diff --git a/examples/full-cluster-tf-upgrade/1.24/aws-auth/tf-run.destroy.data b/examples/full-cluster-tf-upgrade/1.24/aws-auth/tf-run.destroy.data new file mode 100644 index 0000000..fcf987a --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.24/aws-auth/tf-run.destroy.data @@ -0,0 +1,9 @@ +VERSION 1.0.1 +BACKUP-STATE +COMMAND tf-init +COMMAND tf-state list + +COMMENT We do not want to remove anything here, because once you do, you will not be able to access the cluster for the destroy step. +COMMENT Destroying the cluster will take care of this directory. + +STOP diff --git a/examples/full-cluster-tf-upgrade/1.24/bin/remove-ecr.sh b/examples/full-cluster-tf-upgrade/1.24/bin/remove-ecr.sh new file mode 100755 index 0000000..06c7975 --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.24/bin/remove-ecr.sh @@ -0,0 +1,77 @@ +#!/bin/bash + +test -r /apps/terraform/etc/aws-functions.sh && source /apps/terraform/etc/aws-functions.sh + +REPO=$1 + +if [ -z $REPO ] +then + echo "missing respository, exiting" + exit 1 +fi + +echo "* listing repositories for $REPO" +#tf-aws ecr describe-repositories --query 'repositories[*].{a1:repositoryName,a2:repositoryArn}' --output text +REPOLIST=$(tf-aws ecr describe-repositories --query 'repositories[*].{a1:repositoryName}' --output text | grep ^$REPO) +for f in $REPOLIST +do + echo " $f" +done +echo "" + +echo "* listing images for each repo in $REPO" +for f in $REPOLIST +do + echo "> $f" + tf-aws ecr list-images --repository-name $f --query 'imageIds[*].{a1:imageDigest,a2:imageTag}' --output text +done +echo "" + +rc=1 +cc=0 +echo "* removing images for each repo in $REPO" +for f in $REPOLIST +do + echo "> $f" + c=1 + tf-aws ecr list-images --repository-name $f --query 'imageIds[*].{a1:imageDigest,a2:imageTag}' --output text | while read digest tag + do + echo "[$rc.$c] rm $digest tag $tag" + true tf-aws ecr batch-delete-image --repository-name $f --image-ids imageDigest=$digest + status=$? + if [ $status == 0 ] + then + cc=$(( $cc + 1 )) + fi + c=$(( $c + 1 )) + done + echo "= removed $c images from $f" + rc=$(( $rc + 1 )) +done +echo "" +echo "= $rc repos, removed $cc images" + +echo "* deleting the repo for each repo in $REPO" +for f in $REPOLIST +do + echo "> $f" + tf-aws ecr delete-repository --repository-name $f +done +echo "" + + +## 2827 2023-05-11 10:20:37 tf-aws ecr describe-repositories -- query 'repositories[*].{a1.repositoryName,a2:respositoryArn}' --output text +## 2828 2023-05-11 10:20:49 tf-aws ecr describe-repositories --query 'repositories[*].{a1.repositoryName,a2:respositoryArn}' --output text +## 2829 2023-05-11 10:20:57 tf-aws ecr describe-repositories --query 'repositories[*].{a1:repositoryName,a2:respositoryArn}' --output text +## 2830 2023-05-11 10:21:20 tf-aws ecr describe-repositories --query 'repositories[*].{a1:repositoryName,a2:repositoryArn}' --output text +## 2831 2023-05-11 10:21:32 tf-aws ecr describe-repositories --query 'repositories[*].{a1:repositoryName,a2:repositoryArn}' --output text|grep eks/ditd-partnerportal-test/ +## 2833 2023-05-11 10:21:51 tf-aws ecr help|grep image +## 2834 2023-05-11 10:22:14 tf-aws ecr list-images +## 2835 2023-05-11 10:22:26 tf-aws ecr list-images --repository-name eks/ditd-partnerportal-test/csi-snapshotter +## 2836 2023-05-11 10:22:45 tf-aws ecr batch-delete-image +## 2837 2023-05-11 10:22:57 tf-aws ecr batch-delete-image --repository-name eks/ditd-partnerportal-test/csi-snapshotter +## 2838 2023-05-11 10:23:05 tf-aws ecr batch-delete-image --repository-name eks/ditd-partnerportal-test/csi-snapshotter --image-ids --help +## 2839 2023-05-11 10:23:11 tf-aws ecr batch-delete-image --repository-name eks/ditd-partnerportal-test/csi-snapshotter --image-ids +## 2840 2023-05-11 10:23:19 tf-aws ecr batch-delete-image help # --repository-name eks/ditd-partnerportal-test/csi-snapshotter --image-ids +## 2841 2023-05-11 10:23:34 tf-aws ecr list-images --repository-name eks/ditd-partnerportal-test/csi-snapshotter +## 2842 2023-05-11 10:23:58 history > remove-ecr.sh diff --git a/examples/full-cluster-tf-upgrade/1.24/common-services/tf-run.destroy.data b/examples/full-cluster-tf-upgrade/1.24/common-services/tf-run.destroy.data new file mode 100644 index 0000000..73489f4 --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.24/common-services/tf-run.destroy.data @@ -0,0 +1,8 @@ +VERSION 1.0.1 +BACKUP-STATE +COMMAND tf-init +COMMAND tf-state list + +module.cert +COMMENT git-secret remove -c */*.key +ALL diff --git a/examples/full-cluster-tf-upgrade/1.24/ebs/tf-run.destroy.data b/examples/full-cluster-tf-upgrade/1.24/ebs/tf-run.destroy.data new file mode 100644 index 0000000..7a82c9f --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.24/ebs/tf-run.destroy.data @@ -0,0 +1,6 @@ +VERSION 1.0.1 +BACKUP-STATE +COMMAND tf-init +COMMAND tf-state list + +ALL diff --git a/examples/full-cluster-tf-upgrade/1.24/efs/tf-run.destroy.data b/examples/full-cluster-tf-upgrade/1.24/efs/tf-run.destroy.data new file mode 100644 index 0000000..7a82c9f --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.24/efs/tf-run.destroy.data @@ -0,0 +1,6 @@ +VERSION 1.0.1 +BACKUP-STATE +COMMAND tf-init +COMMAND tf-state list + +ALL diff --git a/examples/full-cluster-tf-upgrade/1.24/irsa-roles/cluster-autoscaler/tf-run.destroy.data b/examples/full-cluster-tf-upgrade/1.24/irsa-roles/cluster-autoscaler/tf-run.destroy.data new file mode 100644 index 0000000..7a82c9f --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.24/irsa-roles/cluster-autoscaler/tf-run.destroy.data @@ -0,0 +1,6 @@ +VERSION 1.0.1 +BACKUP-STATE +COMMAND tf-init +COMMAND tf-state list + +ALL diff --git a/examples/full-cluster-tf-upgrade/1.24/irsa-roles/tf-run.destroy.data b/examples/full-cluster-tf-upgrade/1.24/irsa-roles/tf-run.destroy.data new file mode 100644 index 0000000..73dcd61 --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.24/irsa-roles/tf-run.destroy.data @@ -0,0 +1,9 @@ +VERSION 1.0.1 +BACKUP-STATE +COMMAND tf-init +COMMAND tf-state list + +COMMENT cd cluster-autoscaler and tf-run.sh destroy, then come back here +STOP + +ALL diff --git a/examples/full-cluster-tf-upgrade/1.24/remove-ecr.sh b/examples/full-cluster-tf-upgrade/1.24/remove-ecr.sh new file mode 100755 index 0000000..3b41756 --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.24/remove-ecr.sh @@ -0,0 +1,70 @@ +#!/bin/bash + +test -r /apps/terraform/etc/aws-functions.sh && source /apps/terraform/etc/aws-functions.sh + +REPO=$1 + +if [ -z $REPO ] +then + echo "missing respository, exiting" + exit 1 +fi + +echo "* listing repositories for $REPO" +#tf-aws ecr describe-repositories --query 'repositories[*].{a1:repositoryName,a2:repositoryArn}' --output text +REPOLIST=$(tf-aws ecr describe-repositories --query 'repositories[*].{a1:repositoryName}' --output text | grep ^$REPO) +for f in $REPOLIST +do + echo " $f" +done +echo "" + +echo "* listing images for each repo in $REPO" +for f in $REPOLIST +do + echo "> $f" + tf-aws ecr list-images --repository-name $f --query 'imageIds[*].{a1:imageDigest,a2:imageTag}' --output text +done +echo "" + +rc=1 +cc=0 +echo "* removing images for each repo in $REPO" +for f in $REPOLIST +do + echo "> $f" + c=1 + tf-aws ecr list-images --repository-name $f --query 'imageIds[*].{a1:imageDigest,a2:imageTag}' --output text | while read digest tag + do + echo "[$rc.$c] rm $digest tag $tag" + tf-aws ecr batch-delete-image --repository-name $f --image-ids imageDigest=$digest + status=$? + if [ $status == 0 ] + then + cc=$(( $cc + 1 )) + fi + c=$(( $c + 1 )) + done + echo "= removed $c images from $f" + rc=$(( $rc + 1 )) +done +echo "" +echo "= $rc repos, removed $cc images" + + + +## 2827 2023-05-11 10:20:37 tf-aws ecr describe-repositories -- query 'repositories[*].{a1.repositoryName,a2:respositoryArn}' --output text +## 2828 2023-05-11 10:20:49 tf-aws ecr describe-repositories --query 'repositories[*].{a1.repositoryName,a2:respositoryArn}' --output text +## 2829 2023-05-11 10:20:57 tf-aws ecr describe-repositories --query 'repositories[*].{a1:repositoryName,a2:respositoryArn}' --output text +## 2830 2023-05-11 10:21:20 tf-aws ecr describe-repositories --query 'repositories[*].{a1:repositoryName,a2:repositoryArn}' --output text +## 2831 2023-05-11 10:21:32 tf-aws ecr describe-repositories --query 'repositories[*].{a1:repositoryName,a2:repositoryArn}' --output text|grep eks/ditd-partnerportal-test/ +## 2833 2023-05-11 10:21:51 tf-aws ecr help|grep image +## 2834 2023-05-11 10:22:14 tf-aws ecr list-images +## 2835 2023-05-11 10:22:26 tf-aws ecr list-images --repository-name eks/ditd-partnerportal-test/csi-snapshotter +## 2836 2023-05-11 10:22:45 tf-aws ecr batch-delete-image +## 2837 2023-05-11 10:22:57 tf-aws ecr batch-delete-image --repository-name eks/ditd-partnerportal-test/csi-snapshotter +## 2838 2023-05-11 10:23:05 tf-aws ecr batch-delete-image --repository-name eks/ditd-partnerportal-test/csi-snapshotter --image-ids --help +## 2839 2023-05-11 10:23:11 tf-aws ecr batch-delete-image --repository-name eks/ditd-partnerportal-test/csi-snapshotter --image-ids +## 2840 2023-05-11 10:23:19 tf-aws ecr batch-delete-image help # --repository-name eks/ditd-partnerportal-test/csi-snapshotter --image-ids +## 2841 2023-05-11 10:23:34 tf-aws ecr list-images --repository-name eks/ditd-partnerportal-test/csi-snapshotter +## 2842 2023-05-11 10:23:58 history > remove-ecr.sh diff --git a/examples/full-cluster-tf-upgrade/1.24/tf-run.destroy.data b/examples/full-cluster-tf-upgrade/1.24/tf-run.destroy.data new file mode 100644 index 0000000..2fbd2f2 --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.24/tf-run.destroy.data @@ -0,0 +1,25 @@ +VERSION 1.0.1 +BACKUP-STATE +COMMAND tf-init +COMMAND tf-state list + +aws_route53_zone.cluster_domain +aws_eks_node_group.eks-nodegroup aws_eks_cluster.eks_cluster aws_iam_openid_connect_provider.oidc aws_launch_template.eks-nodegroup +aws_key_pair.cluster_keypair +null_resource.generate_keypair +module.role_cluster-admin module.role_eks-cluster module.role_eks-nodegroup +module.group_cluster-admin.aws_iam_group.this +POLICY +aws_security_group.additional_eks_cluster_sg aws_security_group.all_worker_mgmt +null_resource.cluster_roles["eks-console-full-access"] null_resource.cluster_roles["eks-console-restricted-access"] + +ALL + +## ./common-services/tf-run.destroy.data +## ./irsa-roles/cluster-autoscaler/tf-run.destroy.data +## ./irsa-roles/tf-run.destroy.data +## ./ebs/tf-run.destroy.data +## ./efs/tf-run.destroy.data +## NO ./aws-auth/tf-run.destroy.data +## ./tf-run.destroy.data + diff --git a/examples/full-cluster-tf-upgrade/1.25/addons/variables.ebs.tf.az b/examples/full-cluster-tf-upgrade/1.25/addons/variables.ebs.tf.az new file mode 100644 index 0000000..231b61d --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.25/addons/variables.ebs.tf.az @@ -0,0 +1,82 @@ +# variable "eks_vpc_name" { +# description = "Define the VPC name that will be used by this cluster" +# type = string +# default = "*vpc4*" +# } +# +# variable "subnets_name" { +# description = "Define the name of the subnets to be used by this cluster" +# type = string +# default = "*-apps-*" +# } + +variable "cluster_worker_sg_id" { + description = "Security group for all worker management." + type = string + default = "" +} + +# See the readme `Updating the aws-ebs-csi-driver chart` to find these values. +variable "aws_ebs_csi_driver_tag" { + description = "Which tag of public.ecr.aws/ebs-csi-driver/aws-ebs-csi-driver" + type = string + default = "v1.15.0" +} + +variable "external_provisioner_tag" { + description = "Which tag of public.ecr.aws/eks-distro/kubernetes-csi/external-provisioner" + type = string + default = "v3.3.0-eks-1-25-latest" +} + +variable "external_attacher_tag" { + description = "Which tag of public.ecr.aws/eks-distro/kubernetes-csi/external-attacher" + type = string + default = "v4.0.0-eks-1-25-latest" +} + +variable "csi_snapshotter_tag" { + description = "Which tag of public.ecr.aws/eks-distro/kubernetes-csi/external-snapshotter/csi-snapshotter" + type = string + default = "v6.1.0-eks-1-25-latest" +} + +variable "livenessprobe_tag" { + description = "Which tag of public.ecr.aws/eks-distro/kubernetes-csi/liveness" + type = string + default = "v2.8.0-eks-1-25-latest" +} + +variable "external_resizer_tag" { + description = "Which tag of public.ecr.aws/eks-distro/kubernetes-csi/external-resizer" + type = string + default = "v1.6.0-eks-1-25-latest" +} + +variable "node_driver_registrar_tag" { + description = "Which tag of public.ecr.aws/eks-distro/kubernetes-csi/node-dri" + type = string + default = "v2.6.2-eks-1-25-latest" +} + +# Set the appropriate kubernetes version! +# aws eks describe-addon-versions --kubernetes-version 1.25 --addon-name kube-proxy --query 'addons[].addonVersions[].{Version: addonVersion, Defaultversion: compatibilities[0].defaultVersion}' --output table +variable "kube_proxy_version" { + description = "The version of the kube-proxy addon to install." + default = "v1.25.6-eksbuild.1" +} + +# Set the appropriate kubernetes version! +# aws eks describe-addon-versions --kubernetes-version 1.25 --addon-name coredns --query 'addons[].addonVersions[].{Version: addonVersion, Defaultversion: compatibilities[0].defaultVersion}' --output table +variable "coredns_version" { + description = "The version of the coredns addon to install." + default = "v1.9.3-eksbuild.2" +} + +# Set the appropriate kubernetes version! +# aws eks describe-addon-versions --kubernetes-version 1.25 --addon-name vpc-cni --query 'addons[].addonVersions[].{Version: addonVersion, Defaultversion: compatibilities[0].defaultVersion}' --output table +variable "vpc_cni_version" { + description = "The version of the vpc-cni addon to install." + default = "v1.12.2-eksbuild.1" +} + diff --git a/examples/full-cluster-tf-upgrade/1.25/aws-auth/tf-run.destroy.data b/examples/full-cluster-tf-upgrade/1.25/aws-auth/tf-run.destroy.data new file mode 100644 index 0000000..fcf987a --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.25/aws-auth/tf-run.destroy.data @@ -0,0 +1,9 @@ +VERSION 1.0.1 +BACKUP-STATE +COMMAND tf-init +COMMAND tf-state list + +COMMENT We do not want to remove anything here, because once you do, you will not be able to access the cluster for the destroy step. +COMMENT Destroying the cluster will take care of this directory. + +STOP diff --git a/examples/full-cluster-tf-upgrade/1.25/bin/remove-ecr.sh b/examples/full-cluster-tf-upgrade/1.25/bin/remove-ecr.sh new file mode 100755 index 0000000..06c7975 --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.25/bin/remove-ecr.sh @@ -0,0 +1,77 @@ +#!/bin/bash + +test -r /apps/terraform/etc/aws-functions.sh && source /apps/terraform/etc/aws-functions.sh + +REPO=$1 + +if [ -z $REPO ] +then + echo "missing respository, exiting" + exit 1 +fi + +echo "* listing repositories for $REPO" +#tf-aws ecr describe-repositories --query 'repositories[*].{a1:repositoryName,a2:repositoryArn}' --output text +REPOLIST=$(tf-aws ecr describe-repositories --query 'repositories[*].{a1:repositoryName}' --output text | grep ^$REPO) +for f in $REPOLIST +do + echo " $f" +done +echo "" + +echo "* listing images for each repo in $REPO" +for f in $REPOLIST +do + echo "> $f" + tf-aws ecr list-images --repository-name $f --query 'imageIds[*].{a1:imageDigest,a2:imageTag}' --output text +done +echo "" + +rc=1 +cc=0 +echo "* removing images for each repo in $REPO" +for f in $REPOLIST +do + echo "> $f" + c=1 + tf-aws ecr list-images --repository-name $f --query 'imageIds[*].{a1:imageDigest,a2:imageTag}' --output text | while read digest tag + do + echo "[$rc.$c] rm $digest tag $tag" + true tf-aws ecr batch-delete-image --repository-name $f --image-ids imageDigest=$digest + status=$? + if [ $status == 0 ] + then + cc=$(( $cc + 1 )) + fi + c=$(( $c + 1 )) + done + echo "= removed $c images from $f" + rc=$(( $rc + 1 )) +done +echo "" +echo "= $rc repos, removed $cc images" + +echo "* deleting the repo for each repo in $REPO" +for f in $REPOLIST +do + echo "> $f" + tf-aws ecr delete-repository --repository-name $f +done +echo "" + + +## 2827 2023-05-11 10:20:37 tf-aws ecr describe-repositories -- query 'repositories[*].{a1.repositoryName,a2:respositoryArn}' --output text +## 2828 2023-05-11 10:20:49 tf-aws ecr describe-repositories --query 'repositories[*].{a1.repositoryName,a2:respositoryArn}' --output text +## 2829 2023-05-11 10:20:57 tf-aws ecr describe-repositories --query 'repositories[*].{a1:repositoryName,a2:respositoryArn}' --output text +## 2830 2023-05-11 10:21:20 tf-aws ecr describe-repositories --query 'repositories[*].{a1:repositoryName,a2:repositoryArn}' --output text +## 2831 2023-05-11 10:21:32 tf-aws ecr describe-repositories --query 'repositories[*].{a1:repositoryName,a2:repositoryArn}' --output text|grep eks/ditd-partnerportal-test/ +## 2833 2023-05-11 10:21:51 tf-aws ecr help|grep image +## 2834 2023-05-11 10:22:14 tf-aws ecr list-images +## 2835 2023-05-11 10:22:26 tf-aws ecr list-images --repository-name eks/ditd-partnerportal-test/csi-snapshotter +## 2836 2023-05-11 10:22:45 tf-aws ecr batch-delete-image +## 2837 2023-05-11 10:22:57 tf-aws ecr batch-delete-image --repository-name eks/ditd-partnerportal-test/csi-snapshotter +## 2838 2023-05-11 10:23:05 tf-aws ecr batch-delete-image --repository-name eks/ditd-partnerportal-test/csi-snapshotter --image-ids --help +## 2839 2023-05-11 10:23:11 tf-aws ecr batch-delete-image --repository-name eks/ditd-partnerportal-test/csi-snapshotter --image-ids +## 2840 2023-05-11 10:23:19 tf-aws ecr batch-delete-image help # --repository-name eks/ditd-partnerportal-test/csi-snapshotter --image-ids +## 2841 2023-05-11 10:23:34 tf-aws ecr list-images --repository-name eks/ditd-partnerportal-test/csi-snapshotter +## 2842 2023-05-11 10:23:58 history > remove-ecr.sh diff --git a/examples/full-cluster-tf-upgrade/1.25/common-services/tf-run.destroy.data b/examples/full-cluster-tf-upgrade/1.25/common-services/tf-run.destroy.data new file mode 100644 index 0000000..73489f4 --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.25/common-services/tf-run.destroy.data @@ -0,0 +1,8 @@ +VERSION 1.0.1 +BACKUP-STATE +COMMAND tf-init +COMMAND tf-state list + +module.cert +COMMENT git-secret remove -c */*.key +ALL diff --git a/examples/full-cluster-tf-upgrade/1.25/ebs/tf-run.destroy.data b/examples/full-cluster-tf-upgrade/1.25/ebs/tf-run.destroy.data new file mode 100644 index 0000000..7a82c9f --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.25/ebs/tf-run.destroy.data @@ -0,0 +1,6 @@ +VERSION 1.0.1 +BACKUP-STATE +COMMAND tf-init +COMMAND tf-state list + +ALL diff --git a/examples/full-cluster-tf-upgrade/1.25/efs/tf-run.destroy.data b/examples/full-cluster-tf-upgrade/1.25/efs/tf-run.destroy.data new file mode 100644 index 0000000..7a82c9f --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.25/efs/tf-run.destroy.data @@ -0,0 +1,6 @@ +VERSION 1.0.1 +BACKUP-STATE +COMMAND tf-init +COMMAND tf-state list + +ALL diff --git a/examples/full-cluster-tf-upgrade/1.25/irsa-roles/cluster-autoscaler/tf-run.destroy.data b/examples/full-cluster-tf-upgrade/1.25/irsa-roles/cluster-autoscaler/tf-run.destroy.data new file mode 100644 index 0000000..7a82c9f --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.25/irsa-roles/cluster-autoscaler/tf-run.destroy.data @@ -0,0 +1,6 @@ +VERSION 1.0.1 +BACKUP-STATE +COMMAND tf-init +COMMAND tf-state list + +ALL diff --git a/examples/full-cluster-tf-upgrade/1.25/irsa-roles/tf-run.destroy.data b/examples/full-cluster-tf-upgrade/1.25/irsa-roles/tf-run.destroy.data new file mode 100644 index 0000000..73dcd61 --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.25/irsa-roles/tf-run.destroy.data @@ -0,0 +1,9 @@ +VERSION 1.0.1 +BACKUP-STATE +COMMAND tf-init +COMMAND tf-state list + +COMMENT cd cluster-autoscaler and tf-run.sh destroy, then come back here +STOP + +ALL diff --git a/examples/full-cluster-tf-upgrade/1.25/tf-run.destroy.data b/examples/full-cluster-tf-upgrade/1.25/tf-run.destroy.data new file mode 100644 index 0000000..2fbd2f2 --- /dev/null +++ b/examples/full-cluster-tf-upgrade/1.25/tf-run.destroy.data @@ -0,0 +1,25 @@ +VERSION 1.0.1 +BACKUP-STATE +COMMAND tf-init +COMMAND tf-state list + +aws_route53_zone.cluster_domain +aws_eks_node_group.eks-nodegroup aws_eks_cluster.eks_cluster aws_iam_openid_connect_provider.oidc aws_launch_template.eks-nodegroup +aws_key_pair.cluster_keypair +null_resource.generate_keypair +module.role_cluster-admin module.role_eks-cluster module.role_eks-nodegroup +module.group_cluster-admin.aws_iam_group.this +POLICY +aws_security_group.additional_eks_cluster_sg aws_security_group.all_worker_mgmt +null_resource.cluster_roles["eks-console-full-access"] null_resource.cluster_roles["eks-console-restricted-access"] + +ALL + +## ./common-services/tf-run.destroy.data +## ./irsa-roles/cluster-autoscaler/tf-run.destroy.data +## ./irsa-roles/tf-run.destroy.data +## ./ebs/tf-run.destroy.data +## ./efs/tf-run.destroy.data +## NO ./aws-auth/tf-run.destroy.data +## ./tf-run.destroy.data +