 STDOUT [eks] terraform_current:  } -> null -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  # module.vpc_cni_irsa_role.aws_iam_role.this[0] will be destroyed -19:58:12.148 STDOUT [eks] terraform_current:  - resource "aws_iam_role" "this" { -19:58:12.148 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-vpc-cni" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - assume_role_policy = jsonencode( -19:58:12.148 STDOUT [eks] terraform_current:  { -19:58:12.148 STDOUT [eks] terraform_current:  - Statement = [ -19:58:12.148 STDOUT [eks] terraform_current:  - { -19:58:12.148 STDOUT [eks] terraform_current:  - Action = "sts:AssumeRoleWithWebIdentity" -19:58:12.148 STDOUT [eks] terraform_current:  - Condition = { -19:58:12.148 STDOUT [eks] terraform_current:  - StringEquals = { -19:58:12.148 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:aud" = "sts.amazonaws.com" -19:58:12.148 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:sub" = "system:serviceaccount:kube-system:aws-node" -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.148 STDOUT [eks] terraform_current:  - Principal = { -19:58:12.148 STDOUT [eks] terraform_current:  - Federated = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  }, -19:58:12.148 STDOUT [eks] terraform_current:  ] -19:58:12.148 STDOUT [eks] terraform_current:  - Version = "2012-10-17" -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  ) -> null -19:58:12.148 STDOUT [eks] terraform_current:  - create_date = "2024-09-06T23:18:58Z" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - force_detach_policies = true -> null -19:58:12.148 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-vpc-cni" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - managed_policy_arns = [ -19:58:12.148 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_CNI_Policy-20240906231012049100000003", -19:58:12.148 STDOUT [eks] terraform_current:  ] -> null -19:58:12.148 STDOUT [eks] terraform_current:  - max_session_duration = 3600 -> null -19:58:12.148 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-vpc-cni" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - path = "/" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - tags = { -19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.148 STDOUT [eks] terraform_current:  } -> null -19:58:12.148 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.148 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.148 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.148 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.148 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.148 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.148 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.148 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.148 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.148 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.148 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.148 STDOUT [eks] terraform_current:  } -> null -19:58:12.148 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJQVAVLU2ER" -> null -19:58:12.148 STDOUT [eks] terraform_current:  # (3 unchanged attributes hidden) -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  # module.vpc_cni_irsa_role.aws_iam_role_policy_attachment.vpc_cni[0] will be destroyed -19:58:12.148 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "vpc_cni" { -19:58:12.148 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-vpc-cni-20240906231859418300000013" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_CNI_Policy-20240906231012049100000003" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-vpc-cni" -> null -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0] will be destroyed -19:58:12.148 STDOUT [eks] terraform_current:  - resource "aws_eks_node_group" "this" { -19:58:12.148 STDOUT [eks] terraform_current:  - ami_type = "BOTTLEROCKET_x86_64" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:nodegroup/platform-eng-eks-mcm/eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017/9cc8e4d1-595a-8450-db56-2943ba7896ff" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - capacity_type = "ON_DEMAND" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - disk_size = 0 -> null -19:58:12.148 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - instance_types = [ -19:58:12.148 STDOUT [eks] terraform_current:  - "t3.xlarge", -19:58:12.148 STDOUT [eks] terraform_current:  ] -> null -19:58:12.148 STDOUT [eks] terraform_current:  - labels = {} -> null -19:58:12.148 STDOUT [eks] terraform_current:  - node_group_name = "eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - node_group_name_prefix = "eks-platform-eng-eks-mcm-nodegroup-" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - node_role_arn = "arn:aws-us-gov:iam::224384469011:role/eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - release_version = "1.21.1-82691b51" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - resources = [ -19:58:12.148 STDOUT [eks] terraform_current:  - { -19:58:12.148 STDOUT [eks] terraform_current:  - autoscaling_groups = [ -19:58:12.148 STDOUT [eks] terraform_current:  - { -19:58:12.148 STDOUT [eks] terraform_current:  - name = "eks-eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017-9cc8e4d1-595a-8450-db56-2943ba7896ff" -19:58:12.148 STDOUT [eks] terraform_current:  }, -19:58:12.148 STDOUT [eks] terraform_current:  ] -19:58:12.148 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.148 STDOUT [eks] terraform_current:  }, -19:58:12.148 STDOUT [eks] terraform_current:  ] -> null -19:58:12.148 STDOUT [eks] terraform_current:  - status = "ACTIVE" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - subnet_ids = [ -19:58:12.148 STDOUT [eks] terraform_current:  - "subnet-02c2250b9ec2dd6a2", -19:58:12.148 STDOUT [eks] terraform_current:  - "subnet-078b228071c609a50", -19:58:12.148 STDOUT [eks] terraform_current:  - "subnet-07a6339be3670fb41", -19:58:12.148 STDOUT [eks] terraform_current:  ] -> null -19:58:12.148 STDOUT [eks] terraform_current:  - tags = { -19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.148 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-nodegroup" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.148 STDOUT [eks] terraform_current:  } -> null -19:58:12.148 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.148 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-nodegroup" -19:58:12.148 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.148 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.148 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.148 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.148 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.148 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.148 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.148 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.148 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.148 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.148 STDOUT [eks] terraform_current:  } -> null -19:58:12.148 STDOUT [eks] terraform_current:  - version = "1.30" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - launch_template { -19:58:12.148 STDOUT [eks] terraform_current:  - id = "lt-0cab502ac2f52bb98" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - name = "node_group-20240906231928384300000015" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - version = "1" -> null -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  - scaling_config { -19:58:12.148 STDOUT [eks] terraform_current:  - desired_size = 2 -> null -19:58:12.148 STDOUT [eks] terraform_current:  - max_size = 10 -> null -19:58:12.148 STDOUT [eks] terraform_current:  - min_size = 2 -> null -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  - timeouts {} -19:58:12.148 STDOUT [eks] terraform_current:  - update_config { -19:58:12.148 STDOUT [eks] terraform_current:  - max_unavailable = 0 -> null -19:58:12.148 STDOUT [eks] terraform_current:  - max_unavailable_percentage = 33 -> null -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role.this[0] will be destroyed -19:58:12.148 STDOUT [eks] terraform_current:  - resource "aws_iam_role" "this" { -19:58:12.148 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - assume_role_policy = jsonencode( -19:58:12.148 STDOUT [eks] terraform_current:  { -19:58:12.148 STDOUT [eks] terraform_current:  - Statement = [ -19:58:12.148 STDOUT [eks] terraform_current:  - { -19:58:12.148 STDOUT [eks] terraform_current:  - Action = "sts:AssumeRole" -19:58:12.148 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.148 STDOUT [eks] terraform_current:  - Principal = { -19:58:12.148 STDOUT [eks] terraform_current:  - Service = "ec2.amazonaws.com" -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  - Sid = "EKSNodeAssumeRole" -19:58:12.148 STDOUT [eks] terraform_current:  }, -19:58:12.148 STDOUT [eks] terraform_current:  ] -19:58:12.148 STDOUT [eks] terraform_current:  - Version = "2012-10-17" -19:58:12.148 STDOUT [eks] terraform_current:  } -19:58:12.148 STDOUT [eks] terraform_current:  ) -> null -19:58:12.148 STDOUT [eks] terraform_current:  - create_date = "2024-09-06T23:10:12Z" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - description = "EKS managed node group IAM role" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - force_detach_policies = true -> null -19:58:12.148 STDOUT [eks] terraform_current:  - id = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - managed_policy_arns = [ -19:58:12.148 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", -19:58:12.148 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEKSWorkerNodePolicy", -19:58:12.148 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEKS_CNI_Policy", -19:58:12.148 STDOUT [eks] terraform_current:  ] -> null -19:58:12.148 STDOUT [eks] terraform_current:  - max_session_duration = 3600 -> null -19:58:12.148 STDOUT [eks] terraform_current:  - name = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - name_prefix = "eks-platform-eng-eks-mcm-nodegroup-" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - path = "/" -> null -19:58:12.148 STDOUT [eks] terraform_current:  - tags = { -19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.148 STDOUT [eks] terraform_current:  } -> null -19:58:12.148 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.148 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.148 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.148 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.148 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.148 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.148 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.148 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.148 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.148 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.148 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.148 STDOUT [eks] terraform_current:  } -> null -19:58:12.148 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJXVNH4QWBD" -> null -19:58:12.148 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.149 STDOUT [eks] terraform_current:  } -19:58:12.149 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"] will be destroyed -19:58:12.149 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "this" { -19:58:12.149 STDOUT [eks] terraform_current:  - id = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101328450000000a" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - role = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -> null -19:58:12.149 STDOUT [eks] terraform_current:  } -19:58:12.149 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"] will be destroyed -19:58:12.149 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "this" { -19:58:12.149 STDOUT [eks] terraform_current:  - id = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101328910000000b" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKSWorkerNodePolicy" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - role = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -> null -19:58:12.149 STDOUT [eks] terraform_current:  } -19:58:12.149 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"] will be destroyed -19:58:12.149 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "this" { -19:58:12.149 STDOUT [eks] terraform_current:  - id = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101329060000000c" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKS_CNI_Policy" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - role = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -> null -19:58:12.149 STDOUT [eks] terraform_current:  } -19:58:12.149 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_launch_template.this[0] will be destroyed -19:58:12.149 STDOUT [eks] terraform_current:  - resource "aws_launch_template" "this" { -19:58:12.149 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:launch-template/lt-0cab502ac2f52bb98" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - default_version = 1 -> null -19:58:12.149 STDOUT [eks] terraform_current:  - description = "Custom launch template for eks-platform-eng-eks-mcm-nodegroup EKS managed node group" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - disable_api_stop = false -> null -19:58:12.149 STDOUT [eks] terraform_current:  - disable_api_termination = false -> null -19:58:12.149 STDOUT [eks] terraform_current:  - id = "lt-0cab502ac2f52bb98" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - latest_version = 1 -> null -19:58:12.149 STDOUT [eks] terraform_current:  - name = "node_group-20240906231928384300000015" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - name_prefix = "node_group-" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - security_group_names = [] -> null -19:58:12.149 STDOUT [eks] terraform_current:  - tags = { -19:58:12.149 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.149 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.149 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.149 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.149 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.149 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.149 STDOUT [eks] terraform_current:  } -> null -19:58:12.149 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.149 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.149 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.149 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.149 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.149 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.149 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.149 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.149 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.149 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.149 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.149 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.149 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.149 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.149 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.149 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.149 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.149 STDOUT [eks] terraform_current:  } -> null -19:58:12.149 STDOUT [eks] terraform_current:  - update_default_version = true -> null -19:58:12.149 STDOUT [eks] terraform_current:  - vpc_security_group_ids = [ -19:58:12.149 STDOUT [eks] terraform_current:  - "sg-0b4880f2bae65a949", -19:58:12.149 STDOUT [eks] terraform_current:  ] -> null -19:58:12.149 STDOUT [eks] terraform_current:  # (8 unchanged attributes hidden) -19:58:12.149 STDOUT [eks] terraform_current:  - block_device_mappings { -19:58:12.149 STDOUT [eks] terraform_current:  - device_name = "/dev/xvda" -> null -19:58:12.149 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) -19:58:12.149 STDOUT [eks] terraform_current:  - ebs { -19:58:12.149 STDOUT [eks] terraform_current:  - delete_on_termination = "true" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - encrypted = "true" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - iops = 0 -> null -19:58:12.149 STDOUT [eks] terraform_current:  - kms_key_id = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/e0543b2b-c3f1-49a5-bfa7-87eec859be03" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - throughput = 0 -> null -19:58:12.149 STDOUT [eks] terraform_current:  - volume_size = 100 -> null -19:58:12.149 STDOUT [eks] terraform_current:  - volume_type = "gp3" -> null -19:58:12.149 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.149 STDOUT [eks] terraform_current:  } -19:58:12.149 STDOUT [eks] terraform_current:  } -19:58:12.149 STDOUT [eks] terraform_current:  - metadata_options { -19:58:12.149 STDOUT [eks] terraform_current:  - http_endpoint = "enabled" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - http_put_response_hop_limit = 2 -> null -19:58:12.149 STDOUT [eks] terraform_current:  - http_tokens = "required" -> null -19:58:12.149 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) -19:58:12.149 STDOUT [eks] terraform_current:  } -19:58:12.149 STDOUT [eks] terraform_current:  - monitoring { -19:58:12.149 STDOUT [eks] terraform_current:  - enabled = true -> null -19:58:12.149 STDOUT [eks] terraform_current:  } -19:58:12.149 STDOUT [eks] terraform_current:  - tag_specifications { -19:58:12.149 STDOUT [eks] terraform_current:  - resource_type = "instance" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - tags = { -19:58:12.149 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.149 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.149 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-nodegroup" -19:58:12.149 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.149 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.149 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.149 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.149 STDOUT [eks] terraform_current:  } -> null -19:58:12.149 STDOUT [eks] terraform_current:  } -19:58:12.149 STDOUT [eks] terraform_current:  - tag_specifications { -19:58:12.149 STDOUT [eks] terraform_current:  - resource_type = "network-interface" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - tags = { -19:58:12.149 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.149 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.149 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-nodegroup" -19:58:12.149 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.149 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.149 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.149 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.149 STDOUT [eks] terraform_current:  } -> null -19:58:12.149 STDOUT [eks] terraform_current:  } -19:58:12.149 STDOUT [eks] terraform_current:  - tag_specifications { -19:58:12.149 STDOUT [eks] terraform_current:  - resource_type = "volume" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - tags = { -19:58:12.149 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -[90m19:58:12.149 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.149 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-nodegroup" -19:58:12.149 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.149 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.149 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.149 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.149 STDOUT [eks] terraform_current:  } -> null -19:58:12.149 STDOUT [eks] terraform_current:  } -19:58:12.149 STDOUT [eks] terraform_current:  } -19:58:12.149 STDOUT [eks] terraform_current:  # module.cluster.module.kms.aws_kms_alias.this["cluster"] will be destroyed -19:58:12.149 STDOUT [eks] terraform_current:  - resource "aws_kms_alias" "this" { -19:58:12.149 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:alias/eks/platform-eng-eks-mcm" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - id = "alias/eks/platform-eng-eks-mcm" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - name = "alias/eks/platform-eng-eks-mcm" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - target_key_arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - target_key_id = "548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null -19:58:12.149 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) -19:58:12.149 STDOUT [eks] terraform_current:  } -19:58:12.149 STDOUT [eks] terraform_current:  # module.cluster.module.kms.aws_kms_key.this[0] will be destroyed -19:58:12.149 STDOUT [eks] terraform_current:  - resource "aws_kms_key" "this" { -19:58:12.149 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - bypass_policy_lockout_safety_check = false -> null -19:58:12.149 STDOUT [eks] terraform_current:  - customer_master_key_spec = "SYMMETRIC_DEFAULT" -> null -19:58:12.149 STDOUT [eks] terraform_current:  - description = "platform-eng-eks-mcm cluster encryption key" -> null -19:58:12.150 STDOUT [eks] terraform_current:  - enable_key_rotation = true -> null -19:58:12.150 STDOUT [eks] terraform_current:  - id = "548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null -19:58:12.150 STDOUT [eks] terraform_current:  - is_enabled = true -> null -19:58:12.150 STDOUT [eks] terraform_current:  - key_id = "548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null -19:58:12.150 STDOUT [eks] terraform_current:  - key_usage = "ENCRYPT_DECRYPT" -> null -19:58:12.150 STDOUT [eks] terraform_current:  - multi_region = false -> null -19:58:12.150 STDOUT [eks] terraform_current:  - policy = jsonencode( -19:58:12.150 STDOUT [eks] terraform_current:  { -19:58:12.150 STDOUT [eks] terraform_current:  - Statement = [ -19:58:12.150 STDOUT [eks] terraform_current:  - { -19:58:12.150 STDOUT [eks] terraform_current:  - Action = "kms:*" -19:58:12.150 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.150 STDOUT [eks] terraform_current:  - Principal = { -19:58:12.150 STDOUT [eks] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:root" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.150 STDOUT [eks] terraform_current:  - Sid = "Default" -19:58:12.150 STDOUT [eks] terraform_current:  }, -19:58:12.150 STDOUT [eks] terraform_current:  - { -19:58:12.150 STDOUT [eks] terraform_current:  - Action = [ -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Update*", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:UntagResource", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:TagResource", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:ScheduleKeyDeletion", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Revoke*", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:ReplicateKey", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Put*", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:List*", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:ImportKeyMaterial", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Get*", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Enable*", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Disable*", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Describe*", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Delete*", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Create*", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:CancelKeyDeletion", -19:58:12.150 STDOUT [eks] terraform_current:  ] -19:58:12.150 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.150 STDOUT [eks] terraform_current:  - Principal = { -19:58:12.150 STDOUT [eks] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:role/r-inf-terraform" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.150 STDOUT [eks] terraform_current:  - Sid = "KeyAdministration" -19:58:12.150 STDOUT [eks] terraform_current:  }, -19:58:12.150 STDOUT [eks] terraform_current:  - { -19:58:12.150 STDOUT [eks] terraform_current:  - Action = [ -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:ReEncrypt*", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:GenerateDataKey*", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Encrypt", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:DescribeKey", -19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Decrypt", -19:58:12.150 STDOUT [eks] terraform_current:  ] -19:58:12.150 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.150 STDOUT [eks] terraform_current:  - Principal = { -19:58:12.150 STDOUT [eks] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cluster-20240906231012049800000004" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.150 STDOUT [eks] terraform_current:  - Sid = "KeyUsage" -19:58:12.150 STDOUT [eks] terraform_current:  }, -19:58:12.150 STDOUT [eks] terraform_current:  ] -19:58:12.150 STDOUT [eks] terraform_current:  - Version = "2012-10-17" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  ) -> null -19:58:12.150 STDOUT [eks] terraform_current:  - rotation_period_in_days = 365 -> null -19:58:12.150 STDOUT [eks] terraform_current:  - tags = { -19:58:12.150 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.150 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.150 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.150 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.150 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.150 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.150 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.150 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.150 STDOUT [eks] terraform_current:  - "terraform-aws-modules" = "eks" -19:58:12.150 STDOUT [eks] terraform_current:  } -> null -19:58:12.150 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.150 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" -19:58:12.150 STDOUT [eks] terraform_current:  - "Environment" = "dev" -19:58:12.150 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" -19:58:12.150 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.150 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.150 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.150 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" -19:58:12.150 STDOUT [eks] terraform_current:  - "Terraform" = "true" -19:58:12.150 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" -19:58:12.150 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.150 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.150 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.150 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.150 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" -19:58:12.150 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" -19:58:12.150 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.150 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" -19:58:12.150 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.150 STDOUT [eks] terraform_current:  - "terraform-aws-modules" = "eks" -19:58:12.150 STDOUT [eks] terraform_current:  } -> null -19:58:12.150 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].module.user_data.null_resource.validate_cluster_service_cidr will be destroyed -19:58:12.150 STDOUT [eks] terraform_current:  - resource "null_resource" "validate_cluster_service_cidr" { -19:58:12.150 STDOUT [eks] terraform_current:  - id = "4612407423035214643" -> null -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current: Plan: 0 to add, 0 to change, 81 to destroy. -19:58:12.150 STDOUT [eks] terraform_current:  -19:58:12.150 STDOUT [eks] terraform_current: Changes to Outputs: -19:58:12.150 STDOUT [eks] terraform_current:  - access_entries = { -19:58:12.150 STDOUT [eks] terraform_current:  - inf-terraform-t1 = { -19:58:12.150 STDOUT [eks] terraform_current:  - kubernetes_groups = [] -19:58:12.150 STDOUT [eks] terraform_current:  - policy_associations = { -19:58:12.150 STDOUT [eks] terraform_current:  - admin = { -19:58:12.150 STDOUT [eks] terraform_current:  - access_scope = { -19:58:12.150 STDOUT [eks] terraform_current:  - type = "cluster" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  - inf-terraform-t2 = { -19:58:12.150 STDOUT [eks] terraform_current:  - kubernetes_groups = [] -19:58:12.150 STDOUT [eks] terraform_current:  - policy_associations = { -19:58:12.150 STDOUT [eks] terraform_current:  - admin = { -19:58:12.150 STDOUT [eks] terraform_current:  - access_scope = { -19:58:12.150 STDOUT [eks] terraform_current:  - type = "cluster" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  - inf-terraform-t3 = { -19:58:12.150 STDOUT [eks] terraform_current:  - kubernetes_groups = [] -19:58:12.150 STDOUT [eks] terraform_current:  - policy_associations = { -19:58:12.150 STDOUT [eks] terraform_current:  - admin = { -19:58:12.150 STDOUT [eks] terraform_current:  - access_scope = { -19:58:12.150 STDOUT [eks] terraform_current:  - type = "cluster" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  - inf-terraform-t4 = { -19:58:12.150 STDOUT [eks] terraform_current:  - kubernetes_groups = [] -19:58:12.150 STDOUT [eks] terraform_current:  - policy_associations = { -19:58:12.150 STDOUT [eks] terraform_current:  - admin = { -19:58:12.150 STDOUT [eks] terraform_current:  - access_scope = { -19:58:12.150 STDOUT [eks] terraform_current:  - type = "cluster" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06" -19:58:12.150 STDOUT [eks] terraform_current:  } -19:58:12.150 STDOUT [eks] terraform_current:  } -> null -19:58:12.150 STDOUT [eks] terraform_current:  - cloudwatch_log_group_arn = "arn:aws-us-gov:logs:us-gov-east-1:224384469011:log-group:/aws/eks/platform-eng-eks-mcm/cluster" -> null -19:58:12.150 STDOUT [eks] terraform_current:  - cloudwatch_log_group_name = "/aws/eks/platform-eng-eks-mcm/cluster" -> null -19:58:12.150 STDOUT [eks] terraform_current:  - cluster_addons = { -19:58:12.150 STDOUT [eks] terraform_current:  - amazon-cloudwatch-observability = { -19:58:12.150 STDOUT [eks] terraform_current:  - addon_name = "amazon-cloudwatch-observability" -19:58:12.150 STDOUT [eks] terraform_current:  - addon_version = "v2.0.1-eksbuild.1" -19:58:12.151 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/amazon-cloudwatch-observability/2ac8e4d2-2c04-6704-27b0-a1bb60118d9d" -19:58:12.151 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -19:58:12.151 STDOUT [eks] terraform_current:  - configuration_values = "" -19:58:12.151 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:17Z" -19:58:12.151 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:amazon-cloudwatch-observability" -19:58:12.151 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:51Z" -19:58:12.151 STDOUT [eks] terraform_current:  - preserve = true -19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts = null -19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -19:58:12.151 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cloudwatch-observability" -19:58:12.151 STDOUT [eks] terraform_current:  - tags = { -19:58:12.151 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" -19:58:12.151 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.151 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.151 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.151 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.151 STDOUT [eks] terraform_current:  } -19:58:12.151 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.151 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" -19:58:12.151 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.151 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" -19:58:12.151 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.151 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.151 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.151 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" -19:58:12.151 STDOUT [eks] terraform_current:  - Terraform = "true" -19:58:12.151 STDOUT [eks] terraform_current:  - Terragrunt = "true" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.151 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.151 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" -19:58:12.151 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" -19:58:12.151 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.151 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.151 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.151 STDOUT [eks] terraform_current:  } -19:58:12.151 STDOUT [eks] terraform_current:  - timeouts = { -19:58:12.151 STDOUT [eks] terraform_current:  - create = null -19:58:12.151 STDOUT [eks] terraform_current:  - delete = null -19:58:12.151 STDOUT [eks] terraform_current:  - update = null -19:58:12.151 STDOUT [eks] terraform_current:  } -19:58:12.151 STDOUT [eks] terraform_current:  } -19:58:12.151 STDOUT [eks] terraform_current:  - aws-ebs-csi-driver = { -19:58:12.151 STDOUT [eks] terraform_current:  - addon_name = "aws-ebs-csi-driver" -19:58:12.151 STDOUT [eks] terraform_current:  - addon_version = "v1.34.0-eksbuild.1" -19:58:12.151 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/aws-ebs-csi-driver/62c8e4d2-2bef-0957-943e-07efc3b80681" -19:58:12.151 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -19:58:12.151 STDOUT [eks] terraform_current:  - configuration_values = "" -19:58:12.151 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -19:58:12.151 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:aws-ebs-csi-driver" -19:58:12.151 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:04Z" -19:58:12.151 STDOUT [eks] terraform_current:  - preserve = true -19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts = null -19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -19:58:12.151 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-ebs-csi-driver" -19:58:12.151 STDOUT [eks] terraform_current:  - tags = { -19:58:12.151 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" -19:58:12.151 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.151 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.151 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.151 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.151 STDOUT [eks] terraform_current:  } -19:58:12.151 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.151 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" -19:58:12.151 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.151 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" -19:58:12.151 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.151 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.151 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.151 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" -19:58:12.151 STDOUT [eks] terraform_current:  - Terraform = "true" -19:58:12.151 STDOUT [eks] terraform_current:  - Terragrunt = "true" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.151 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.151 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" -19:58:12.151 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" -19:58:12.151 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.151 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.151 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.151 STDOUT [eks] terraform_current:  } -19:58:12.151 STDOUT [eks] terraform_current:  - timeouts = { -19:58:12.151 STDOUT [eks] terraform_current:  - create = null -19:58:12.151 STDOUT [eks] terraform_current:  - delete = null -19:58:12.151 STDOUT [eks] terraform_current:  - update = null -19:58:12.151 STDOUT [eks] terraform_current:  } -19:58:12.151 STDOUT [eks] terraform_current:  } -19:58:12.151 STDOUT [eks] terraform_current:  - aws-efs-csi-driver = { -19:58:12.151 STDOUT [eks] terraform_current:  - addon_name = "aws-efs-csi-driver" -19:58:12.151 STDOUT [eks] terraform_current:  - addon_version = "v2.0.7-eksbuild.1" -19:58:12.151 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/aws-efs-csi-driver/28c8e4d2-2bf4-26d6-f4f0-ccf8aace8809" -19:58:12.151 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -19:58:12.151 STDOUT [eks] terraform_current:  - configuration_values = "" -19:58:12.151 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -19:58:12.151 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:aws-efs-csi-driver" -19:58:12.151 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:00Z" -19:58:12.151 STDOUT [eks] terraform_current:  - preserve = true -19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts = null -19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -19:58:12.151 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-efs-csi-driver" -19:58:12.151 STDOUT [eks] terraform_current:  - tags = { -19:58:12.151 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" -19:58:12.151 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.151 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.151 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.151 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.151 STDOUT [eks] terraform_current:  } -19:58:12.151 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.151 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" -19:58:12.151 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.151 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" -19:58:12.151 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.151 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.151 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.151 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" -19:58:12.151 STDOUT [eks] terraform_current:  - Terraform = "true" -19:58:12.151 STDOUT [eks] terraform_current:  - Terragrunt = "true" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.151 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.151 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" -19:58:12.151 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" -19:58:12.151 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.151 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.151 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.151 STDOUT [eks] terraform_current:  } -19:58:12.151 STDOUT [eks] terraform_current:  - timeouts = { -19:58:12.151 STDOUT [eks] terraform_current:  - create = null -19:58:12.151 STDOUT [eks] terraform_current:  - delete = null -19:58:12.151 STDOUT [eks] terraform_current:  - update = null -19:58:12.151 STDOUT [eks] terraform_current:  } -19:58:12.151 STDOUT [eks] terraform_current:  } -19:58:12.151 STDOUT [eks] terraform_current:  - coredns = { -19:58:12.151 STDOUT [eks] terraform_current:  - addon_name = "coredns" -19:58:12.151 STDOUT [eks] terraform_current:  - addon_version = "v1.11.3-eksbuild.1" -19:58:12.151 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/coredns/5ac8e4d2-2bfa-f4ad-ab07-4e665df2f85a" -19:58:12.151 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -19:58:12.151 STDOUT [eks] terraform_current:  - configuration_values = "" -19:58:12.151 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -19:58:12.151 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:coredns" -19:58:12.151 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:01Z" -19:58:12.151 STDOUT [eks] terraform_current:  - preserve = true -19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts = null -19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -19:58:12.151 STDOUT [eks] terraform_current:  - service_account_role_arn = "" -19:58:12.151 STDOUT [eks] terraform_current:  - tags = { -19:58:12.152 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" -19:58:12.152 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.152 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.152 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.152 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.152 STDOUT [eks] terraform_current:  } -19:58:12.152 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.152 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" -19:58:12.152 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.152 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" -19:58:12.152 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.152 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.152 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.152 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" -19:58:12.152 STDOUT [eks] terraform_current:  - Terraform = "true" -19:58:12.152 STDOUT [eks] terraform_current:  - Terragrunt = "true" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.152 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.152 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" -19:58:12.152 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" -19:58:12.152 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.152 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.152 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.152 STDOUT [eks] terraform_current:  } -19:58:12.152 STDOUT [eks] terraform_current:  - timeouts = { -19:58:12.152 STDOUT [eks] terraform_current:  - create = null -19:58:12.152 STDOUT [eks] terraform_current:  - delete = null -19:58:12.152 STDOUT [eks] terraform_current:  - update = null -19:58:12.152 STDOUT [eks] terraform_current:  } -19:58:12.152 STDOUT [eks] terraform_current:  } -19:58:12.152 STDOUT [eks] terraform_current:  - eks-pod-identity-agent = { -19:58:12.152 STDOUT [eks] terraform_current:  - addon_name = "eks-pod-identity-agent" -19:58:12.152 STDOUT [eks] terraform_current:  - addon_version = "v1.3.2-eksbuild.2" -19:58:12.152 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/eks-pod-identity-agent/e0c8e4d2-2bf6-9e6b-b631-4771b0216ea6" -19:58:12.152 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -19:58:12.152 STDOUT [eks] terraform_current:  - configuration_values = "" -19:58:12.152 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -19:58:12.152 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:eks-pod-identity-agent" -19:58:12.152 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:53Z" -19:58:12.152 STDOUT [eks] terraform_current:  - preserve = true -19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts = null -19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -19:58:12.152 STDOUT [eks] terraform_current:  - service_account_role_arn = "" -19:58:12.152 STDOUT [eks] terraform_current:  - tags = { -19:58:12.152 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" -19:58:12.152 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.152 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.152 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.152 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.152 STDOUT [eks] terraform_current:  } -19:58:12.152 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.152 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" -19:58:12.152 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.152 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" -19:58:12.152 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.152 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.152 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.152 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" -19:58:12.152 STDOUT [eks] terraform_current:  - Terraform = "true" -19:58:12.152 STDOUT [eks] terraform_current:  - Terragrunt = "true" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.152 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.152 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" -19:58:12.152 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" -19:58:12.152 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.152 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.152 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.152 STDOUT [eks] terraform_current:  } -19:58:12.152 STDOUT [eks] terraform_current:  - timeouts = { -19:58:12.152 STDOUT [eks] terraform_current:  - create = null -19:58:12.152 STDOUT [eks] terraform_current:  - delete = null -19:58:12.152 STDOUT [eks] terraform_current:  - update = null -19:58:12.152 STDOUT [eks] terraform_current:  } -19:58:12.152 STDOUT [eks] terraform_current:  } -19:58:12.152 STDOUT [eks] terraform_current:  - kube-proxy = { -19:58:12.152 STDOUT [eks] terraform_current:  - addon_name = "kube-proxy" -19:58:12.152 STDOUT [eks] terraform_current:  - addon_version = "v1.30.3-eksbuild.2" -19:58:12.152 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/kube-proxy/d6c8e4d2-2bf2-1909-954c-94d27c6dac91" -19:58:12.152 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -19:58:12.152 STDOUT [eks] terraform_current:  - configuration_values = "" -19:58:12.152 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -19:58:12.152 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:kube-proxy" -19:58:12.152 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:56Z" -19:58:12.152 STDOUT [eks] terraform_current:  - preserve = true -19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts = null -19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -19:58:12.152 STDOUT [eks] terraform_current:  - service_account_role_arn = "" -19:58:12.152 STDOUT [eks] terraform_current:  - tags = { -19:58:12.152 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" -19:58:12.152 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.152 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.152 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.152 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.152 STDOUT [eks] terraform_current:  } -19:58:12.152 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.152 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" -19:58:12.152 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.152 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" -19:58:12.152 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.152 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.152 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.152 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" -19:58:12.152 STDOUT [eks] terraform_current:  - Terraform = "true" -19:58:12.152 STDOUT [eks] terraform_current:  - Terragrunt = "true" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.152 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.152 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" -19:58:12.152 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" -19:58:12.152 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.152 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.152 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.152 STDOUT [eks] terraform_current:  } -19:58:12.152 STDOUT [eks] terraform_current:  - timeouts = { -19:58:12.152 STDOUT [eks] terraform_current:  - create = null -19:58:12.152 STDOUT [eks] terraform_current:  - delete = null -19:58:12.152 STDOUT [eks] terraform_current:  - update = null -19:58:12.152 STDOUT [eks] terraform_current:  } -19:58:12.152 STDOUT [eks] terraform_current:  } -19:58:12.152 STDOUT [eks] terraform_current:  - snapshot-controller = { -19:58:12.152 STDOUT [eks] terraform_current:  - addon_name = "snapshot-controller" -19:58:12.152 STDOUT [eks] terraform_current:  - addon_version = "v8.0.0-eksbuild.1" -19:58:12.152 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/snapshot-controller/56c8e4d2-2bfb-634a-35b4-2a9352ccba8f" -19:58:12.152 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -19:58:12.152 STDOUT [eks] terraform_current:  - configuration_values = "" -19:58:12.152 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -19:58:12.152 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:snapshot-controller" -19:58:12.152 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:03Z" -19:58:12.152 STDOUT [eks] terraform_current:  - preserve = true -19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts = null -19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -19:58:12.152 STDOUT [eks] terraform_current:  - service_account_role_arn = "" -19:58:12.152 STDOUT [eks] terraform_current:  - tags = { -19:58:12.152 STDOUT [eks] terraform_current:  - CostAllocati -19:58:12.152 STDOUT [eks] terraform_current: on = "csvd:infrastructure" -19:58:12.152 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.152 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.153 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.153 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.153 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.153 STDOUT [eks] terraform_current:  } -19:58:12.153 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.153 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" -19:58:12.153 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.153 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" -19:58:12.153 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.153 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.153 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.153 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" -19:58:12.153 STDOUT [eks] terraform_current:  - Terraform = "true" -19:58:12.153 STDOUT [eks] terraform_current:  - Terragrunt = "true" -19:58:12.153 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.153 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.153 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" -19:58:12.153 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" -19:58:12.153 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.153 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.153 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.153 STDOUT [eks] terraform_current:  } -19:58:12.153 STDOUT [eks] terraform_current:  - timeouts = { -19:58:12.153 STDOUT [eks] terraform_current:  - create = null -19:58:12.153 STDOUT [eks] terraform_current:  - delete = null -19:58:12.153 STDOUT [eks] terraform_current:  - update = null -19:58:12.153 STDOUT [eks] terraform_current:  } -19:58:12.153 STDOUT [eks] terraform_current:  } -19:58:12.153 STDOUT [eks] terraform_current:  - vpc-cni = { -19:58:12.153 STDOUT [eks] terraform_current:  - addon_name = "vpc-cni" -19:58:12.153 STDOUT [eks] terraform_current:  - addon_version = "v1.18.3-eksbuild.2" -19:58:12.153 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/vpc-cni/b8c8e4d2-2bef-7cd0-25c0-8093ffbfd4b0" -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -19:58:12.153 STDOUT [eks] terraform_current:  - configuration_values = "" -19:58:12.153 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:17Z" -19:58:12.153 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:vpc-cni" -19:58:12.153 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:54Z" -19:58:12.153 STDOUT [eks] terraform_current:  - preserve = true -19:58:12.153 STDOUT [eks] terraform_current:  - resolve_conflicts = null -19:58:12.153 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -19:58:12.153 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -19:58:12.153 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-vpc-cni" -19:58:12.153 STDOUT [eks] terraform_current:  - tags = { -19:58:12.153 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" -19:58:12.153 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.153 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.153 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.153 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.153 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.153 STDOUT [eks] terraform_current:  } -19:58:12.153 STDOUT [eks] terraform_current:  - tags_all = { -19:58:12.153 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" -19:58:12.153 STDOUT [eks] terraform_current:  - Environment = "dev" -19:58:12.153 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" -19:58:12.153 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" -19:58:12.153 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" -19:58:12.153 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" -19:58:12.153 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" -19:58:12.153 STDOUT [eks] terraform_current:  - Terraform = "true" -19:58:12.153 STDOUT [eks] terraform_current:  - Terragrunt = "true" -19:58:12.153 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" -19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" -19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" -19:58:12.153 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" -19:58:12.153 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" -19:58:12.153 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" -19:58:12.153 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" -19:58:12.153 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" -19:58:12.153 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" -19:58:12.153 STDOUT [eks] terraform_current:  } -19:58:12.153 STDOUT [eks] terraform_current:  - timeouts = { -19:58:12.153 STDOUT [eks] terraform_current:  - create = null -19:58:12.153 STDOUT [eks] terraform_current:  - delete = null -19:58:12.153 STDOUT [eks] terraform_current:  - update = null -19:58:12.153 STDOUT [eks] terraform_current:  } -19:58:12.153 STDOUT [eks] terraform_current:  } -19:58:12.153 STDOUT [eks] terraform_current:  } -> null -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:cluster/platform-eng-eks-mcm" -> null -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_certificate_authority_data = "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" -> null -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_endpoint = "https://D896BC3B83782F01D590ACB83BB75926.yl4.us-gov-east-1.eks.amazonaws.com" -> null -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_fqdn = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" -> null -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_iam_role = { -19:58:12.153 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cluster-20240906231012049800000004" -19:58:12.153 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-cluster-20240906231012049800000004" -19:58:12.153 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJ6HHWK2XZX" -19:58:12.153 STDOUT [eks] terraform_current:  } -> null -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_identity_providers = {} -> null -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_oidc_issuer_url = "https://oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -> null -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_platform_version = "eks.8" -> null -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_primary_security_group_id = "sg-08e15e3b8fb3384d2" -> null -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_security_group_arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:security-group/sg-0ebcc111357300f20" -> null -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_security_group_id = "sg-0ebcc111357300f20" -> null -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_status = "ACTIVE" -> null -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_tls_certificate_sha1_fingerprint = "9e99a48a9960b14926bb7f3b02e22da2b0ab7280" -> null -19:58:12.153 STDOUT [eks] terraform_current:  - cluster_version = "1.30" -> null -19:58:12.153 STDOUT [eks] terraform_current:  - ebs_csi_irsa_role = { -19:58:12.153 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-ebs-csi-driver" -19:58:12.153 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-ebs-csi-driver" -19:58:12.153 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJSHP2YMKHZ" -19:58:12.153 STDOUT [eks] terraform_current:  } -> null -19:58:12.153 STDOUT [eks] terraform_current:  - efs_csi_irsa_role = { -19:58:12.153 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-efs-csi-driver" -19:58:12.153 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-efs-csi-driver" -19:58:12.153 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJ5LM4S5YEZ" -19:58:12.153 STDOUT [eks] terraform_current:  } -> null -19:58:12.153 STDOUT [eks] terraform_current:  - eks_managed_node_groups = { -19:58:12.153 STDOUT [eks] terraform_current:  - node_group = { -19:58:12.153 STDOUT [eks] terraform_current:  - autoscaling_group_schedule_arns = {} -19:58:12.153 STDOUT [eks] terraform_current:  - iam_role_arn = "arn:aws-us-gov:iam::224384469011:role/eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -19:58:12.153 STDOUT [eks] terraform_current:  - iam_role_name = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -19:58:12.153 STDOUT [eks] terraform_current:  - iam_role_unique_id = "AROATIPS3JAJXVNH4QWBD" -19:58:12.153 STDOUT [eks] terraform_current:  - launch_template_arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:launch-template/lt-0cab502ac2f52bb98" -19:58:12.153 STDOUT [eks] terraform_current:  - launch_template_id = "lt-0cab502ac2f52bb98" -19:58:12.153 STDOUT [eks] terraform_current:  - launch_template_latest_version = 1 -19:58:12.153 STDOUT [eks] terraform_current:  - launch_template_name = "node_group-20240906231928384300000015" -19:58:12.153 STDOUT [eks] terraform_current:  - node_group_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:nodegroup/platform-eng-eks-mcm/eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017/9cc8e4d1-595a-8450-db56-2943ba7896ff" -19:58:12.153 STDOUT [eks] terraform_current:  - node_group_autoscaling_group_names = [ -19:58:12.153 STDOUT [eks] terraform_current:  - "eks-eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017-9cc8e4d1-595a-8450-db56-2943ba7896ff", -19:58:12.153 STDOUT [eks] terraform_current:  ] -19:58:12.153 STDOUT [eks] terraform_current:  - node_group_id = "platform-eng-eks-mcm:eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017" -19:58:12.153 STDOUT [eks] terraform_current:  - node_group_labels = {} -19:58:12.153 STDOUT [eks] terraform_current:  - node_group_resources = [ -19:58:12.153 STDOUT [eks] terraform_current:  - { -19:58:12.153 STDOUT [eks] terraform_current:  - autoscaling_groups = [ -19:58:12.153 STDOUT [eks] terraform_current:  - { -19:58:12.153 STDOUT [eks] terraform_current:  - name = "eks-eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017-9cc8e4d1-595a-8450-db56-2943ba7896ff" -19:58:12.153 STDOUT [eks] terraform_current:  }, -19:58:12.153 STDOUT [eks] terraform_current:  ] -19:58:12.153 STDOUT [eks] terraform_current:  - remote_access_security_group_id = "" -19:58:12.153 STDOUT [eks] terraform_current:  }, -19:58:12.153 STDOUT [eks] terraform_current:  ] -19:58:12.153 STDOUT [eks] terraform_current:  - node_group_status = "ACTIVE" -19:58:12.153 STDOUT [eks] terraform_current:  - node_group_taints = [] -19:58:12.153 STDOUT [eks] terraform_current:  - platform = "bottlerocket" -19:58:12.153 STDOUT [eks] terraform_current:  } -19:58:12.153 STDOUT [eks] terraform_current:  } -> null -19:58:12.153 STDOUT [eks] terraform_current:  - eks_managed_node_groups_autoscaling_group_names = [ -19:58:12.153 STDOUT [eks] terraform_current:  - "eks-eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017-9cc8e4d1-595a-8450-db56-2943ba7896ff", -19:58:12.153 STDOUT [eks] terraform_current:  ] -> null -19:58:12.153 STDOUT [eks] terraform_current:  - fargate_profiles = {} -> null -19:58:12.153 STDOUT [eks] terraform_current:  - kms_key_arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null -19:58:12.153 STDOUT [eks] terraform_current:  - kms_key_id = "548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null -19:58:12.153 STDOUT [eks] terraform_current:  - kms_key_policy = jsonencode( -19:58:12.153 STDOUT [eks] terraform_current:  { -19:58:12.153 STDOUT [eks] terraform_current:  - Statement = [ -19:58:12.154 STDOUT [eks] terraform_current:  - { -19:58:12.154 STDOUT [eks] terraform_current:  - Action = "kms:*" -19:58:12.154 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.154 STDOUT [eks] terraform_current:  - Principal = { -19:58:12.154 STDOUT [eks] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:root" -19:58:12.154 STDOUT [eks] terraform_current:  } -19:58:12.154 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.154 STDOUT [eks] terraform_current:  - Sid = "Default" -19:58:12.154 STDOUT [eks] terraform_current:  }, -19:58:12.154 STDOUT [eks] terraform_current:  - { -19:58:12.154 STDOUT [eks] terraform_current:  - Action = [ -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Update*", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:UntagResource", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:TagResource", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:ScheduleKeyDeletion", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Revoke*", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:ReplicateKey", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Put*", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:List*", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:ImportKeyMaterial", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Get*", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Enable*", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Disable*", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Describe*", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Delete*", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Create*", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:CancelKeyDeletion", -19:58:12.154 STDOUT [eks] terraform_current:  ] -19:58:12.154 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.154 STDOUT [eks] terraform_current:  - Principal = { -19:58:12.154 STDOUT [eks] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:role/r-inf-terraform" -19:58:12.154 STDOUT [eks] terraform_current:  } -19:58:12.154 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.154 STDOUT [eks] terraform_current:  - Sid = "KeyAdministration" -19:58:12.154 STDOUT [eks] terraform_current:  }, -19:58:12.154 STDOUT [eks] terraform_current:  - { -19:58:12.154 STDOUT [eks] terraform_current:  - Action = [ -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:ReEncrypt*", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:GenerateDataKey*", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Encrypt", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:DescribeKey", -19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Decrypt", -19:58:12.154 STDOUT [eks] terraform_current:  ] -19:58:12.154 STDOUT [eks] terraform_current:  - Effect = "Allow" -19:58:12.154 STDOUT [eks] terraform_current:  - Principal = { -19:58:12.154 STDOUT [eks] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cluster-20240906231012049800000004" -19:58:12.154 STDOUT [eks] terraform_current:  } -19:58:12.154 STDOUT [eks] terraform_current:  - Resource = "*" -19:58:12.154 STDOUT [eks] terraform_current:  - Sid = "KeyUsage" -19:58:12.154 STDOUT [eks] terraform_current:  }, -19:58:12.154 STDOUT [eks] terraform_current:  ] -19:58:12.154 STDOUT [eks] terraform_current:  - Version = "2012-10-17" -19:58:12.154 STDOUT [eks] terraform_current:  } -19:58:12.154 STDOUT [eks] terraform_current:  ) -> null -19:58:12.154 STDOUT [eks] terraform_current:  - module_name = "tfmod-eks" -> null -19:58:12.154 STDOUT [eks] terraform_current:  - module_version = "0.1.0" -> null -19:58:12.154 STDOUT [eks] terraform_current:  - node_group_name = "eks-platform-eng-eks-mcm-nodegroup" -> null -19:58:12.154 STDOUT [eks] terraform_current:  - node_security_group_arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:security-group/sg-0b4880f2bae65a949" -> null -19:58:12.154 STDOUT [eks] terraform_current:  - node_security_group_id = "sg-0b4880f2bae65a949" -> null -19:58:12.154 STDOUT [eks] terraform_current:  - oidc_provider = "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -> null -19:58:12.154 STDOUT [eks] terraform_current:  - oidc_provider_arn = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -> null -19:58:12.154 STDOUT [eks] terraform_current:  - security_group_all_worker_mgmt_id = "sg-0117da2c13b4caf21" -> null -19:58:12.154 STDOUT [eks] terraform_current:  - self_managed_node_groups = {} -> null -19:58:12.154 STDOUT [eks] terraform_current:  - self_managed_node_groups_autoscaling_group_names = [] -> null -19:58:12.154 STDOUT [eks] terraform_current:  - subnets = [ -19:58:12.154 STDOUT [eks] terraform_current:  - "subnet-02c2250b9ec2dd6a2", -19:58:12.154 STDOUT [eks] terraform_current:  - "subnet-078b228071c609a50", -19:58:12.154 STDOUT [eks] terraform_current:  - "subnet-07a6339be3670fb41", -19:58:12.154 STDOUT [eks] terraform_current:  ] -> null -19:58:12.154 STDOUT [eks] terraform_current:  - vpc_cidr_block = "10.129.32.0/19" -> null -19:58:12.154 STDOUT [eks] terraform_current:  - vpc_cni_irsa_role = { -19:58:12.154 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-vpc-cni" -19:58:12.154 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-vpc-cni" -19:58:12.154 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJQVAVLU2ER" -19:58:12.154 STDOUT [eks] terraform_current:  } -> null -19:58:12.154 STDOUT [eks] terraform_current:  - vpc_id = "vpc-0280f77b373744eaa" -> null -19:58:12.746 STDOUT [eks] terraform_current: null_resource.kube_config_create: Destroying... [id=1982734664315419478] -19:58:12.747 STDOUT [eks] terraform_current: null_resource.kube_config_create: Destruction complete after 0s -19:58:13.462 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Destroying... [id=subnet-07a6339be3670fb41,kubernetes.io/cluster/platform-eng-eks-mcm] -19:58:13.462 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t4_admin"]: Destroying... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] -19:58:13.462 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Destroying... [id=platform-eng-eks-mcm:amazon-cloudwatch-observability] -19:58:13.462 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["CostAllocation"]: Destroying... [id=sg-08e15e3b8fb3384d2,CostAllocation] -19:58:13.462 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Destroying... [id=platform-eng-eks-mcm:aws-efs-csi-driver] -19:58:13.462 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Destroying... [id=platform-eng-eks-mcm:eks-pod-identity-agent] -19:58:13.462 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Destroying... [id=platform-eng-eks-mcm:coredns] -19:58:13.462 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Destroying... [id=subnet-078b228071c609a50,kubernetes.io/cluster/platform-eng-eks-mcm] -19:58:13.462 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["Environment"]: Destroying... [id=sg-08e15e3b8fb3384d2,Environment] -19:58:13.462 STDOUT [eks] terraform_current: aws_security_group_rule.allow_sidecar_injection: Destroying... [id=sgrule-3033127033] -19:58:13.663 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["Environment"]: Destruction complete after 1s -19:58:13.664 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role_policy_attachment.vpc_cni[0]: Destroying... [id=platform-eng-eks-mcm-vpc-cni-20240906231859418300000013] -19:58:13.692 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Destruction complete after 1s -19:58:13.694 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t3_admin"]: Destroying... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] -19:58:13.696 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Destruction complete after 1s -19:58:13.696 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_version"]: Destroying... [id=sg-08e15e3b8fb3384d2,boc:tf_module_version] -19:58:13.784 STDOUT [eks] terraform_current: aws_security_group_rule.allow_sidecar_injection: Destruction complete after 1s -19:58:13.785 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t2_admin"]: Destroying... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] -19:58:13.787 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_version"]: Destruction complete after 0s -19:58:13.788 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t1_admin"]: Destroying... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] -19:58:13.856 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["CostAllocation"]: Destruction complete after 1s -19:58:13.857 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_name"]: Destroying... [id=sg-08e15e3b8fb3384d2,boc:tf_module_name] -19:58:13.962 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_name"]: Destruction complete after 0s -19:58:13.964 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["cluster_creator_admin"]: Destroying... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/r-inf-terraform#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] -19:58:14.021 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role_policy_attachment.vpc_cni[0]: Destruction complete after 0s -19:58:14.023 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Destroying... [id=platform-eng-eks-mcm:snapshot-controller] -19:58:14.131 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t4_admin"]: Destruction complete after 1s -19:58:14.133 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Destroying... [id=platform-eng-eks-mcm:kube-proxy] -19:58:14.234 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t3_admin"]: Destruction complete after 0s -19:58:14.235 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-046047345c5af7fb1"]: Destroying... [id=subnet-046047345c5af7fb1,kubernetes.io/role/internal-nlb] -19:58:14.314 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t1_admin"]: Destruction complete after 0s -19:58:14.315 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:created_by"]: Destroying... [id=sg-08e15e3b8fb3384d2,boc:created_by] -19:58:14.365 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-046047345c5af7fb1"]: Destruction complete after 0s -19:58:14.366 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_alias.this["cluster"]: Destroying... [id=alias/eks/platform-eng-eks-mcm] -19:58:14.412 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:created_by"]: Destruction complete after 0s -19:58:14.413 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["eks-cluster-name"]: Destroying... [id=sg-08e15e3b8fb3384d2,eks-cluster-name] -19:58:14.466 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_alias.this["cluster"]: Destruction complete after 0s -19:58:14.467 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["cluster:size"]: Destroying... [id=sg-08e15e3b8fb3384d2,cluster:size] -19:58:14.509 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["eks-cluster-name"]: Destruction complete after 1s -19:58:14.511 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Destroying... [id=platform-eng-eks-mcm:vpc-cni] -19:58:14.517 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["cluster_creator_admin"]: Destruction complete after 1s -19:58:14.518 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["slim:schedule"]: Destroying... [id=sg-08e15e3b8fb3384d2,slim:schedule] -19:58:14.562 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["cluster:size"]: Destruction complete after 1s -19:58:14.563 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0]: Destroying... [id=platform-eng-eks-mcm-ebs-csi-driver-20240906231859237400000010] -19:58:14.608 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["slim:schedule"]: Destruction complete after 0s -19:58:14.612 STDOUT [eks] terraform_current: aws_security_group.additional_eks_cluster_sg: Destroying... [id=sg-0fac44214371189c5] -19:58:14.627 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t2_admin"]: Destruction complete after 1s -19:58:14.629 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.cluster_encryption[0]: Destroying... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004-2024090623103435260000000f] -19:58:14.672 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0]: Destruction complete after 0s -19:58:14.674 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-01e04b945b2bfe1de"]: Destroying... [id=subnet-01e04b945b2bfe1de,kubernetes.io/role/internal-nlb] -19:58:14.780 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.cluster_encryption[0]: Destruction complete after 0s -19:58:14.781 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["CloudWatchAgentServerPolicy"]: Destroying... [id=platform-eng-eks-mcm-cloudwatch-observability-20240906231859464700000014] -19:58:14.817 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-01e04b945b2bfe1de"]: Destruction complete after 0s -19:58:14.820 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Destroying... [id=Z0123131367CLDFLTDGZ4] -19:58:14.907 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["CloudWatchAgentServerPolicy"]: Destruction complete after 0s -19:58:14.909 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Destroying... [id=platform-eng-eks-mcm:aws-ebs-csi-driver] -19:58:14.953 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Destruction complete after 2s -19:58:14.954 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["AWSXrayWriteOnlyAccess"]: Destroying... [id=platform-eng-eks-mcm-cloudwatch-observability-20240906231859417100000012] -19:58:14.991 STDOUT [eks] terraform_current: aws_security_group.additional_eks_cluster_sg: Destruction complete after 0s -19:58:14.992 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role_policy_attachment.efs_csi[0]: Destroying... [id=platform-eng-eks-mcm-efs-csi-driver-20240906231859316700000011] -19:58:15.068 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["AWSXrayWriteOnlyAccess"]: Destruction complete after 0s -19:58:15.069 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Destroying... [id=subnet-02c2250b9ec2dd6a2,kubernetes.io/cluster/platform-eng-eks-mcm] -19:58:15.105 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role_policy_attachment.efs_csi[0]: Destruction complete after 0s -19:58:15.106 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-0e3786cf42e38af3d"]: Destroying... [id=subnet-0e3786cf42e38af3d,kubernetes.io/role/internal-nlb] -19:58:15.217 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Destruction complete after 0s -19:58:15.219 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_policy.vpc_cni[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_CNI_Policy-20240906231012049100000003] -19:58:15.246 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-0e3786cf42e38af3d"]: Destruction complete after 0s -19:58:15.247 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["cluster_creator"]: Destroying... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/r-inf-terraform] -19:58:15.477 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_policy.vpc_cni[0]: Destruction complete after 0s -19:58:15.478 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t1"]: Destroying... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c] -19:58:16.002 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["cluster_creator"]: Destruction complete after 1s -19:58:16.004 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t4"]: Destroying... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06] -19:58:16.196 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t1"]: Destruction complete after 1s -19:58:16.198 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t3"]: Destroying... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8] -19:58:16.551 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t4"]: Destruction complete after 1s -19:58:16.553 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t2"]: Destroying... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa] -19:58:16.642 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Destruction complete after 3s -19:58:16.644 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EBS_CSI_Policy-20240906231012048000000002] -19:58:16.725 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t3"]: Destruction complete after 1s -19:58:16.727 STDOUT [eks] terraform_current: module.cluster.aws_iam_policy.cluster_encryption[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/platform-eng-eks-mcm-cluster-ClusterEncryption2024090623103380160000000e] -19:58:16.912 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]: Destruction complete after 0s -19:58:16.915 STDOUT [eks] terraform_current: aws_security_group.all_worker_mgmt: Destroying... [id=sg-0117da2c13b4caf21] -19:58:16.976 STDOUT [eks] terraform_current: module.cluster.aws_iam_policy.cluster_encryption[0]: Destruction complete after 0s -19:58:16.978 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_policy.efs_csi[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EFS_CSI_Policy-20240906231012047900000001] -19:58:17.076 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t2"]: Destruction complete after 0s -19:58:17.247 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_policy.efs_csi[0]: Destruction complete after 0s -19:58:17.266 STDOUT [eks] terraform_current: aws_security_group.all_worker_mgmt: Destruction complete after 0s -19:58:17.709 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Destruction complete after 5s -19:58:17.914 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Destruction complete after 5s -19:58:18.549 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Destruction complete after 4s -19:58:21.446 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Destruction complete after 7s -19:58:22.252 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Destruction complete after 7s -19:58:23.462 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Still destroying... [id=platform-eng-eks-mcm:amazon-cloudwatch-observability, 10s elapsed] -19:58:24.820 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Still destroying... [id=Z0123131367CLDFLTDGZ4, 10s elapsed] -19:58:33.463 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Still destroying... [id=platform-eng-eks-mcm:amazon-cloudwatch-observability, 20s elapsed] -19:58:34.821 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Still destroying... [id=Z0123131367CLDFLTDGZ4, 20s elapsed] -19:58:37.731 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Destruction complete after 25s -19:58:38.035 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].module.user_data.null_resource.validate_cluster_service_cidr: Destroying... [id=4612407423035214643] -19:58:38.037 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role.this[0]: Destroying... [id=platform-eng-eks-mcm-ebs-csi-driver] -19:58:38.037 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role.this[0]: Destroying... [id=platform-eng-eks-mcm-cloudwatch-observability] -19:58:38.037 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].module.user_data.null_resource.validate_cluster_service_cidr: Destruction complete after 0s -19:58:38.037 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role.this[0]: Destroying... [id=platform-eng-eks-mcm-vpc-cni] -19:58:38.037 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role.this[0]: Destroying... [id=platform-eng-eks-mcm-efs-csi-driver] -19:58:38.037 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Destroying... [id=platform-eng-eks-mcm:eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017] -19:58:38.571 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role.this[0]: Destruction complete after 1s -19:58:38.574 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role.this[0]: Destruction complete after 1s -19:58:38.620 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role.this[0]: Destruction complete after 1s -19:58:38.656 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role.this[0]: Destruction complete after 1s -19:58:38.659 STDOUT [eks] terraform_current: module.cluster.aws_iam_openid_connect_provider.oidc_provider[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926] -19:58:38.789 STDOUT [eks] terraform_current: module.cluster.aws_iam_openid_connect_provider.oidc_provider[0]: Destruction complete after 0s -19:58:42.609 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Destruction complete after 28s -19:58:42.610 STDOUT [eks] terraform_current: aws_vpc.vpc: Destroying... [id=vpc-06a2a192783bb40aa] -19:58:43.077 STDOUT [eks] terraform_current: aws_vpc.vpc: Destruction complete after 0s -19:58:48.037 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 10s elapsed] -19:58:58.038 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 20s elapsed] -19:59:08.038 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 30s elapsed] -19:59:18.038 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 40s elapsed] -19:59:28.039 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 50s elapsed] -19:59:38.039 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 1m0s elapsed] -19:59:48.040 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 1m10s elapsed] -19:59:58.040 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 1m20s elapsed] -20:00:08.041 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 1m30s elapsed] -20:00:18.042 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 1m40s elapsed] -20:00:28.042 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 1m50s elapsed] -20:00:38.043 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 2m0s elapsed] -20:00:48.043 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 2m10s elapsed] -20:00:58.044 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 2m20s elapsed] -20:01:08.044 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 2m30s elapsed] -20:01:18.044 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 2m40s elapsed] -20:01:28.045 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 2m50s elapsed] -20:01:38.045 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 3m0s elapsed] -20:01:48.046 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 3m10s elapsed] -20:01:58.046 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 3m20s elapsed] -20:02:08.047 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 3m30s elapsed] -20:02:18.048 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 3m40s elapsed] -20:02:28.048 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 3m50s elapsed] -20:02:38.048 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 4m0s elapsed] -20:02:48.049 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 4m10s elapsed] -20:02:58.049 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 4m20s elapsed] -20:03:08.050 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 4m30s elapsed] -20:03:18.050 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 4m40s elapsed] -20:03:28.050 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 4m50s elapsed] -20:03:38.051 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 5m0s elapsed] -20:03:48.052 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 5m10s elapsed] -20:03:58.056 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 5m20s elapsed] -20:04:08.053 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 5m30s elapsed] -20:04:18.054 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 5m40s elapsed] -20:04:28.055 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 5m50s elapsed] -20:04:38.056 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 6m0s elapsed] -20:04:48.057 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 6m10s elapsed] -20:04:58.058 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 6m20s elapsed] -20:05:08.058 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 6m30s elapsed] -20:05:18.058 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 6m40s elapsed] -20:05:28.059 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 6m50s elapsed] -20:05:38.060 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 7m0s elapsed] -20:05:48.061 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 7m10s elapsed] -20:05:58.061 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 7m20s elapsed] -20:06:08.062 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 7m30s elapsed] -20:06:18.063 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 7m40s elapsed] -20:06:28.063 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 7m50s elapsed] -20:06:38.063 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 8m0s elapsed] -20:06:48.064 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 8m10s elapsed] -20:06:58.064 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 8m20s elapsed] -20:07:00.662 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Destruction complete after 8m23s -20:07:00.983 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_launch_template.this[0]: Destroying... [id=lt-0cab502ac2f52bb98] -20:07:01.234 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_launch_template.this[0]: Destruction complete after 0s -20:07:01.235 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"]: Destroying... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101328910000000b] -20:07:01.235 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"]: Destroying... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101329060000000c] -20:07:01.235 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"]: Destroying... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101328450000000a] -20:07:01.236 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Destroying... [id=2024-09-06T23:19:27Z] -20:07:01.238 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Destruction complete after 0s -20:07:01.243 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Destroying... [id=platform-eng-eks-mcm] -20:07:01.596 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"]: Destruction complete after 1s -20:07:01.617 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"]: Destruction complete after 1s -20:07:01.622 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"]: Destruction complete after 1s -20:07:01.625 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role.this[0]: Destroying... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007] -20:07:02.085 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role.this[0]: Destruction complete after 0s -20:07:11.243 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 10s elapsed] -20:07:21.244 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 20s elapsed] -20:07:31.244 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 30s elapsed] -20:07:41.245 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 40s elapsed] -20:07:51.246 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 50s elapsed] -20:08:01.247 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 1m0s elapsed] -20:08:11.247 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 1m10s elapsed] -20:08:21.248 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 1m20s elapsed] -20:08:31.249 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 1m30s elapsed] -20:08:41.250 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 1m40s elapsed] -20:08:42.570 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Destruction complete after 1m42s -20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_9443_webhook"]: Destroying... [id=sgrule-142063903] -20:08:42.873 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_key.this[0]: Destroying... [id=548a1f15-3b65-467e-b6cf-4e1aa13bb9fc] -20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_443"]: Destroying... [id=sgrule-1028926182] -20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_udp"]: Destroying... [id=sgrule-155164117] -20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_kubelet"]: Destroying... [id=sgrule-1630915307] -20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_nodes_ephemeral"]: Destroying... [id=sgrule-3683901971] -20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.cluster["ingress_nodes_443"]: Destroying... [id=sgrule-2999123215] -20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_6443_webhook"]: Destroying... [id=sgrule-2139797237] -20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_8443_webhook"]: Destroying... [id=sgrule-1825999572] -20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_4443_webhook"]: Destroying... [id=sgrule-3066614115] -20:08:43.026 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_key.this[0]: Destruction complete after 0s -20:08:43.027 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"]: Destroying... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004-20240906231013126400000008] -20:08:43.227 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_4443_webhook"]: Destruction complete after 0s -20:08:43.228 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"]: Destroying... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004-20240906231013127100000009] -20:08:43.231 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.cluster["ingress_nodes_443"]: Destruction complete after 0s -20:08:43.232 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["egress_all"]: Destroying... [id=sgrule-2399073099] -20:08:43.407 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"]: Destruction complete after 0s -20:08:43.409 STDOUT [eks] terraform_current: module.cluster.aws_cloudwatch_log_group.this[0]: Destroying... [id=/aws/eks/platform-eng-eks-mcm/cluster] -20:08:43.506 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_udp"]: Destruction complete after 1s -20:08:43.508 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_tcp"]: Destroying... [id=sgrule-2908765754] -20:08:43.542 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"]: Destruction complete after 1s -20:08:43.544 STDOUT [eks] terraform_current: module.cluster.aws_iam_role.this[0]: Destroying... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004] -20:08:43.570 STDOUT [eks] terraform_current: module.cluster.aws_cloudwatch_log_group.this[0]: Destruction complete after 1s -20:08:43.777 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_nodes_ephemeral"]: Destruction complete after 1s -20:08:44.036 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_9443_webhook"]: Destruction complete after 1s -20:08:44.134 STDOUT [eks] terraform_current: module.cluster.aws_iam_role.this[0]: Destruction complete after 0s -20:08:44.296 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_443"]: Destruction complete after 1s -20:08:44.570 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_8443_webhook"]: Destruction complete after 2s -20:08:44.839 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_kubelet"]: Destruction complete after 2s -20:08:45.083 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_6443_webhook"]: Destruction complete after 2s -20:08:45.345 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["egress_all"]: Destruction complete after 2s -20:08:45.609 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_tcp"]: Destruction complete after 2s -20:08:45.611 STDOUT [eks] terraform_current: module.cluster.aws_security_group.cluster[0]: Destroying... [id=sg-0ebcc111357300f20] -20:08:45.616 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Destroying... [id=sg-0b4880f2bae65a949] -20:08:45.993 STDOUT [eks] terraform_current: module.cluster.aws_security_group.cluster[0]: Destruction complete after 0s -20:08:55.617 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 10s elapsed] -20:09:05.618 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 20s elapsed] -20:09:15.618 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 30s elapsed] -20:09:25.619 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 40s elapsed] -20:09:35.619 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 50s elapsed] -20:09:45.620 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 1m0s elapsed] -20:09:55.620 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 1m10s elapsed] -20:10:05.621 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 1m20s elapsed] -20:10:15.622 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 1m30s elapsed] -20:10:25.623 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 1m40s elapsed] -20:10:35.623 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 1m50s elapsed] -20:10:45.625 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 2m0s elapsed] -20:10:55.625 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 2m10s elapsed] -20:11:05.626 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 2m20s elapsed] -20:11:15.627 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 2m30s elapsed] -20:11:25.627 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 2m40s elapsed] -20:11:35.628 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 2m50s elapsed] -20:11:45.628 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 3m0s elapsed] -20:11:55.629 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 3m10s elapsed] -20:12:05.630 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 3m20s elapsed] -20:12:15.631 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 3m30s elapsed] -20:12:25.632 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 3m40s elapsed] -20:12:35.633 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 3m50s elapsed] -20:12:45.633 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 4m0s elapsed] -20:12:55.634 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 4m10s elapsed] -20:13:05.635 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 4m20s elapsed] -20:13:15.636 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 4m30s elapsed] -20:13:25.636 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 4m40s elapsed] -20:13:35.637 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 4m50s elapsed] -20:13:45.637 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 5m0s elapsed] -20:13:55.638 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 5m10s elapsed] -20:14:05.639 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 5m20s elapsed] -20:14:15.639 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 5m30s elapsed] -20:14:25.640 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 5m40s elapsed] -20:14:35.641 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 5m50s elapsed] -20:14:45.641 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 6m0s elapsed] -20:14:55.642 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 6m10s elapsed] -20:15:05.643 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 6m20s elapsed] -20:15:15.644 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 6m30s elapsed] -20:15:25.645 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 6m40s elapsed] -20:15:35.645 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 6m50s elapsed] -20:15:45.645 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 7m0s elapsed] -20:15:55.646 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 7m10s elapsed] -20:16:05.646 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 7m20s elapsed] -20:16:15.647 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 7m30s elapsed] -20:16:25.647 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 7m40s elapsed] -20:16:35.648 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 7m50s elapsed] -20:16:45.648 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 8m0s elapsed] -20:16:55.649 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 8m10s elapsed] -20:17:05.649 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 8m20s elapsed] -20:17:15.650 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 8m30s elapsed] -20:17:25.651 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 8m40s elapsed] -20:17:35.651 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 8m50s elapsed] -20:17:45.653 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 9m0s elapsed] -20:17:55.653 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 9m10s elapsed] -20:18:05.653 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 9m20s elapsed] -20:18:15.654 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 9m30s elapsed] -20:18:25.654 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 9m40s elapsed] -20:18:35.655 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 9m50s elapsed] -20:18:45.655 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 10m0s elapsed] -20:18:55.656 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 10m10s elapsed] -20:19:02.680 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Destruction complete after 10m17s -20:19:03.221 STDOUT [eks] terraform_current:  -20:19:03.221 STDOUT [eks] terraform_current: Destroy complete! Resources: 81 destroyed. -20:19:03.221 STDOUT [eks] terraform_current: