diff --git a/packages/app/package.json b/packages/app/package.json index 2ee2120..9768ed0 100644 --- a/packages/app/package.json +++ b/packages/app/package.json @@ -44,6 +44,7 @@ "@backstage/plugin-techdocs-react": "^1.1.3", "@backstage/plugin-user-settings": "^0.7.0", "@backstage/theme": "^0.2.17", + "@internal/plugin-workflows": "^0.1.0", "@material-ui/core": "^4.12.2", "@material-ui/icons": "^4.9.1", "history": "^5.0.0", diff --git a/packages/app/src/App.tsx b/packages/app/src/App.tsx index 056402f..e561310 100644 --- a/packages/app/src/App.tsx +++ b/packages/app/src/App.tsx @@ -33,6 +33,7 @@ import { AppRouter, FlatRoutes } from '@backstage/core-app-api'; import { CatalogGraphPage } from '@backstage/plugin-catalog-graph'; import { RequirePermission } from '@backstage/plugin-permission-react'; import { catalogEntityCreatePermission } from '@backstage/plugin-catalog-common/alpha'; +import { WorkflowsPage } from '@internal/plugin-workflows'; const app = createApp({ apis, @@ -91,6 +92,7 @@ const routes = ( } /> } /> + } /> ); diff --git a/plugins/workflows/.eslintrc.js b/plugins/workflows/.eslintrc.js new file mode 100644 index 0000000..e2a53a6 --- /dev/null +++ b/plugins/workflows/.eslintrc.js @@ -0,0 +1 @@ +module.exports = require('@backstage/cli/config/eslint-factory')(__dirname); diff --git a/plugins/workflows/README.md b/plugins/workflows/README.md new file mode 100644 index 0000000..1d0ab72 --- /dev/null +++ b/plugins/workflows/README.md @@ -0,0 +1,13 @@ +# workflows + +Welcome to the workflows plugin! + +_This plugin was created through the Backstage CLI_ + +## Getting started + +Your plugin has been added to the example app in this repository, meaning you'll be able to access it by running `yarn start` in the root directory, and then navigating to [/workflows](http://localhost:3000/workflows). + +You can also serve the plugin in isolation by running `yarn start` in the plugin directory. +This method of serving the plugin provides quicker iteration speed and a faster startup and hot reloads. +It is only meant for local development, and the setup for it can be found inside the [/dev](./dev) directory. diff --git a/plugins/workflows/dev/index.tsx b/plugins/workflows/dev/index.tsx new file mode 100644 index 0000000..b6cd8ed --- /dev/null +++ b/plugins/workflows/dev/index.tsx @@ -0,0 +1,12 @@ +import React from 'react'; +import { createDevApp } from '@backstage/dev-utils'; +import { workflowsPlugin, WorkflowsPage } from '../src/plugin'; + +createDevApp() + .registerPlugin(workflowsPlugin) + .addPage({ + element: , + title: 'Root Page', + path: '/workflows' + }) + .render(); diff --git a/plugins/workflows/package.json b/plugins/workflows/package.json new file mode 100644 index 0000000..49bb8e0 --- /dev/null +++ b/plugins/workflows/package.json @@ -0,0 +1,52 @@ +{ + "name": "@internal/plugin-workflows", + "version": "0.1.0", + "main": "src/index.ts", + "types": "src/index.ts", + "license": "Apache-2.0", + "private": true, + "publishConfig": { + "access": "public", + "main": "dist/index.esm.js", + "types": "dist/index.d.ts" + }, + "backstage": { + "role": "frontend-plugin" + }, + "scripts": { + "start": "backstage-cli package start", + "build": "backstage-cli package build", + "lint": "backstage-cli package lint", + "test": "backstage-cli package test", + "clean": "backstage-cli package clean", + "prepack": "backstage-cli package prepack", + "postpack": "backstage-cli package postpack" + }, + "dependencies": { + "@backstage/core-components": "^0.12.4", + "@backstage/core-plugin-api": "^1.4.0", + "@backstage/theme": "^0.2.17", + "@material-ui/core": "^4.12.2", + "@material-ui/icons": "^4.9.1", + "@material-ui/lab": "4.0.0-alpha.57", + "react-use": "^17.2.4" + }, + "peerDependencies": { + "react": "^16.13.1 || ^17.0.0" + }, + "devDependencies": { + "@backstage/cli": "^0.22.2", + "@backstage/core-app-api": "^1.5.0", + "@backstage/dev-utils": "^1.0.12", + "@backstage/test-utils": "^1.2.5", + "@testing-library/jest-dom": "^5.10.1", + "@testing-library/react": "^12.1.3", + "@testing-library/user-event": "^14.0.0", + "@types/node": "*", + "msw": "^0.49.0", + "cross-fetch": "^3.1.5" + }, + "files": [ + "dist" + ] +} diff --git a/plugins/workflows/src/components/ExampleComponent/ExampleComponent.test.tsx b/plugins/workflows/src/components/ExampleComponent/ExampleComponent.test.tsx new file mode 100644 index 0000000..24974f5 --- /dev/null +++ b/plugins/workflows/src/components/ExampleComponent/ExampleComponent.test.tsx @@ -0,0 +1,27 @@ +import React from 'react'; +import { ExampleComponent } from './ExampleComponent'; +import { rest } from 'msw'; +import { setupServer } from 'msw/node'; +import { screen } from '@testing-library/react'; +import { + setupRequestMockHandlers, + renderInTestApp, +} from "@backstage/test-utils"; + +describe('ExampleComponent', () => { + const server = setupServer(); + // Enable sane handlers for network requests + setupRequestMockHandlers(server); + + // setup mock response + beforeEach(() => { + server.use( + rest.get('/*', (_, res, ctx) => res(ctx.status(200), ctx.json({}))), + ); + }); + + it('should render', async () => { + await renderInTestApp(); + expect(screen.getByText('Welcome to workflows!')).toBeInTheDocument(); + }); +}); diff --git a/plugins/workflows/src/components/ExampleComponent/ExampleComponent.tsx b/plugins/workflows/src/components/ExampleComponent/ExampleComponent.tsx new file mode 100644 index 0000000..1321b87 --- /dev/null +++ b/plugins/workflows/src/components/ExampleComponent/ExampleComponent.tsx @@ -0,0 +1,50 @@ +import React from 'react'; +import {Typography, Grid, IconButton} from '@material-ui/core'; +import DeleteIcon from '@material-ui/icons/Delete'; +import ClearIcon from '@material-ui/icons/Clear' +import LinkOffRounded from "@material-ui/icons/LinkOffRounded"; +import { + InfoCard, + Header, + Page, + Content, + ContentHeader, + HeaderLabel, + SupportButton, +} from '@backstage/core-components'; +import { ExampleFetchComponent } from '../ExampleFetchComponent'; + +export const ExampleComponent = () => ( + +
+ + +
+ + {/**/} + {/* A description of your plugin goes here.*/} + {/**/} + + + + + Manage this blueprint deployment + + + + + + + + + + + + + + + + + +
+); diff --git a/plugins/workflows/src/components/ExampleComponent/index.ts b/plugins/workflows/src/components/ExampleComponent/index.ts new file mode 100644 index 0000000..8b84375 --- /dev/null +++ b/plugins/workflows/src/components/ExampleComponent/index.ts @@ -0,0 +1 @@ +export { ExampleComponent } from './ExampleComponent'; diff --git a/plugins/workflows/src/components/ExampleFetchComponent/ExampleFetchComponent.test.tsx b/plugins/workflows/src/components/ExampleFetchComponent/ExampleFetchComponent.test.tsx new file mode 100644 index 0000000..a553ecd --- /dev/null +++ b/plugins/workflows/src/components/ExampleFetchComponent/ExampleFetchComponent.test.tsx @@ -0,0 +1,25 @@ +import React from 'react'; +import { render, screen } from '@testing-library/react'; +import { ExampleFetchComponent } from './ExampleFetchComponent'; +import { rest } from 'msw'; +import { setupServer } from 'msw/node'; +import { setupRequestMockHandlers } from '@backstage/test-utils'; + +describe('ExampleFetchComponent', () => { + const server = setupServer(); + // Enable sane handlers for network requests + setupRequestMockHandlers(server); + + // setup mock response + beforeEach(() => { + server.use( + rest.get('https://randomuser.me/*', (_, res, ctx) => + res(ctx.status(200), ctx.delay(2000), ctx.json({})), + ), + ); + }); + it('should render', async () => { + await render(); + expect(await screen.findByTestId('progress')).toBeInTheDocument(); + }); +}); diff --git a/plugins/workflows/src/components/ExampleFetchComponent/ExampleFetchComponent.tsx b/plugins/workflows/src/components/ExampleFetchComponent/ExampleFetchComponent.tsx new file mode 100644 index 0000000..693d619 --- /dev/null +++ b/plugins/workflows/src/components/ExampleFetchComponent/ExampleFetchComponent.tsx @@ -0,0 +1,86 @@ +import React from 'react'; +import { makeStyles } from '@material-ui/core/styles'; +import { Table, TableColumn, Progress } from '@backstage/core-components'; +import {tfstate} from "./terraform" +import Alert from '@material-ui/lab/Alert'; +import useAsync from 'react-use/lib/useAsync'; + +type TFState = { + terraform_version: string + resources: { + name: string + provider: string + type: string + instances: { + attributes: { + arn: string + id: string + } + }[] + }[] +} + +type Resource = { + name: string + provider: string + type: string + arn?: string + id?: string +} + +type TFTableProps = { + resources: Resource[] +} + +export const TFTable = (props: TFTableProps) => { + + const columns: TableColumn[] = [ + { title: 'Name', field: 'name' }, + { title: 'Provider', field: 'provider' }, + { title: 'Type', field: 'type' }, + { title: 'Arn', field: 'arn' }, + { title: 'ID', field: 'id' }, + ]; + + return ( + + ); +} + +export const ExampleFetchComponent = () => { + + const tfdata = tfstate as TFState + const resources = tfdata.resources.map(value => { + const out: Resource = { + name: value.name, + provider: value.provider, + type: value.type, + } + if (value.instances.length > 0) { + out.arn = value.instances[0].attributes.arn + out.id = value.instances[0].attributes.id + } + return out + }) + + return + + // const { value, loading, error } = useAsync(async (): Promise => { + // const response = await fetch('https://randomuser.me/api/?results=20'); + // const data = await response.json(); + // return data.results; + // }, []); + // + // if (loading) { + // return ; + // } else if (error) { + // return {error.message}; + // } + // + // return ; +}; diff --git a/plugins/workflows/src/components/ExampleFetchComponent/index.ts b/plugins/workflows/src/components/ExampleFetchComponent/index.ts new file mode 100644 index 0000000..41a43e8 --- /dev/null +++ b/plugins/workflows/src/components/ExampleFetchComponent/index.ts @@ -0,0 +1 @@ +export { ExampleFetchComponent } from './ExampleFetchComponent'; diff --git a/plugins/workflows/src/components/ExampleFetchComponent/terraform.ts b/plugins/workflows/src/components/ExampleFetchComponent/terraform.ts new file mode 100644 index 0000000..7d1f429 --- /dev/null +++ b/plugins/workflows/src/components/ExampleFetchComponent/terraform.ts @@ -0,0 +1,7700 @@ +export const tfstate = { + "version": 4, + "terraform_version": "1.3.9", + "serial": 1020, + "lineage": "51f0615f-ffe6-ac7d-b5c1-d9c12b3bea28", + "outputs": { + "configure_kubectl": { + "value": "aws eks --region us-west-2 update-kubeconfig --name spark-k8s-operator", + "type": "string" + } + }, + "resources": [ + { + "mode": "data", + "type": "aws_availability_zones", + "name": "available", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "all_availability_zones": null, + "exclude_names": null, + "exclude_zone_ids": null, + "filter": null, + "group_names": [ + "us-west-2" + ], + "id": "us-west-2", + "names": [ + "us-west-2a", + "us-west-2b", + "us-west-2c", + "us-west-2d" + ], + "state": null, + "timeouts": null, + "zone_ids": [ + "usw2-az1", + "usw2-az2", + "usw2-az3", + "usw2-az4" + ] + }, + "sensitive_attributes": [] + } + ] + }, + { + "mode": "data", + "type": "aws_caller_identity", + "name": "current", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "account_id": "833162080385", + "arn": "arn:aws:sts::833162080385:assumed-role/Admin/mccloman-Isengard", + "id": "833162080385", + "user_id": "AROA4D7CUOCA6SGFA3KA2:mccloman-Isengard" + }, + "sensitive_attributes": [] + } + ] + }, + { + "mode": "data", + "type": "aws_eks_cluster_auth", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "id": "spark-k8s-operator", + "name": "spark-k8s-operator", + "token": "k8s-aws-v1.aHR0cHM6Ly9zdHMuYW1hem9uYXdzLmNvbS8_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" + }, + "sensitive_attributes": [] + } + ] + }, + { + "mode": "data", + "type": "aws_iam_policy_document", + "name": "fluent_bit", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "id": "1351220528", + "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:PutObjectAcl\",\n \"s3:PutObject\",\n \"s3:ListBucket\",\n \"s3:GetObjectAcl\",\n \"s3:GetObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:DeleteObject\"\n ],\n \"Resource\": \"arn:aws:s3:::spark-83316208038520230301011541857600000001/*\"\n }\n ]\n}", + "override_json": null, + "override_policy_documents": null, + "policy_id": null, + "source_json": null, + "source_policy_documents": null, + "statement": [ + { + "actions": [ + "s3:DeleteObject", + "s3:DeleteObjectVersion", + "s3:GetObject", + "s3:GetObjectAcl", + "s3:ListBucket", + "s3:PutObject", + "s3:PutObjectAcl" + ], + "condition": [], + "effect": "Allow", + "not_actions": [], + "not_principals": [], + "not_resources": [], + "principals": [], + "resources": [ + "arn:aws:s3:::spark-83316208038520230301011541857600000001/*" + ], + "sid": "" + } + ], + "version": "2012-10-17" + }, + "sensitive_attributes": [] + } + ] + }, + { + "mode": "data", + "type": "aws_iam_policy_document", + "name": "spark_operator", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "id": "290308771", + "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:PutObject\",\n \"s3:ListBucket\",\n \"s3:GetObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:DeleteObject\"\n ],\n \"Resource\": \"arn:aws:s3:::*\"\n },\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"logs:PutLogEvents\",\n \"logs:DescribeLogStreams\",\n \"logs:DescribeLogGroups\",\n \"logs:CreateLogStream\",\n \"logs:CreateLogGroup\"\n ],\n \"Resource\": \"arn:aws:logs:us-west-2:833162080385:log-group:*\"\n }\n ]\n}", + "override_json": null, + "override_policy_documents": null, + "policy_id": null, + "source_json": null, + "source_policy_documents": null, + "statement": [ + { + "actions": [ + "s3:DeleteObject", + "s3:DeleteObjectVersion", + "s3:GetObject", + "s3:ListBucket", + "s3:PutObject" + ], + "condition": [], + "effect": "Allow", + "not_actions": [], + "not_principals": [], + "not_resources": [], + "principals": [], + "resources": [ + "arn:aws:s3:::*" + ], + "sid": "" + }, + { + "actions": [ + "logs:CreateLogGroup", + "logs:CreateLogStream", + "logs:DescribeLogGroups", + "logs:DescribeLogStreams", + "logs:PutLogEvents" + ], + "condition": [], + "effect": "Allow", + "not_actions": [], + "not_principals": [], + "not_resources": [], + "principals": [], + "resources": [ + "arn:aws:logs:us-west-2:833162080385:log-group:*" + ], + "sid": "" + } + ], + "version": "2012-10-17" + }, + "sensitive_attributes": [] + } + ] + }, + { + "mode": "data", + "type": "aws_partition", + "name": "current", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "dns_suffix": "amazonaws.com", + "id": "aws", + "partition": "aws", + "reverse_dns_prefix": "com.amazonaws" + }, + "sensitive_attributes": [] + } + ] + }, + { + "mode": "data", + "type": "aws_region", + "name": "current", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "description": "US West (Oregon)", + "endpoint": "ec2.us-west-2.amazonaws.com", + "id": "us-west-2", + "name": "us-west-2" + }, + "sensitive_attributes": [] + } + ] + }, + { + "mode": "data", + "type": "aws_secretsmanager_secret_version", + "name": "admin_password_version", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "arn": "arn:aws:secretsmanager:us-west-2:833162080385:secret:grafana-OzUaPL", + "id": "arn:aws:secretsmanager:us-west-2:833162080385:secret:grafana-OzUaPL|AWSCURRENT", + "secret_binary": "", + "secret_id": "arn:aws:secretsmanager:us-west-2:833162080385:secret:grafana-OzUaPL", + "secret_string": "fNFYio**I3hE9RC0", + "version_id": "BC2CA00C-7737-4F63-820F-BFF1C52DC667", + "version_stage": "AWSCURRENT", + "version_stages": [ + "AWSCURRENT" + ] + }, + "sensitive_attributes": [] + } + ] + }, + { + "mode": "managed", + "type": "aws_iam_policy", + "name": "fluentbit", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::833162080385:policy/spark-k8s-operator-fluentbit-additional", + "description": "IAM policy policy for FluentBit", + "id": "arn:aws:iam::833162080385:policy/spark-k8s-operator-fluentbit-additional", + "name": "spark-k8s-operator-fluentbit-additional", + "name_prefix": null, + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"s3:PutObjectAcl\",\"s3:PutObject\",\"s3:ListBucket\",\"s3:GetObjectAcl\",\"s3:GetObject\",\"s3:DeleteObjectVersion\",\"s3:DeleteObject\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:s3:::spark-83316208038520230301011541857600000001/*\",\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPA4D7CUOCAUBVPGL3AJ", + "tags": {}, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_s3_bucket.this", + "data.aws_caller_identity.current", + "data.aws_iam_policy_document.fluent_bit", + "data.aws_partition.current" + ] + } + ] + }, + { + "mode": "managed", + "type": "aws_iam_policy", + "name": "spark", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::833162080385:policy/spark-k8s-operator-spark-irsa", + "description": "IAM role policy for Spark Job execution", + "id": "arn:aws:iam::833162080385:policy/spark-k8s-operator-spark-irsa", + "name": "spark-k8s-operator-spark-irsa", + "name_prefix": null, + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"s3:PutObject\",\"s3:ListBucket\",\"s3:GetObject\",\"s3:DeleteObjectVersion\",\"s3:DeleteObject\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:s3:::*\",\"Sid\":\"\"},{\"Action\":[\"logs:PutLogEvents\",\"logs:DescribeLogStreams\",\"logs:DescribeLogGroups\",\"logs:CreateLogStream\",\"logs:CreateLogGroup\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:logs:us-west-2:833162080385:log-group:*\",\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPA4D7CUOCAY4B4YUL4B", + "tags": {}, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_caller_identity.current", + "data.aws_iam_policy_document.spark_operator", + "data.aws_partition.current", + "data.aws_region.current" + ] + } + ] + }, + { + "mode": "managed", + "type": "aws_s3_bucket", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "acceleration_status": "", + "acl": null, + "arn": "arn:aws:s3:::spark-83316208038520230301011541857600000001", + "bucket": "spark-83316208038520230301011541857600000001", + "bucket_domain_name": "spark-83316208038520230301011541857600000001.s3.amazonaws.com", + "bucket_prefix": "spark-833162080385", + "bucket_regional_domain_name": "spark-83316208038520230301011541857600000001.s3.us-west-2.amazonaws.com", + "cors_rule": [], + "force_destroy": false, + "grant": [ + { + "id": "58c9f16f81162702b856ac4e70853220e96f7aafdcf1c40b71028932f0e3ae94", + "permissions": [ + "FULL_CONTROL" + ], + "type": "CanonicalUser", + "uri": "" + } + ], + "hosted_zone_id": "Z3BJ6K6RIION7M", + "id": "spark-83316208038520230301011541857600000001", + "lifecycle_rule": [], + "logging": [], + "object_lock_configuration": [], + "object_lock_enabled": false, + "policy": "", + "region": "us-west-2", + "replication_configuration": [], + "request_payer": "BucketOwner", + "server_side_encryption_configuration": [ + { + "rule": [ + { + "apply_server_side_encryption_by_default": [ + { + "kms_master_key_id": "", + "sse_algorithm": "AES256" + } + ], + "bucket_key_enabled": false + } + ] + } + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "timeouts": null, + "versioning": [ + { + "enabled": false, + "mfa_delete": false + } + ], + "website": [], + "website_domain": null, + "website_endpoint": null + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjM2MDAwMDAwMDAwMDAsInJlYWQiOjEyMDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_caller_identity.current" + ] + } + ] + }, + { + "mode": "managed", + "type": "aws_s3_bucket_acl", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "access_control_policy": [ + { + "grant": [ + { + "grantee": [ + { + "display_name": "mccloman+1", + "email_address": "", + "id": "58c9f16f81162702b856ac4e70853220e96f7aafdcf1c40b71028932f0e3ae94", + "type": "CanonicalUser", + "uri": "" + } + ], + "permission": "FULL_CONTROL" + } + ], + "owner": [ + { + "display_name": "mccloman+1", + "id": "58c9f16f81162702b856ac4e70853220e96f7aafdcf1c40b71028932f0e3ae94" + } + ] + } + ], + "acl": "private", + "bucket": "spark-83316208038520230301011541857600000001", + "expected_bucket_owner": "", + "id": "spark-83316208038520230301011541857600000001,private" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_s3_bucket.this", + "data.aws_caller_identity.current" + ] + } + ] + }, + { + "mode": "managed", + "type": "aws_s3_bucket_public_access_block", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "block_public_acls": true, + "block_public_policy": true, + "bucket": "spark-83316208038520230301011541857600000001", + "id": "spark-83316208038520230301011541857600000001", + "ignore_public_acls": true, + "restrict_public_buckets": true + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_s3_bucket.this", + "data.aws_caller_identity.current" + ] + } + ] + }, + { + "mode": "managed", + "type": "aws_s3_bucket_server_side_encryption_configuration", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "bucket": "spark-83316208038520230301011541857600000001", + "expected_bucket_owner": "", + "id": "spark-83316208038520230301011541857600000001", + "rule": [ + { + "apply_server_side_encryption_by_default": [ + { + "kms_master_key_id": "", + "sse_algorithm": "AES256" + } + ], + "bucket_key_enabled": false + } + ] + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_s3_bucket.this", + "data.aws_caller_identity.current" + ] + } + ] + }, + { + "mode": "managed", + "type": "aws_s3_object", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "acl": "private", + "bucket": "spark-83316208038520230301011541857600000001", + "bucket_key_enabled": false, + "cache_control": "", + "content": null, + "content_base64": null, + "content_disposition": "", + "content_encoding": "", + "content_language": "", + "content_type": "application/x-directory", + "etag": "d41d8cd98f00b204e9800998ecf8427e", + "force_destroy": false, + "id": "spark-k8s-operator/event-history-logs/", + "key": "spark-k8s-operator/event-history-logs/", + "kms_key_id": null, + "metadata": {}, + "object_lock_legal_hold_status": "", + "object_lock_mode": "", + "object_lock_retain_until_date": "", + "server_side_encryption": "AES256", + "source": null, + "source_hash": null, + "storage_class": "STANDARD", + "tags": {}, + "tags_all": {}, + "version_id": "", + "website_redirect": "" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_s3_bucket.this", + "aws_s3_bucket_acl.this", + "aws_s3_bucket_public_access_block.this", + "aws_s3_bucket_server_side_encryption_configuration.this", + "data.aws_availability_zones.available", + "data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "mode": "managed", + "type": "aws_secretsmanager_secret", + "name": "grafana", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "arn": "arn:aws:secretsmanager:us-west-2:833162080385:secret:grafana-OzUaPL", + "description": "", + "force_overwrite_replica_secret": false, + "id": "arn:aws:secretsmanager:us-west-2:833162080385:secret:grafana-OzUaPL", + "kms_key_id": "", + "name": "grafana", + "name_prefix": "", + "policy": "", + "recovery_window_in_days": 0, + "replica": [], + "rotation_enabled": false, + "rotation_lambda_arn": "", + "rotation_rules": [], + "tags": {}, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + } + ] + }, + { + "mode": "managed", + "type": "aws_secretsmanager_secret_version", + "name": "grafana", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "arn": "arn:aws:secretsmanager:us-west-2:833162080385:secret:grafana-OzUaPL", + "id": "arn:aws:secretsmanager:us-west-2:833162080385:secret:grafana-OzUaPL|BC2CA00C-7737-4F63-820F-BFF1C52DC667", + "secret_binary": "", + "secret_id": "arn:aws:secretsmanager:us-west-2:833162080385:secret:grafana-OzUaPL", + "secret_string": "fNFYio**I3hE9RC0", + "version_id": "BC2CA00C-7737-4F63-820F-BFF1C52DC667", + "version_stages": [ + "AWSCURRENT" + ] + }, + "sensitive_attributes": [ + [ + { + "type": "get_attr", + "value": "secret_string" + } + ] + ], + "private": "bnVsbA==", + "dependencies": [ + "aws_secretsmanager_secret.grafana", + "random_password.grafana" + ] + } + ] + }, + { + "mode": "managed", + "type": "kubernetes_cluster_role", + "name": "spark_role", + "provider": "provider[\"registry.terraform.io/hashicorp/kubernetes\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "aggregation_rule": [], + "id": "spark-cluster-role", + "metadata": [ + { + "annotations": {}, + "generate_name": "", + "generation": 0, + "labels": {}, + "name": "spark-cluster-role", + "resource_version": "1103", + "uid": "df397ae0-7dc6-4c06-802f-b2852f7e10f9" + } + ], + "rule": [ + { + "api_groups": [ + "" + ], + "non_resource_urls": [], + "resource_names": [], + "resources": [ + "namespaces", + "nodes", + "persistentvolumes" + ], + "verbs": [ + "get", + "list", + "watch" + ] + }, + { + "api_groups": [ + "storage.k8s.io" + ], + "non_resource_urls": [], + "resource_names": [], + "resources": [ + "storageclasses" + ], + "verbs": [ + "list", + "watch" + ] + }, + { + "api_groups": [ + "" + ], + "non_resource_urls": [], + "resource_names": [], + "resources": [ + "serviceaccounts", + "services", + "configmaps", + "events", + "pods", + "pods/log" + ], + "verbs": [ + "get", + "list", + "watch", + "describe", + "create", + "edit", + "delete", + "deletecollection", + "annotate", + "patch", + "label" + ] + }, + { + "api_groups": [ + "" + ], + "non_resource_urls": [], + "resource_names": [], + "resources": [ + "secrets" + ], + "verbs": [ + "create", + "patch", + "delete", + "watch" + ] + }, + { + "api_groups": [ + "apps" + ], + "non_resource_urls": [], + "resource_names": [], + "resources": [ + "statefulsets", + "deployments" + ], + "verbs": [ + "get", + "list", + "watch", + "describe", + "create", + "edit", + "delete", + "annotate", + "patch", + "label" + ] + }, + { + "api_groups": [ + "batch" + ], + "non_resource_urls": [], + "resource_names": [], + "resources": [ + "jobs" + ], + "verbs": [ + "get", + "list", + "watch", + "describe", + "create", + "edit", + "delete", + "annotate", + "patch", + "label" + ] + }, + { + "api_groups": [ + "extensions" + ], + "non_resource_urls": [], + "resource_names": [], + "resources": [ + "ingresses" + ], + "verbs": [ + "get", + "list", + "watch", + "describe", + "create", + "edit", + "delete", + "annotate", + "patch", + "label" + ] + }, + { + "api_groups": [ + "rbac.authorization.k8s.io" + ], + "non_resource_urls": [], + "resource_names": [], + "resources": [ + "roles", + "rolebindings" + ], + "verbs": [ + "get", + "list", + "watch", + "describe", + "create", + "edit", + "delete", + "deletecollection", + "annotate", + "patch", + "label" + ] + } + ] + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_policy.spark", + "data.aws_availability_zones.available", + "data.aws_caller_identity.current", + "data.aws_eks_cluster_auth.this", + "data.aws_iam_policy_document.spark_operator", + "data.aws_partition.current", + "data.aws_region.current", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_openid_connect_provider.oidc_provider", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.data.tls_certificate.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.irsa.aws_iam_role.irsa", + "module.irsa.aws_iam_role_policy_attachment.irsa", + "module.irsa.kubernetes_namespace_v1.irsa", + "module.irsa.kubernetes_service_account_v1.irsa", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "mode": "managed", + "type": "kubernetes_cluster_role_binding", + "name": "spark_role_binding", + "provider": "provider[\"registry.terraform.io/hashicorp/kubernetes\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "id": "spark-cluster-role-bind", + "metadata": [ + { + "annotations": {}, + "generate_name": "", + "generation": 0, + "labels": {}, + "name": "spark-cluster-role-bind", + "resource_version": "1107", + "uid": "d6429cc2-2506-41bb-9f34-7a220d16a675" + } + ], + "role_ref": [ + { + "api_group": "rbac.authorization.k8s.io", + "kind": "ClusterRole", + "name": "spark-cluster-role" + } + ], + "subject": [ + { + "api_group": "", + "kind": "ServiceAccount", + "name": "spark-team-a", + "namespace": "spark-team-a" + } + ] + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_policy.spark", + "data.aws_availability_zones.available", + "data.aws_caller_identity.current", + "data.aws_eks_cluster_auth.this", + "data.aws_iam_policy_document.spark_operator", + "data.aws_partition.current", + "data.aws_region.current", + "kubernetes_cluster_role.spark_role", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_openid_connect_provider.oidc_provider", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.data.tls_certificate.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.irsa.aws_iam_role.irsa", + "module.irsa.aws_iam_role_policy_attachment.irsa", + "module.irsa.kubernetes_namespace_v1.irsa", + "module.irsa.kubernetes_service_account_v1.irsa", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "mode": "managed", + "type": "random_password", + "name": "grafana", + "provider": "provider[\"registry.terraform.io/hashicorp/random\"]", + "instances": [ + { + "schema_version": 2, + "attributes": { + "bcrypt_hash": "$2a$10$e3ektPl1kM3YdCHVVOxIZ.0kYIT7D4jMc7pKNyWWd/iFuXf22r45C", + "id": "none", + "keepers": null, + "length": 16, + "lower": true, + "min_lower": 0, + "min_numeric": 0, + "min_special": 0, + "min_upper": 0, + "number": true, + "numeric": true, + "override_special": "!#$%\u0026*()-_=+[]{}\u003c\u003e:?", + "result": "fNFYio**I3hE9RC0", + "special": true, + "upper": true + }, + "sensitive_attributes": [], + "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjIifQ==" + } + ] + }, + { + "module": "module.eks_blueprints", + "mode": "data", + "type": "aws_caller_identity", + "name": "current", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "account_id": "833162080385", + "arn": "arn:aws:sts::833162080385:assumed-role/Admin/mccloman-Isengard", + "id": "833162080385", + "user_id": "AROA4D7CUOCA6SGFA3KA2:mccloman-Isengard" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints", + "mode": "data", + "type": "aws_eks_cluster", + "name": "cluster", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:eks:us-west-2:833162080385:cluster/spark-k8s-operator", + "certificate_authority": [ + { + "data": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUMvakNDQWVhZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwcmRXSmwKY201bGRHVnpNQjRYRFRJek1ETXdNVEF4TWpJME1Gb1hEVE16TURJeU5qQXhNakkwTUZvd0ZURVRNQkVHQTFVRQpBeE1LYTNWaVpYSnVaWFJsY3pDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTWYyCnJiL3d1YW5iZk95bUFxVVJrRXFVdll0R3RCbnAxRE10QVUyb0t1L3dNdXIvTlViU1NoZUQyRjNtd202RlRuODkKc0EycHVWS1RFRXpBVXBNNndNRmhVT20vOW1nTlhpdmp5WW9wL01NNjB5RWNkbmg4Tml0anRoYk1hREtub1BWSQpySWV1bEIrV1lyS3dwdG44SXUwcWZDNGtjV25TYnRLT3drMVZ5cnVKS0JYeEYzeHNpQzRycW5DTjRwMWVsNy9PCng0STM5ZmFVMXJ3a0d3WXBOMDlwZzhqTi8yYnp2dHFXeTJ4a0tJNnBqNGwxTkpkQTRHaUV3OWdBZEZadlh6QkMKRThUci9yUDZZU2E3RkEwdzRieHpSQ2c4WWVPMmJzYVRBY1p4SGNlWnNyazdZL0N0bEg0aTZCK3pLWVI3ajBUTQpaTUZKclVPRTdqNVNOekUvWnBzQ0F3RUFBYU5aTUZjd0RnWURWUjBQQVFIL0JBUURBZ0trTUE4R0ExVWRFd0VCCi93UUZNQU1CQWY4d0hRWURWUjBPQkJZRUZQRWZyM3VObkZCSHdMN2pkZFdJYlB6VTlGTStNQlVHQTFVZEVRUU8KTUF5Q0NtdDFZbVZ5Ym1WMFpYTXdEUVlKS29aSWh2Y05BUUVMQlFBRGdnRUJBRzU5OWVUYy9hV1lWbmJuS0RLcwpnY09OMWlVbWJJNWxlOFQyYWdhUEJBQWxna1Y4MmJua0NGRnNZVjI0eDcxdVE5aDNCRVpzNHFoTW1PM3psMnhJCkwvYTVKR0VRNm9SQktZdWlxNS9QL25rNkluUkY3MXErSjNFQ1Z1VjBzQnFjRVpzTVNxclNKVU5YamttT2d1cEYKRHFCa0l5VXhCT3dkWHVabFB4YmNidGtiSWZPSmpmOE0rakorSVQ2ekhEREVvcFdYZm5VUlR5KzZ4Q2JBazAvNApDTGZhOFRrNFkzcG9aYThwQnlDalBGQ0hIU01hdXdIbzZFRzVsWFZkUzYzb0thMExobU03R29FNlVqZnFmZGp3CkU0Uk1ZVEQwc3JCMytRTDcraGNoVkF0RTk2ZTNZbkh5UFFiM0JEaG9FWDlaSXF0TlRsWGpIUWxZbmR6ak5ET24KM09VPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + } + ], + "cluster_id": null, + "created_at": "2023-03-01 01:16:44.994 +0000 UTC", + "enabled_cluster_log_types": [ + "api", + "audit", + "authenticator", + "controllerManager", + "scheduler" + ], + "endpoint": "https://C22446710534ECE8BC397E6224EDBDA0.gr7.us-west-2.eks.amazonaws.com", + "id": "spark-k8s-operator", + "identity": [ + { + "oidc": [ + { + "issuer": "https://oidc.eks.us-west-2.amazonaws.com/id/C22446710534ECE8BC397E6224EDBDA0" + } + ] + } + ], + "kubernetes_network_config": [ + { + "ip_family": "ipv4", + "service_ipv4_cidr": "172.20.0.0/16", + "service_ipv6_cidr": "" + } + ], + "name": "spark-k8s-operator", + "outpost_config": [], + "platform_version": "eks.4", + "role_arn": "arn:aws:iam::833162080385:role/spark-k8s-operator-cluster-role", + "status": "ACTIVE", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "version": "1.24", + "vpc_config": [ + { + "cluster_security_group_id": "sg-01a416c53ccb8a396", + "endpoint_private_access": true, + "endpoint_public_access": true, + "public_access_cidrs": [ + "0.0.0.0/0" + ], + "security_group_ids": [ + "sg-08594ac5018946ede" + ], + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "vpc_id": "vpc-06ca7bfc43c08c033" + } + ] + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints", + "mode": "data", + "type": "aws_iam_policy_document", + "name": "eks_key", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "id": "1452993933", + "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"Allow access for all principals in the account that are authorized\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:ReEncrypt*\",\n \"kms:GenerateDataKey*\",\n \"kms:Encrypt\",\n \"kms:DescribeKey\",\n \"kms:Decrypt\",\n \"kms:CreateGrant\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::833162080385:root\"\n },\n \"Condition\": {\n \"StringEquals\": {\n \"kms:CallerAccount\": \"833162080385\",\n \"kms:ViaService\": \"eks.us-west-2.amazonaws.com\"\n }\n }\n },\n {\n \"Sid\": \"Allow direct access to key metadata to the account\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:RevokeGrant\",\n \"kms:List*\",\n \"kms:Get*\",\n \"kms:Describe*\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::833162080385:root\"\n }\n },\n {\n \"Sid\": \"Allow access for Key Administrators\",\n \"Effect\": \"Allow\",\n \"Action\": \"kms:*\",\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::833162080385:role/Admin\"\n }\n },\n {\n \"Sid\": \"Allow use of the key\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:ReEncrypt*\",\n \"kms:GenerateDataKey*\",\n \"kms:Encrypt\",\n \"kms:DescribeKey\",\n \"kms:Decrypt\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::833162080385:role/spark-k8s-operator-cluster-role\"\n }\n },\n {\n \"Sid\": \"Allow attachment of persistent resources\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:RevokeGrant\",\n \"kms:ListGrants\",\n \"kms:CreateGrant\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::833162080385:role/spark-k8s-operator-cluster-role\"\n },\n \"Condition\": {\n \"Bool\": {\n \"kms:GrantIsForAWSResource\": \"true\"\n }\n }\n }\n ]\n}", + "override_json": null, + "override_policy_documents": null, + "policy_id": null, + "source_json": null, + "source_policy_documents": null, + "statement": [ + { + "actions": [ + "kms:CreateGrant", + "kms:Decrypt", + "kms:DescribeKey", + "kms:Encrypt", + "kms:GenerateDataKey*", + "kms:ReEncrypt*" + ], + "condition": [ + { + "test": "StringEquals", + "values": [ + "833162080385" + ], + "variable": "kms:CallerAccount" + }, + { + "test": "StringEquals", + "values": [ + "eks.us-west-2.amazonaws.com" + ], + "variable": "kms:ViaService" + } + ], + "effect": "Allow", + "not_actions": [], + "not_principals": [], + "not_resources": [], + "principals": [ + { + "identifiers": [ + "arn:aws:iam::833162080385:root" + ], + "type": "AWS" + } + ], + "resources": [ + "*" + ], + "sid": "Allow access for all principals in the account that are authorized" + }, + { + "actions": [ + "kms:Describe*", + "kms:Get*", + "kms:List*", + "kms:RevokeGrant" + ], + "condition": [], + "effect": "Allow", + "not_actions": [], + "not_principals": [], + "not_resources": [], + "principals": [ + { + "identifiers": [ + "arn:aws:iam::833162080385:root" + ], + "type": "AWS" + } + ], + "resources": [ + "*" + ], + "sid": "Allow direct access to key metadata to the account" + }, + { + "actions": [ + "kms:*" + ], + "condition": [], + "effect": "Allow", + "not_actions": [], + "not_principals": [], + "not_resources": [], + "principals": [ + { + "identifiers": [ + "arn:aws:iam::833162080385:role/Admin" + ], + "type": "AWS" + } + ], + "resources": [ + "*" + ], + "sid": "Allow access for Key Administrators" + }, + { + "actions": [ + "kms:Decrypt", + "kms:DescribeKey", + "kms:Encrypt", + "kms:GenerateDataKey*", + "kms:ReEncrypt*" + ], + "condition": [], + "effect": "Allow", + "not_actions": [], + "not_principals": [], + "not_resources": [], + "principals": [ + { + "identifiers": [ + "arn:aws:iam::833162080385:role/spark-k8s-operator-cluster-role" + ], + "type": "AWS" + } + ], + "resources": [ + "*" + ], + "sid": "Allow use of the key" + }, + { + "actions": [ + "kms:CreateGrant", + "kms:ListGrants", + "kms:RevokeGrant" + ], + "condition": [ + { + "test": "Bool", + "values": [ + "true" + ], + "variable": "kms:GrantIsForAWSResource" + } + ], + "effect": "Allow", + "not_actions": [], + "not_principals": [], + "not_resources": [], + "principals": [ + { + "identifiers": [ + "arn:aws:iam::833162080385:role/spark-k8s-operator-cluster-role" + ], + "type": "AWS" + } + ], + "resources": [ + "*" + ], + "sid": "Allow attachment of persistent resources" + } + ], + "version": "2012-10-17" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints", + "mode": "data", + "type": "aws_iam_session_context", + "name": "current", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "arn": "arn:aws:sts::833162080385:assumed-role/Admin/mccloman-Isengard", + "id": "arn:aws:sts::833162080385:assumed-role/Admin/mccloman-Isengard", + "issuer_arn": "arn:aws:iam::833162080385:role/Admin", + "issuer_id": "AROA4D7CUOCA6SGFA3KA2", + "issuer_name": "Admin", + "session_name": "mccloman-Isengard" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints", + "mode": "data", + "type": "aws_partition", + "name": "current", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "dns_suffix": "amazonaws.com", + "id": "aws", + "partition": "aws", + "reverse_dns_prefix": "com.amazonaws" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints", + "mode": "data", + "type": "aws_region", + "name": "current", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "description": "US West (Oregon)", + "endpoint": "ec2.us-west-2.amazonaws.com", + "id": "us-west-2", + "name": "us-west-2" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints", + "mode": "data", + "type": "http", + "name": "eks_cluster_readiness", + "provider": "provider[\"registry.terraform.io/terraform-aws-modules/http\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "body": "ok", + "ca_certificate": "-----BEGIN CERTIFICATE-----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\n3OU=\n-----END CERTIFICATE-----\n", + "id": "https://C22446710534ECE8BC397E6224EDBDA0.gr7.us-west-2.eks.amazonaws.com/healthz", + "insecure": false, + "request_headers": null, + "response_headers": { + "Audit-Id": "68d46253-7369-4906-8bd4-0af55e78e2da", + "Cache-Control": "no-cache, private", + "Content-Length": "2", + "Content-Type": "text/plain; charset=utf-8", + "Date": "Wed, 01 Mar 2023 01:45:43 GMT", + "X-Content-Type-Options": "nosniff", + "X-Kubernetes-Pf-Flowschema-Uid": "8c221e30-8c66-4045-ab06-adf3c9b70081", + "X-Kubernetes-Pf-Prioritylevel-Uid": "13e47757-e6a4-45c3-98cc-1353bfdd0011" + }, + "timeout": 600, + "url": "https://C22446710534ECE8BC397E6224EDBDA0.gr7.us-west-2.eks.amazonaws.com/healthz" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints", + "mode": "managed", + "type": "kubernetes_config_map", + "name": "aws_auth", + "provider": "provider[\"registry.terraform.io/hashicorp/kubernetes\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "binary_data": {}, + "data": { + "mapAccounts": "[]\n", + "mapRoles": "- \"groups\":\n - \"system:bootstrappers\"\n - \"system:nodes\"\n \"rolearn\": \"arn:aws:iam::833162080385:role/spark-k8s-operator-core-node-grp\"\n \"username\": \"system:node:{{EC2PrivateDNSName}}\"\n- \"groups\":\n - \"system:bootstrappers\"\n - \"system:nodes\"\n \"rolearn\": \"arn:aws:iam::833162080385:role/spark-k8s-operator-spark-node-grp\"\n \"username\": \"system:node:{{EC2PrivateDNSName}}\"\n", + "mapUsers": "[]\n" + }, + "id": "kube-system/aws-auth", + "immutable": false, + "metadata": [ + { + "annotations": {}, + "generate_name": "", + "generation": 0, + "labels": { + "app.kubernetes.io/created-by": "terraform-aws-eks-blueprints", + "app.kubernetes.io/managed-by": "terraform-aws-eks-blueprints" + }, + "name": "aws-auth", + "namespace": "kube-system", + "resource_version": "1076", + "uid": "78ded890-14e9-4c3f-9488-d7a6c4573dd4" + } + ] + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks", + "mode": "data", + "type": "aws_caller_identity", + "name": "current", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "account_id": "833162080385", + "arn": "arn:aws:sts::833162080385:assumed-role/Admin/mccloman-Isengard", + "id": "833162080385", + "user_id": "AROA4D7CUOCA6SGFA3KA2:mccloman-Isengard" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks", + "mode": "data", + "type": "aws_iam_policy_document", + "name": "assume_role_policy", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "id": "2764486067", + "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EKSClusterAssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n }\n }\n ]\n}", + "override_json": null, + "override_policy_documents": null, + "policy_id": null, + "source_json": null, + "source_policy_documents": null, + "statement": [ + { + "actions": [ + "sts:AssumeRole" + ], + "condition": [], + "effect": "Allow", + "not_actions": [], + "not_principals": [], + "not_resources": [], + "principals": [ + { + "identifiers": [ + "eks.amazonaws.com" + ], + "type": "Service" + } + ], + "resources": [], + "sid": "EKSClusterAssumeRole" + } + ], + "version": "2012-10-17" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks", + "mode": "data", + "type": "aws_partition", + "name": "current", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "dns_suffix": "amazonaws.com", + "id": "aws", + "partition": "aws", + "reverse_dns_prefix": "com.amazonaws" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks", + "mode": "data", + "type": "tls_certificate", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/tls\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "certificates": [ + { + "cert_pem": "-----BEGIN CERTIFICATE-----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\nVsyuLAOQ1xk4meTKCRlb/weWsKh/NEnfVqn3sF/tM+2MR7cwA130A4w=\n-----END CERTIFICATE-----\n", + "is_ca": true, + "issuer": "OU=Starfield Class 2 Certification Authority,O=Starfield Technologies\\, Inc.,C=US", + "not_after": "2034-06-28T17:39:16Z", + "not_before": "2009-09-02T00:00:00Z", + "public_key_algorithm": "RSA", + "serial_number": "12037640545166866303", + "sha1_fingerprint": "9e99a48a9960b14926bb7f3b02e22da2b0ab7280", + "signature_algorithm": "SHA256-RSA", + "subject": "CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US", + "version": 3 + }, + { + "cert_pem": "-----BEGIN CERTIFICATE-----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\nakcjMS9cmvqtmg5iUaQqqcT5NJ0hGA==\n-----END CERTIFICATE-----\n", + "is_ca": true, + "issuer": "CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US", + "not_after": "2037-12-31T01:00:00Z", + "not_before": "2015-05-25T12:00:00Z", + "public_key_algorithm": "RSA", + "serial_number": "144918191876577076464031512351042010504348870", + "sha1_fingerprint": "06b25927c42a721631c1efd9431e648fa62e1e39", + "signature_algorithm": "SHA256-RSA", + "subject": "CN=Amazon Root CA 1,O=Amazon,C=US", + "version": 3 + }, + { + "cert_pem": "-----BEGIN CERTIFICATE-----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\n4zl+EoNaWdpnWndvSpAEkq2P\n-----END CERTIFICATE-----\n", + "is_ca": true, + "issuer": "CN=Amazon Root CA 1,O=Amazon,C=US", + "not_after": "2030-08-23T22:25:30Z", + "not_before": "2022-08-23T22:25:30Z", + "public_key_algorithm": "RSA", + "serial_number": "166129353110899469622597955040406457904926625", + "sha1_fingerprint": "414a2060b738c635cc7fc243e052615592830c53", + "signature_algorithm": "SHA256-RSA", + "subject": "CN=Amazon RSA 2048 M02,O=Amazon,C=US", + "version": 3 + }, + { + "cert_pem": "-----BEGIN CERTIFICATE-----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\nU47UQVhZh1TkoA/KQ6DgUcxP4zxqICe8hbT/Adq07A==\n-----END CERTIFICATE-----\n", + "is_ca": false, + "issuer": "CN=Amazon RSA 2048 M02,O=Amazon,C=US", + "not_after": "2023-06-11T23:59:59Z", + "not_before": "2023-02-09T00:00:00Z", + "public_key_algorithm": "RSA", + "serial_number": "15116398658960496756585417265055818233", + "sha1_fingerprint": "223b8a29de23186d2b9c152304009cd9f3edebd3", + "signature_algorithm": "SHA256-RSA", + "subject": "CN=oidc.eks.us-west-2.amazonaws.com", + "version": 3 + } + ], + "content": null, + "id": "68879d4728a23aea308cb79878b46f1d64a50b04", + "url": "https://oidc.eks.us-west-2.amazonaws.com/id/C22446710534ECE8BC397E6224EDBDA0", + "verify_chain": true + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks", + "mode": "managed", + "type": "aws_ec2_tag", + "name": "cluster_primary_security_group", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": "Blueprint", + "schema_version": 0, + "attributes": { + "id": "sg-01a416c53ccb8a396,Blueprint", + "key": "Blueprint", + "resource_id": "sg-01a416c53ccb8a396", + "value": "spark-k8s-operator" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + }, + { + "index_key": "GithubRepo", + "schema_version": 0, + "attributes": { + "id": "sg-01a416c53ccb8a396,GithubRepo", + "key": "GithubRepo", + "resource_id": "sg-01a416c53ccb8a396", + "value": "github.com/awslabs/data-on-eks" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks", + "mode": "managed", + "type": "aws_eks_cluster", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:eks:us-west-2:833162080385:cluster/spark-k8s-operator", + "certificate_authority": [ + { + "data": "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" + } + ], + "cluster_id": null, + "created_at": "2023-03-01 01:16:44.994 +0000 UTC", + "enabled_cluster_log_types": [ + "api", + "audit", + "authenticator", + "controllerManager", + "scheduler" + ], + "encryption_config": [ + { + "provider": [ + { + "key_arn": "arn:aws:kms:us-west-2:833162080385:key/e1f34ad3-684c-4cef-bd9e-1145e274491e" + } + ], + "resources": [ + "secrets" + ] + } + ], + "endpoint": "https://C22446710534ECE8BC397E6224EDBDA0.gr7.us-west-2.eks.amazonaws.com", + "id": "spark-k8s-operator", + "identity": [ + { + "oidc": [ + { + "issuer": "https://oidc.eks.us-west-2.amazonaws.com/id/C22446710534ECE8BC397E6224EDBDA0" + } + ] + } + ], + "kubernetes_network_config": [ + { + "ip_family": "ipv4", + "service_ipv4_cidr": "172.20.0.0/16", + "service_ipv6_cidr": "" + } + ], + "name": "spark-k8s-operator", + "outpost_config": [], + "platform_version": "eks.4", + "role_arn": "arn:aws:iam::833162080385:role/spark-k8s-operator-cluster-role", + "status": "ACTIVE", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "timeouts": { + "create": null, + "delete": null, + "update": null + }, + "version": "1.24", + "vpc_config": [ + { + "cluster_security_group_id": "sg-01a416c53ccb8a396", + "endpoint_private_access": true, + "endpoint_public_access": true, + "public_access_cidrs": [ + "0.0.0.0/0" + ], + "security_group_ids": [ + "sg-08594ac5018946ede" + ], + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "vpc_id": "vpc-06ca7bfc43c08c033" + } + ] + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjkwMDAwMDAwMDAwMCwidXBkYXRlIjozNjAwMDAwMDAwMDAwfX0=", + "dependencies": [ + "data.aws_availability_zones.available", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks", + "mode": "managed", + "type": "aws_iam_openid_connect_provider", + "name": "oidc_provider", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::833162080385:oidc-provider/oidc.eks.us-west-2.amazonaws.com/id/C22446710534ECE8BC397E6224EDBDA0", + "client_id_list": [ + "sts.amazonaws.com" + ], + "id": "arn:aws:iam::833162080385:oidc-provider/oidc.eks.us-west-2.amazonaws.com/id/C22446710534ECE8BC397E6224EDBDA0", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-eks-irsa" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-eks-irsa" + }, + "thumbprint_list": [ + "9e99a48a9960b14926bb7f3b02e22da2b0ab7280" + ], + "url": "oidc.eks.us-west-2.amazonaws.com/id/C22446710534ECE8BC397E6224EDBDA0" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.data.tls_certificate.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks", + "mode": "managed", + "type": "aws_iam_role", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::833162080385:role/spark-k8s-operator-cluster-role", + "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"},\"Sid\":\"EKSClusterAssumeRole\"}],\"Version\":\"2012-10-17\"}", + "create_date": "2023-03-01T01:15:43Z", + "description": "", + "force_detach_policies": true, + "id": "spark-k8s-operator-cluster-role", + "inline_policy": [], + "managed_policy_arns": [ + "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy", + "arn:aws:iam::aws:policy/AmazonEKSVPCResourceController" + ], + "max_session_duration": 3600, + "name": "spark-k8s-operator-cluster-role", + "name_prefix": "", + "path": "/", + "permissions_boundary": null, + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "unique_id": "AROA4D7CUOCAZ343M3EUA" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current" + ] + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks", + "mode": "managed", + "type": "aws_iam_role_policy_attachment", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy", + "schema_version": 0, + "attributes": { + "id": "spark-k8s-operator-cluster-role-20230301011544043100000003", + "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy", + "role": "spark-k8s-operator-cluster-role" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current" + ] + }, + { + "index_key": "arn:aws:iam::aws:policy/AmazonEKSVPCResourceController", + "schema_version": 0, + "attributes": { + "id": "spark-k8s-operator-cluster-role-20230301011544012200000002", + "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSVPCResourceController", + "role": "spark-k8s-operator-cluster-role" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current" + ] + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks", + "mode": "managed", + "type": "aws_security_group", + "name": "cluster", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:security-group/sg-08594ac5018946ede", + "description": "EKS cluster security group", + "egress": [ + { + "cidr_blocks": [], + "description": "Cluster API to node groups", + "from_port": 443, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [ + "sg-02bfbafdfcc2e68c7" + ], + "self": false, + "to_port": 443 + }, + { + "cidr_blocks": [], + "description": "Cluster API to node kubelets", + "from_port": 10250, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [ + "sg-02bfbafdfcc2e68c7" + ], + "self": false, + "to_port": 10250 + } + ], + "id": "sg-08594ac5018946ede", + "ingress": [ + { + "cidr_blocks": [], + "description": "Node groups to cluster API", + "from_port": 443, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [ + "sg-02bfbafdfcc2e68c7" + ], + "self": false, + "to_port": 443 + } + ], + "name": "spark-k8s-operator-cluster-20230301011556357600000006", + "name_prefix": "spark-k8s-operator-cluster-", + "owner_id": "833162080385", + "revoke_rules_on_delete": false, + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-cluster" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-cluster" + }, + "timeouts": null, + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=", + "dependencies": [ + "module.vpc.aws_vpc.this" + ], + "create_before_destroy": true + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks", + "mode": "managed", + "type": "aws_security_group", + "name": "node", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:security-group/sg-02bfbafdfcc2e68c7", + "description": "EKS node shared security group", + "egress": [ + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "Egress NTP/TCP to internet", + "from_port": 123, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 123 + }, + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "Egress NTP/UDP to internet", + "from_port": 123, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "udp", + "security_groups": [], + "self": false, + "to_port": 123 + }, + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "Egress all HTTPS to internet", + "from_port": 443, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 443 + }, + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "Node all egress", + "from_port": 0, + "ipv6_cidr_blocks": [ + "::/0" + ], + "prefix_list_ids": [], + "protocol": "-1", + "security_groups": [], + "self": false, + "to_port": 0 + }, + { + "cidr_blocks": [], + "description": "Node groups to cluster API", + "from_port": 443, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [ + "sg-08594ac5018946ede" + ], + "self": false, + "to_port": 443 + }, + { + "cidr_blocks": [], + "description": "Node to node CoreDNS", + "from_port": 53, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": true, + "to_port": 53 + }, + { + "cidr_blocks": [], + "description": "Node to node CoreDNS", + "from_port": 53, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "udp", + "security_groups": [], + "self": true, + "to_port": 53 + } + ], + "id": "sg-02bfbafdfcc2e68c7", + "ingress": [ + { + "cidr_blocks": [], + "description": "Cluster API to Nodegroup all traffic", + "from_port": 0, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "-1", + "security_groups": [ + "sg-08594ac5018946ede" + ], + "self": false, + "to_port": 0 + }, + { + "cidr_blocks": [], + "description": "Cluster API to node groups", + "from_port": 443, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [ + "sg-08594ac5018946ede" + ], + "self": false, + "to_port": 443 + }, + { + "cidr_blocks": [], + "description": "Cluster API to node kubelets", + "from_port": 10250, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [ + "sg-08594ac5018946ede" + ], + "self": false, + "to_port": 10250 + }, + { + "cidr_blocks": [], + "description": "Node to node CoreDNS", + "from_port": 53, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": true, + "to_port": 53 + }, + { + "cidr_blocks": [], + "description": "Node to node CoreDNS", + "from_port": 53, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "udp", + "security_groups": [], + "self": true, + "to_port": 53 + }, + { + "cidr_blocks": [], + "description": "Node to node all ports/protocols", + "from_port": 0, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "-1", + "security_groups": [], + "self": true, + "to_port": 0 + } + ], + "name": "spark-k8s-operator-node-20230301011556205700000005", + "name_prefix": "spark-k8s-operator-node-", + "owner_id": "833162080385", + "revoke_rules_on_delete": false, + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-node", + "kubernetes.io/cluster/spark-k8s-operator": "owned" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-node", + "kubernetes.io/cluster/spark-k8s-operator": "owned" + }, + "timeouts": null, + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=", + "dependencies": [ + "module.vpc.aws_vpc.this" + ], + "create_before_destroy": true + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks", + "mode": "managed", + "type": "aws_security_group_rule", + "name": "cluster", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": "egress_nodes_443", + "schema_version": 2, + "attributes": { + "cidr_blocks": null, + "description": "Cluster API to node groups", + "from_port": 443, + "id": "sgrule-3801244741", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "tcp", + "security_group_id": "sg-08594ac5018946ede", + "security_group_rule_id": "sgr-0626493f29f1536a2", + "self": false, + "source_security_group_id": "sg-02bfbafdfcc2e68c7", + "timeouts": null, + "to_port": 443, + "type": "egress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + }, + { + "index_key": "egress_nodes_kubelet", + "schema_version": 2, + "attributes": { + "cidr_blocks": null, + "description": "Cluster API to node kubelets", + "from_port": 10250, + "id": "sgrule-727818606", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "tcp", + "security_group_id": "sg-08594ac5018946ede", + "security_group_rule_id": "sgr-0450aa05a990167b3", + "self": false, + "source_security_group_id": "sg-02bfbafdfcc2e68c7", + "timeouts": null, + "to_port": 10250, + "type": "egress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + }, + { + "index_key": "ingress_nodes_443", + "schema_version": 2, + "attributes": { + "cidr_blocks": null, + "description": "Node groups to cluster API", + "from_port": 443, + "id": "sgrule-305047077", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "tcp", + "security_group_id": "sg-08594ac5018946ede", + "security_group_rule_id": "sgr-0ad70e9458558d81d", + "self": false, + "source_security_group_id": "sg-02bfbafdfcc2e68c7", + "timeouts": null, + "to_port": 443, + "type": "ingress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks", + "mode": "managed", + "type": "aws_security_group_rule", + "name": "node", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": "egress_all", + "schema_version": 2, + "attributes": { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "Node all egress", + "from_port": 0, + "id": "sgrule-417031891", + "ipv6_cidr_blocks": [ + "::/0" + ], + "prefix_list_ids": [], + "protocol": "-1", + "security_group_id": "sg-02bfbafdfcc2e68c7", + "security_group_rule_id": "", + "self": false, + "source_security_group_id": null, + "timeouts": null, + "to_port": 0, + "type": "egress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + }, + { + "index_key": "egress_cluster_443", + "schema_version": 2, + "attributes": { + "cidr_blocks": null, + "description": "Node groups to cluster API", + "from_port": 443, + "id": "sgrule-418481970", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "tcp", + "security_group_id": "sg-02bfbafdfcc2e68c7", + "security_group_rule_id": "sgr-0117bd32b5d0cf210", + "self": false, + "source_security_group_id": "sg-08594ac5018946ede", + "timeouts": null, + "to_port": 443, + "type": "egress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + }, + { + "index_key": "egress_https", + "schema_version": 2, + "attributes": { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "Egress all HTTPS to internet", + "from_port": 443, + "id": "sgrule-1099457746", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "tcp", + "security_group_id": "sg-02bfbafdfcc2e68c7", + "security_group_rule_id": "sgr-0553045936a5de52c", + "self": false, + "source_security_group_id": null, + "timeouts": null, + "to_port": 443, + "type": "egress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + }, + { + "index_key": "egress_ntp_tcp", + "schema_version": 2, + "attributes": { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "Egress NTP/TCP to internet", + "from_port": 123, + "id": "sgrule-2656459212", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "tcp", + "security_group_id": "sg-02bfbafdfcc2e68c7", + "security_group_rule_id": "sgr-08887c3fcfecd6717", + "self": false, + "source_security_group_id": null, + "timeouts": null, + "to_port": 123, + "type": "egress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + }, + { + "index_key": "egress_ntp_udp", + "schema_version": 2, + "attributes": { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "Egress NTP/UDP to internet", + "from_port": 123, + "id": "sgrule-3771235521", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "udp", + "security_group_id": "sg-02bfbafdfcc2e68c7", + "security_group_rule_id": "sgr-0fb50852126ac649a", + "self": false, + "source_security_group_id": null, + "timeouts": null, + "to_port": 123, + "type": "egress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + }, + { + "index_key": "egress_self_coredns_tcp", + "schema_version": 2, + "attributes": { + "cidr_blocks": null, + "description": "Node to node CoreDNS", + "from_port": 53, + "id": "sgrule-717662650", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "tcp", + "security_group_id": "sg-02bfbafdfcc2e68c7", + "security_group_rule_id": "sgr-0b448b787a3988e6e", + "self": true, + "source_security_group_id": null, + "timeouts": null, + "to_port": 53, + "type": "egress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + }, + { + "index_key": "egress_self_coredns_udp", + "schema_version": 2, + "attributes": { + "cidr_blocks": null, + "description": "Node to node CoreDNS", + "from_port": 53, + "id": "sgrule-2762025948", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "udp", + "security_group_id": "sg-02bfbafdfcc2e68c7", + "security_group_rule_id": "sgr-0b0d65bb85c818478", + "self": true, + "source_security_group_id": null, + "timeouts": null, + "to_port": 53, + "type": "egress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + }, + { + "index_key": "ingress_cluster_443", + "schema_version": 2, + "attributes": { + "cidr_blocks": null, + "description": "Cluster API to node groups", + "from_port": 443, + "id": "sgrule-1185394437", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "tcp", + "security_group_id": "sg-02bfbafdfcc2e68c7", + "security_group_rule_id": "sgr-0946f32fde87cd2c5", + "self": false, + "source_security_group_id": "sg-08594ac5018946ede", + "timeouts": null, + "to_port": 443, + "type": "ingress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + }, + { + "index_key": "ingress_cluster_kubelet", + "schema_version": 2, + "attributes": { + "cidr_blocks": null, + "description": "Cluster API to node kubelets", + "from_port": 10250, + "id": "sgrule-1086011997", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "tcp", + "security_group_id": "sg-02bfbafdfcc2e68c7", + "security_group_rule_id": "sgr-068799f6368159437", + "self": false, + "source_security_group_id": "sg-08594ac5018946ede", + "timeouts": null, + "to_port": 10250, + "type": "ingress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + }, + { + "index_key": "ingress_cluster_to_node_all_traffic", + "schema_version": 2, + "attributes": { + "cidr_blocks": null, + "description": "Cluster API to Nodegroup all traffic", + "from_port": 0, + "id": "sgrule-4157575118", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "-1", + "security_group_id": "sg-02bfbafdfcc2e68c7", + "security_group_rule_id": "sgr-0a8299354f5de2b80", + "self": false, + "source_security_group_id": "sg-08594ac5018946ede", + "timeouts": null, + "to_port": 0, + "type": "ingress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + }, + { + "index_key": "ingress_self_all", + "schema_version": 2, + "attributes": { + "cidr_blocks": null, + "description": "Node to node all ports/protocols", + "from_port": 0, + "id": "sgrule-3903281564", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "-1", + "security_group_id": "sg-02bfbafdfcc2e68c7", + "security_group_rule_id": "sgr-0f91767f69663b62e", + "self": true, + "source_security_group_id": null, + "timeouts": null, + "to_port": 0, + "type": "ingress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + }, + { + "index_key": "ingress_self_coredns_tcp", + "schema_version": 2, + "attributes": { + "cidr_blocks": null, + "description": "Node to node CoreDNS", + "from_port": 53, + "id": "sgrule-1071914341", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "tcp", + "security_group_id": "sg-02bfbafdfcc2e68c7", + "security_group_rule_id": "sgr-0b448b787a3988e6e", + "self": true, + "source_security_group_id": null, + "timeouts": null, + "to_port": 53, + "type": "ingress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + }, + { + "index_key": "ingress_self_coredns_udp", + "schema_version": 2, + "attributes": { + "cidr_blocks": null, + "description": "Node to node CoreDNS", + "from_port": 53, + "id": "sgrule-2612772490", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "udp", + "security_group_id": "sg-02bfbafdfcc2e68c7", + "security_group_rule_id": "sgr-0bfc14141d37c5945", + "self": true, + "source_security_group_id": null, + "timeouts": null, + "to_port": 53, + "type": "ingress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.vpc.aws_vpc.this" + ] + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks.module.kms", + "mode": "data", + "type": "aws_caller_identity", + "name": "current", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "account_id": "833162080385", + "arn": "arn:aws:sts::833162080385:assumed-role/Admin/mccloman-Isengard", + "id": "833162080385", + "user_id": "AROA4D7CUOCA6SGFA3KA2:mccloman-Isengard" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks.module.kms", + "mode": "data", + "type": "aws_partition", + "name": "current", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "dns_suffix": "amazonaws.com", + "id": "aws", + "partition": "aws", + "reverse_dns_prefix": "com.amazonaws" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks_managed_node_groups[\"mng1\"]", + "mode": "data", + "type": "aws_iam_policy_document", + "name": "managed_ng_assume_role_policy", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "id": "3778018924", + "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EKSWorkerAssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n }\n }\n ]\n}", + "override_json": null, + "override_policy_documents": null, + "policy_id": null, + "source_json": null, + "source_policy_documents": null, + "statement": [ + { + "actions": [ + "sts:AssumeRole" + ], + "condition": [], + "effect": "Allow", + "not_actions": [], + "not_principals": [], + "not_resources": [], + "principals": [ + { + "identifiers": [ + "ec2.amazonaws.com" + ], + "type": "Service" + } + ], + "resources": [], + "sid": "EKSWorkerAssumeRole" + } + ], + "version": "2012-10-17" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks_managed_node_groups[\"mng1\"]", + "mode": "managed", + "type": "aws_eks_node_group", + "name": "managed_ng", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "ami_type": "AL2_x86_64", + "arn": "arn:aws:eks:us-west-2:833162080385:nodegroup/spark-k8s-operator/core-node-grp-2023030101282248280000001f/40c34d64-72cc-9d40-bc0e-7c1c78f387b7", + "capacity_type": "ON_DEMAND", + "cluster_name": "spark-k8s-operator", + "disk_size": 0, + "force_update_version": null, + "id": "spark-k8s-operator:core-node-grp-2023030101282248280000001f", + "instance_types": [ + "m5.xlarge" + ], + "labels": { + "Environment": "preprod", + "NodeGroupType": "core", + "WorkerType": "ON_DEMAND", + "Zone": "test" + }, + "launch_template": [ + { + "id": "lt-02816ce6075e2356a", + "name": "spark-k8s-operator-core-node-grp", + "version": "1" + } + ], + "node_group_name": "core-node-grp-2023030101282248280000001f", + "node_group_name_prefix": "core-node-grp-", + "node_role_arn": "arn:aws:iam::833162080385:role/spark-k8s-operator-core-node-grp", + "release_version": "1.24.10-20230217", + "remote_access": [], + "resources": [ + { + "autoscaling_groups": [ + { + "name": "eks-core-node-grp-2023030101282248280000001f-40c34d64-72cc-9d40-bc0e-7c1c78f387b7" + } + ], + "remote_access_security_group_id": "" + } + ], + "scaling_config": [ + { + "desired_size": 3, + "max_size": 9, + "min_size": 3 + } + ], + "status": "ACTIVE", + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-core-node-grp", + "k8s.io/cluster-autoscaler/enabled": "TRUE", + "k8s.io/cluster-autoscaler/experiments": "owned", + "k8s.io/cluster-autoscaler/node-template/label/arch": "x86", + "k8s.io/cluster-autoscaler/node-template/label/kubernetes.io/os": "linux", + "k8s.io/cluster-autoscaler/node-template/label/node-lifecycle": "on-demand", + "k8s.io/cluster-autoscaler/node-template/label/noderole": "core", + "k8s.io/cluster-autoscaler/spark-k8s-operator": "owned", + "kubernetes.io/cluster/spark-k8s-operator": "owned", + "managed-by": "terraform-aws-eks-blueprints", + "subnet_type": "private" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-core-node-grp", + "k8s.io/cluster-autoscaler/enabled": "TRUE", + "k8s.io/cluster-autoscaler/experiments": "owned", + "k8s.io/cluster-autoscaler/node-template/label/arch": "x86", + "k8s.io/cluster-autoscaler/node-template/label/kubernetes.io/os": "linux", + "k8s.io/cluster-autoscaler/node-template/label/node-lifecycle": "on-demand", + "k8s.io/cluster-autoscaler/node-template/label/noderole": "core", + "k8s.io/cluster-autoscaler/spark-k8s-operator": "owned", + "kubernetes.io/cluster/spark-k8s-operator": "owned", + "managed-by": "terraform-aws-eks-blueprints", + "subnet_type": "private" + }, + "taint": [], + "timeouts": { + "create": "30m", + "delete": "30m", + "update": "2h" + }, + "update_config": [ + { + "max_unavailable": 0, + "max_unavailable_percentage": 50 + } + ], + "version": "1.24" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInVwZGF0ZSI6NzIwMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_instance_profile.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role_policy_attachment.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_launch_template.managed_node_groups", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks_managed_node_groups[\"mng1\"]", + "mode": "managed", + "type": "aws_iam_instance_profile", + "name": "managed_ng", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::833162080385:instance-profile/spark-k8s-operator-core-node-grp", + "create_date": "2023-03-01T01:28:20Z", + "id": "spark-k8s-operator-core-node-grp", + "name": "spark-k8s-operator-core-node-grp", + "name_prefix": null, + "path": "/", + "role": "spark-k8s-operator-core-node-grp", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "unique_id": "AIPA4D7CUOCA3BUMQNDD7" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks_managed_node_groups[\"mng1\"]", + "mode": "managed", + "type": "aws_iam_role", + "name": "managed_ng", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::833162080385:role/spark-k8s-operator-core-node-grp", + "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"},\"Sid\":\"EKSWorkerAssumeRole\"}],\"Version\":\"2012-10-17\"}", + "create_date": "2023-03-01T01:28:19Z", + "description": "EKS Managed Node group IAM Role", + "force_detach_policies": true, + "id": "spark-k8s-operator-core-node-grp", + "inline_policy": [], + "managed_policy_arns": [ + "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", + "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", + "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", + "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore" + ], + "max_session_duration": 3600, + "name": "spark-k8s-operator-core-node-grp", + "name_prefix": "", + "path": "/", + "permissions_boundary": null, + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "unique_id": "AROA4D7CUOCAV7E3SK6GB" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks_managed_node_groups[\"mng1\"]", + "mode": "managed", + "type": "aws_iam_role_policy_attachment", + "name": "managed_ng", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", + "schema_version": 0, + "attributes": { + "id": "spark-k8s-operator-core-node-grp-20230301012820853200000015", + "policy_arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", + "role": "spark-k8s-operator-core-node-grp" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + }, + { + "index_key": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", + "schema_version": 0, + "attributes": { + "id": "spark-k8s-operator-core-node-grp-20230301012820702000000014", + "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", + "role": "spark-k8s-operator-core-node-grp" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + }, + { + "index_key": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", + "schema_version": 0, + "attributes": { + "id": "spark-k8s-operator-core-node-grp-20230301012821171800000017", + "policy_arn": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", + "role": "spark-k8s-operator-core-node-grp" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + }, + { + "index_key": "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore", + "schema_version": 0, + "attributes": { + "id": "spark-k8s-operator-core-node-grp-20230301012821121500000016", + "policy_arn": "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore", + "role": "spark-k8s-operator-core-node-grp" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks_managed_node_groups[\"mng1\"]", + "mode": "managed", + "type": "aws_launch_template", + "name": "managed_node_groups", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:launch-template/lt-02816ce6075e2356a", + "block_device_mappings": [ + { + "device_name": "/dev/xvda", + "ebs": [ + { + "delete_on_termination": "true", + "encrypted": "true", + "iops": 3000, + "kms_key_id": "", + "snapshot_id": "", + "throughput": 125, + "volume_size": 100, + "volume_type": "gp3" + } + ], + "no_device": "", + "virtual_name": "" + } + ], + "capacity_reservation_specification": [], + "cpu_options": [], + "credit_specification": [], + "default_version": 1, + "description": "Launch Template for EKS Managed Node Groups", + "disable_api_stop": false, + "disable_api_termination": false, + "ebs_optimized": "true", + "elastic_gpu_specifications": [], + "elastic_inference_accelerator": [], + "enclave_options": [], + "hibernation_options": [], + "iam_instance_profile": [], + "id": "lt-02816ce6075e2356a", + "image_id": "", + "instance_initiated_shutdown_behavior": "", + "instance_market_options": [], + "instance_requirements": [], + "instance_type": "", + "kernel_id": "", + "key_name": "", + "latest_version": 1, + "license_specification": [], + "maintenance_options": [], + "metadata_options": [ + { + "http_endpoint": "enabled", + "http_protocol_ipv6": "disabled", + "http_put_response_hop_limit": 2, + "http_tokens": "required", + "instance_metadata_tags": "disabled" + } + ], + "monitoring": [ + { + "enabled": true + } + ], + "name": "spark-k8s-operator-core-node-grp", + "name_prefix": "", + "network_interfaces": [ + { + "associate_carrier_ip_address": "", + "associate_public_ip_address": "false", + "delete_on_termination": "", + "description": "", + "device_index": 0, + "interface_type": "", + "ipv4_address_count": 0, + "ipv4_addresses": [], + "ipv4_prefix_count": 0, + "ipv4_prefixes": [], + "ipv6_address_count": 0, + "ipv6_addresses": [], + "ipv6_prefix_count": 0, + "ipv6_prefixes": [], + "network_card_index": 0, + "network_interface_id": "", + "private_ip_address": "", + "security_groups": [ + "sg-02bfbafdfcc2e68c7" + ], + "subnet_id": "" + } + ], + "placement": [], + "private_dns_name_options": [], + "ram_disk_id": "", + "security_group_names": [], + "tag_specifications": [ + { + "resource_type": "instance", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-core-node-grp", + "k8s.io/cluster-autoscaler/enabled": "TRUE", + "k8s.io/cluster-autoscaler/experiments": "owned", + "k8s.io/cluster-autoscaler/node-template/label/arch": "x86", + "k8s.io/cluster-autoscaler/node-template/label/kubernetes.io/os": "linux", + "k8s.io/cluster-autoscaler/node-template/label/node-lifecycle": "on-demand", + "k8s.io/cluster-autoscaler/node-template/label/noderole": "core", + "k8s.io/cluster-autoscaler/spark-k8s-operator": "owned", + "kubernetes.io/cluster/spark-k8s-operator": "owned", + "managed-by": "terraform-aws-eks-blueprints", + "subnet_type": "private" + } + }, + { + "resource_type": "network-interface", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-core-node-grp", + "k8s.io/cluster-autoscaler/enabled": "TRUE", + "k8s.io/cluster-autoscaler/experiments": "owned", + "k8s.io/cluster-autoscaler/node-template/label/arch": "x86", + "k8s.io/cluster-autoscaler/node-template/label/kubernetes.io/os": "linux", + "k8s.io/cluster-autoscaler/node-template/label/node-lifecycle": "on-demand", + "k8s.io/cluster-autoscaler/node-template/label/noderole": "core", + "k8s.io/cluster-autoscaler/spark-k8s-operator": "owned", + "kubernetes.io/cluster/spark-k8s-operator": "owned", + "managed-by": "terraform-aws-eks-blueprints", + "subnet_type": "private" + } + }, + { + "resource_type": "volume", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-core-node-grp", + "k8s.io/cluster-autoscaler/enabled": "TRUE", + "k8s.io/cluster-autoscaler/experiments": "owned", + "k8s.io/cluster-autoscaler/node-template/label/arch": "x86", + "k8s.io/cluster-autoscaler/node-template/label/kubernetes.io/os": "linux", + "k8s.io/cluster-autoscaler/node-template/label/node-lifecycle": "on-demand", + "k8s.io/cluster-autoscaler/node-template/label/noderole": "core", + "k8s.io/cluster-autoscaler/spark-k8s-operator": "owned", + "kubernetes.io/cluster/spark-k8s-operator": "owned", + "managed-by": "terraform-aws-eks-blueprints", + "subnet_type": "private" + } + } + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "update_default_version": true, + "user_data": "TUlNRS1WZXJzaW9uOiAxLjAKQ29udGVudC1UeXBlOiBtdWx0aXBhcnQvbWl4ZWQ7IGJvdW5kYXJ5PSIvLyIKCi0tLy8KQ29udGVudC1UeXBlOiB0ZXh0L3gtc2hlbGxzY3JpcHQ7IGNoYXJzZXQ9InVzLWFzY2lpIgojIS9iaW4vYmFzaApzZXQgLWV4CgotLS8vLS0K", + "vpc_security_group_ids": [] + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role_policy_attachment.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks_managed_node_groups[\"mng2\"]", + "mode": "data", + "type": "aws_iam_policy_document", + "name": "managed_ng_assume_role_policy", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "id": "3778018924", + "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EKSWorkerAssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n }\n }\n ]\n}", + "override_json": null, + "override_policy_documents": null, + "policy_id": null, + "source_json": null, + "source_policy_documents": null, + "statement": [ + { + "actions": [ + "sts:AssumeRole" + ], + "condition": [], + "effect": "Allow", + "not_actions": [], + "not_principals": [], + "not_resources": [], + "principals": [ + { + "identifiers": [ + "ec2.amazonaws.com" + ], + "type": "Service" + } + ], + "resources": [], + "sid": "EKSWorkerAssumeRole" + } + ], + "version": "2012-10-17" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks_managed_node_groups[\"mng2\"]", + "mode": "managed", + "type": "aws_eks_node_group", + "name": "managed_ng", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "ami_type": "AL2_x86_64", + "arn": "arn:aws:eks:us-west-2:833162080385:nodegroup/spark-k8s-operator/spark-node-grp-20230301012822643100000021/bec34d64-7318-5814-557f-5184b59f41a2", + "capacity_type": "ON_DEMAND", + "cluster_name": "spark-k8s-operator", + "disk_size": 0, + "force_update_version": null, + "id": "spark-k8s-operator:spark-node-grp-20230301012822643100000021", + "instance_types": [ + "r5d.large" + ], + "labels": { + "Environment": "preprod", + "NodeGroupType": "spark", + "WorkerType": "ON_DEMAND", + "Zone": "test" + }, + "launch_template": [ + { + "id": "lt-0cad640ca19c318d7", + "name": "spark-k8s-operator-spark-node-grp", + "version": "1" + } + ], + "node_group_name": "spark-node-grp-20230301012822643100000021", + "node_group_name_prefix": "spark-node-grp-", + "node_role_arn": "arn:aws:iam::833162080385:role/spark-k8s-operator-spark-node-grp", + "release_version": "1.24.10-20230217", + "remote_access": [], + "resources": [ + { + "autoscaling_groups": [ + { + "name": "eks-spark-node-grp-20230301012822643100000021-bec34d64-7318-5814-557f-5184b59f41a2" + } + ], + "remote_access_security_group_id": "" + } + ], + "scaling_config": [ + { + "desired_size": 3, + "max_size": 9, + "min_size": 3 + } + ], + "status": "ACTIVE", + "subnet_ids": [ + "subnet-0fefa6460af7bc584" + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-spark-node-grp", + "k8s.io/cluster-autoscaler/enabled": "TRUE", + "k8s.io/cluster-autoscaler/experiments": "owned", + "k8s.io/cluster-autoscaler/node-template/label/arch": "x86", + "k8s.io/cluster-autoscaler/node-template/label/disk": "nvme", + "k8s.io/cluster-autoscaler/node-template/label/kubernetes.io/os": "linux", + "k8s.io/cluster-autoscaler/node-template/label/node-lifecycle": "on-demand", + "k8s.io/cluster-autoscaler/node-template/label/noderole": "spark", + "k8s.io/cluster-autoscaler/spark-k8s-operator": "owned", + "kubernetes.io/cluster/spark-k8s-operator": "owned", + "managed-by": "terraform-aws-eks-blueprints", + "subnet_type": "private" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-spark-node-grp", + "k8s.io/cluster-autoscaler/enabled": "TRUE", + "k8s.io/cluster-autoscaler/experiments": "owned", + "k8s.io/cluster-autoscaler/node-template/label/arch": "x86", + "k8s.io/cluster-autoscaler/node-template/label/disk": "nvme", + "k8s.io/cluster-autoscaler/node-template/label/kubernetes.io/os": "linux", + "k8s.io/cluster-autoscaler/node-template/label/node-lifecycle": "on-demand", + "k8s.io/cluster-autoscaler/node-template/label/noderole": "spark", + "k8s.io/cluster-autoscaler/spark-k8s-operator": "owned", + "kubernetes.io/cluster/spark-k8s-operator": "owned", + "managed-by": "terraform-aws-eks-blueprints", + "subnet_type": "private" + }, + "taint": [], + "timeouts": { + "create": "30m", + "delete": "30m", + "update": "2h" + }, + "update_config": [ + { + "max_unavailable": 0, + "max_unavailable_percentage": 50 + } + ], + "version": "1.24" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjE4MDAwMDAwMDAwMDAsInVwZGF0ZSI6NzIwMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_instance_profile.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role_policy_attachment.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_launch_template.managed_node_groups", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks_managed_node_groups[\"mng2\"]", + "mode": "managed", + "type": "aws_iam_instance_profile", + "name": "managed_ng", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::833162080385:instance-profile/spark-k8s-operator-spark-node-grp", + "create_date": "2023-03-01T01:28:21Z", + "id": "spark-k8s-operator-spark-node-grp", + "name": "spark-k8s-operator-spark-node-grp", + "name_prefix": null, + "path": "/", + "role": "spark-k8s-operator-spark-node-grp", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "unique_id": "AIPA4D7CUOCA4BUNDREJO" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks_managed_node_groups[\"mng2\"]", + "mode": "managed", + "type": "aws_iam_role", + "name": "managed_ng", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::833162080385:role/spark-k8s-operator-spark-node-grp", + "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"},\"Sid\":\"EKSWorkerAssumeRole\"}],\"Version\":\"2012-10-17\"}", + "create_date": "2023-03-01T01:28:19Z", + "description": "EKS Managed Node group IAM Role", + "force_detach_policies": true, + "id": "spark-k8s-operator-spark-node-grp", + "inline_policy": [], + "managed_policy_arns": [ + "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", + "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", + "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", + "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore" + ], + "max_session_duration": 3600, + "name": "spark-k8s-operator-spark-node-grp", + "name_prefix": "", + "path": "/", + "permissions_boundary": null, + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "unique_id": "AROA4D7CUOCAWVH6X6TAR" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks_managed_node_groups[\"mng2\"]", + "mode": "managed", + "type": "aws_iam_role_policy_attachment", + "name": "managed_ng", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", + "schema_version": 0, + "attributes": { + "id": "spark-k8s-operator-spark-node-grp-20230301012821273800000018", + "policy_arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", + "role": "spark-k8s-operator-spark-node-grp" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + }, + { + "index_key": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", + "schema_version": 0, + "attributes": { + "id": "spark-k8s-operator-spark-node-grp-20230301012821535300000019", + "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", + "role": "spark-k8s-operator-spark-node-grp" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + }, + { + "index_key": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", + "schema_version": 0, + "attributes": { + "id": "spark-k8s-operator-spark-node-grp-2023030101282194480000001b", + "policy_arn": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", + "role": "spark-k8s-operator-spark-node-grp" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + }, + { + "index_key": "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore", + "schema_version": 0, + "attributes": { + "id": "spark-k8s-operator-spark-node-grp-2023030101282157950000001a", + "policy_arn": "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore", + "role": "spark-k8s-operator-spark-node-grp" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + } + ] + }, + { + "module": "module.eks_blueprints.module.aws_eks_managed_node_groups[\"mng2\"]", + "mode": "managed", + "type": "aws_launch_template", + "name": "managed_node_groups", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:launch-template/lt-0cad640ca19c318d7", + "block_device_mappings": [ + { + "device_name": "/dev/xvda", + "ebs": [ + { + "delete_on_termination": "true", + "encrypted": "true", + "iops": 3000, + "kms_key_id": "", + "snapshot_id": "", + "throughput": 125, + "volume_size": 100, + "volume_type": "gp3" + } + ], + "no_device": "", + "virtual_name": "" + } + ], + "capacity_reservation_specification": [], + "cpu_options": [], + "credit_specification": [], + "default_version": 1, + "description": "Launch Template for EKS Managed Node Groups", + "disable_api_stop": false, + "disable_api_termination": false, + "ebs_optimized": "true", + "elastic_gpu_specifications": [], + "elastic_inference_accelerator": [], + "enclave_options": [], + "hibernation_options": [], + "iam_instance_profile": [], + "id": "lt-0cad640ca19c318d7", + "image_id": "", + "instance_initiated_shutdown_behavior": "", + "instance_market_options": [], + "instance_requirements": [], + "instance_type": "", + "kernel_id": "", + "key_name": "", + "latest_version": 1, + "license_specification": [], + "maintenance_options": [], + "metadata_options": [ + { + "http_endpoint": "enabled", + "http_protocol_ipv6": "disabled", + "http_put_response_hop_limit": 2, + "http_tokens": "required", + "instance_metadata_tags": "disabled" + } + ], + "monitoring": [ + { + "enabled": true + } + ], + "name": "spark-k8s-operator-spark-node-grp", + "name_prefix": "", + "network_interfaces": [ + { + "associate_carrier_ip_address": "", + "associate_public_ip_address": "false", + "delete_on_termination": "", + "description": "", + "device_index": 0, + "interface_type": "", + "ipv4_address_count": 0, + "ipv4_addresses": [], + "ipv4_prefix_count": 0, + "ipv4_prefixes": [], + "ipv6_address_count": 0, + "ipv6_addresses": [], + "ipv6_prefix_count": 0, + "ipv6_prefixes": [], + "network_card_index": 0, + "network_interface_id": "", + "private_ip_address": "", + "security_groups": [ + "sg-02bfbafdfcc2e68c7" + ], + "subnet_id": "" + } + ], + "placement": [], + "private_dns_name_options": [], + "ram_disk_id": "", + "security_group_names": [], + "tag_specifications": [ + { + "resource_type": "instance", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-spark-node-grp", + "k8s.io/cluster-autoscaler/enabled": "TRUE", + "k8s.io/cluster-autoscaler/experiments": "owned", + "k8s.io/cluster-autoscaler/node-template/label/arch": "x86", + "k8s.io/cluster-autoscaler/node-template/label/disk": "nvme", + "k8s.io/cluster-autoscaler/node-template/label/kubernetes.io/os": "linux", + "k8s.io/cluster-autoscaler/node-template/label/node-lifecycle": "on-demand", + "k8s.io/cluster-autoscaler/node-template/label/noderole": "spark", + "k8s.io/cluster-autoscaler/spark-k8s-operator": "owned", + "kubernetes.io/cluster/spark-k8s-operator": "owned", + "managed-by": "terraform-aws-eks-blueprints", + "subnet_type": "private" + } + }, + { + "resource_type": "network-interface", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-spark-node-grp", + "k8s.io/cluster-autoscaler/enabled": "TRUE", + "k8s.io/cluster-autoscaler/experiments": "owned", + "k8s.io/cluster-autoscaler/node-template/label/arch": "x86", + "k8s.io/cluster-autoscaler/node-template/label/disk": "nvme", + "k8s.io/cluster-autoscaler/node-template/label/kubernetes.io/os": "linux", + "k8s.io/cluster-autoscaler/node-template/label/node-lifecycle": "on-demand", + "k8s.io/cluster-autoscaler/node-template/label/noderole": "spark", + "k8s.io/cluster-autoscaler/spark-k8s-operator": "owned", + "kubernetes.io/cluster/spark-k8s-operator": "owned", + "managed-by": "terraform-aws-eks-blueprints", + "subnet_type": "private" + } + }, + { + "resource_type": "volume", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-spark-node-grp", + "k8s.io/cluster-autoscaler/enabled": "TRUE", + "k8s.io/cluster-autoscaler/experiments": "owned", + "k8s.io/cluster-autoscaler/node-template/label/arch": "x86", + "k8s.io/cluster-autoscaler/node-template/label/disk": "nvme", + "k8s.io/cluster-autoscaler/node-template/label/kubernetes.io/os": "linux", + "k8s.io/cluster-autoscaler/node-template/label/node-lifecycle": "on-demand", + "k8s.io/cluster-autoscaler/node-template/label/noderole": "spark", + "k8s.io/cluster-autoscaler/spark-k8s-operator": "owned", + "kubernetes.io/cluster/spark-k8s-operator": "owned", + "managed-by": "terraform-aws-eks-blueprints", + "subnet_type": "private" + } + } + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "update_default_version": true, + "user_data": "TUlNRS1WZXJzaW9uOiAxLjAKQ29udGVudC1UeXBlOiBtdWx0aXBhcnQvbWl4ZWQ7IGJvdW5kYXJ5PSIvLyIKCi0tLy8KQ29udGVudC1UeXBlOiB0ZXh0L3gtc2hlbGxzY3JpcHQ7IGNoYXJzZXQ9InVzLWFzY2lpIgojIS9iaW4vYmFzaApzZXQgLWV4CgplY2hvICJGb3JtYXQgYW5kIE1vdW50IE5WTWUgRGlza3MgaWYgYXZhaWxhYmxlIgpJRFg9MQpERVZJQ0VTPSQobHNibGsgLW8gTkFNRSxUWVBFIC1kc24gfCBhd2sgJy9kaXNrLyB7cHJpbnQgJDF9JykKCmZvciBERVYgaW4gJERFVklDRVMKZG8KICBta2ZzLnhmcyAvZGV2LyR7REVWfQogIG1rZGlyIC1wIC9sb2NhbCR7SURYfQoKICBlY2hvIC9kZXYvJHtERVZ9IC9sb2NhbCR7SURYfSB4ZnMgZGVmYXVsdHMsbm9hdGltZSAxIDIgPj4gL2V0Yy9mc3RhYgoKICBJRFg9JCgoJHtJRFh9ICsgMSkpCmRvbmUKbW91bnQgLWEKIyBVc2VyLXN1cHBsaWVkIHBvc3QgdXNlcmRhdGEKIyEvYmluL2Jhc2gKc2V0IC1leAovdXNyL2Jpbi9jaG93biAtaFIgKzE4NTorMTAwMCAvbG9jYWwxCgotLS8vLS0K", + "vpc_security_group_ids": [] + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_eks_cluster.cluster", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.data.http.eks_cluster_readiness", + "module.eks_blueprints.kubernetes_config_map.aws_auth", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.aws_iam_role_policy_attachment.managed_ng", + "module.eks_blueprints.module.aws_eks_managed_node_groups.data.aws_iam_policy_document.managed_ng_assume_role_policy", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ], + "create_before_destroy": true + } + ] + }, + { + "module": "module.eks_blueprints.module.kms[0]", + "mode": "managed", + "type": "aws_kms_alias", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "arn": "arn:aws:kms:us-west-2:833162080385:alias/spark-k8s-operator", + "id": "alias/spark-k8s-operator", + "name": "alias/spark-k8s-operator", + "name_prefix": "", + "target_key_arn": "arn:aws:kms:us-west-2:833162080385:key/e1f34ad3-684c-4cef-bd9e-1145e274491e", + "target_key_id": "e1f34ad3-684c-4cef-bd9e-1145e274491e" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.module.kms.aws_kms_key.this" + ] + } + ] + }, + { + "module": "module.eks_blueprints.module.kms[0]", + "mode": "managed", + "type": "aws_kms_key", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "arn": "arn:aws:kms:us-west-2:833162080385:key/e1f34ad3-684c-4cef-bd9e-1145e274491e", + "bypass_policy_lockout_safety_check": false, + "custom_key_store_id": "", + "customer_master_key_spec": "SYMMETRIC_DEFAULT", + "deletion_window_in_days": 30, + "description": "spark-k8s-operator EKS cluster secret encryption key", + "enable_key_rotation": true, + "id": "e1f34ad3-684c-4cef-bd9e-1145e274491e", + "is_enabled": true, + "key_id": "e1f34ad3-684c-4cef-bd9e-1145e274491e", + "key_usage": "ENCRYPT_DECRYPT", + "multi_region": false, + "policy": "{\"Statement\":[{\"Action\":[\"kms:ReEncrypt*\",\"kms:GenerateDataKey*\",\"kms:Encrypt\",\"kms:DescribeKey\",\"kms:Decrypt\",\"kms:CreateGrant\"],\"Condition\":{\"StringEquals\":{\"kms:CallerAccount\":\"833162080385\",\"kms:ViaService\":\"eks.us-west-2.amazonaws.com\"}},\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::833162080385:root\"},\"Resource\":\"*\",\"Sid\":\"Allow access for all principals in the account that are authorized\"},{\"Action\":[\"kms:RevokeGrant\",\"kms:List*\",\"kms:Get*\",\"kms:Describe*\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::833162080385:root\"},\"Resource\":\"*\",\"Sid\":\"Allow direct access to key metadata to the account\"},{\"Action\":\"kms:*\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::833162080385:role/Admin\"},\"Resource\":\"*\",\"Sid\":\"Allow access for Key Administrators\"},{\"Action\":[\"kms:ReEncrypt*\",\"kms:GenerateDataKey*\",\"kms:Encrypt\",\"kms:DescribeKey\",\"kms:Decrypt\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::833162080385:role/spark-k8s-operator-cluster-role\"},\"Resource\":\"*\",\"Sid\":\"Allow use of the key\"},{\"Action\":[\"kms:RevokeGrant\",\"kms:ListGrants\",\"kms:CreateGrant\"],\"Condition\":{\"Bool\":{\"kms:GrantIsForAWSResource\":\"true\"}},\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::833162080385:role/spark-k8s-operator-cluster-role\"},\"Resource\":\"*\",\"Sid\":\"Allow attachment of persistent resources\"}],\"Version\":\"2012-10-17\"}", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + } + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current" + ] + } + ] + }, + { + "module": "module.eks_blueprints_kubernetes_addons", + "mode": "data", + "type": "aws_caller_identity", + "name": "current", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "account_id": "833162080385", + "arn": "arn:aws:sts::833162080385:assumed-role/Admin/mccloman-Isengard", + "id": "833162080385", + "user_id": "AROA4D7CUOCA6SGFA3KA2:mccloman-Isengard" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints_kubernetes_addons", + "mode": "data", + "type": "aws_eks_cluster", + "name": "eks_cluster", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "arn": "arn:aws:eks:us-west-2:833162080385:cluster/spark-k8s-operator", + "certificate_authority": [ + { + "data": "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" + } + ], + "cluster_id": null, + "created_at": "2023-03-01 01:16:44.994 +0000 UTC", + "enabled_cluster_log_types": [ + "api", + "audit", + "authenticator", + "controllerManager", + "scheduler" + ], + "endpoint": "https://C22446710534ECE8BC397E6224EDBDA0.gr7.us-west-2.eks.amazonaws.com", + "id": "spark-k8s-operator", + "identity": [ + { + "oidc": [ + { + "issuer": "https://oidc.eks.us-west-2.amazonaws.com/id/C22446710534ECE8BC397E6224EDBDA0" + } + ] + } + ], + "kubernetes_network_config": [ + { + "ip_family": "ipv4", + "service_ipv4_cidr": "172.20.0.0/16", + "service_ipv6_cidr": "" + } + ], + "name": "spark-k8s-operator", + "outpost_config": [], + "platform_version": "eks.4", + "role_arn": "arn:aws:iam::833162080385:role/spark-k8s-operator-cluster-role", + "status": "ACTIVE", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "version": "1.24", + "vpc_config": [ + { + "cluster_security_group_id": "sg-01a416c53ccb8a396", + "endpoint_private_access": true, + "endpoint_public_access": true, + "public_access_cidrs": [ + "0.0.0.0/0" + ], + "security_group_ids": [ + "sg-08594ac5018946ede" + ], + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "vpc_id": "vpc-06ca7bfc43c08c033" + } + ] + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints_kubernetes_addons", + "mode": "data", + "type": "aws_partition", + "name": "current", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "dns_suffix": "amazonaws.com", + "id": "aws", + "partition": "aws", + "reverse_dns_prefix": "com.amazonaws" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints_kubernetes_addons", + "mode": "data", + "type": "aws_region", + "name": "current", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "description": "US West (Oregon)", + "endpoint": "ec2.us-west-2.amazonaws.com", + "id": "us-west-2", + "name": "us-west-2" + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.eks_blueprints_kubernetes_addons", + "mode": "managed", + "type": "time_sleep", + "name": "dataplane", + "provider": "provider[\"registry.terraform.io/hashicorp/time\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "create_duration": "10s", + "destroy_duration": null, + "id": "2023-03-01T01:28:28Z", + "triggers": { + "data_plane_wait_arn": "", + "eks_cluster_id": "spark-k8s-operator" + } + }, + "sensitive_attributes": [], + "dependencies": [ + "aws_s3_bucket.this", + "aws_s3_bucket_acl.this", + "aws_s3_bucket_public_access_block.this", + "aws_s3_bucket_server_side_encryption_configuration.this", + "aws_s3_object.this", + "data.aws_availability_zones.available", + "data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.eks_blueprints_kubernetes_addons.module.spark_k8s_operator[0]", + "mode": "managed", + "type": "kubernetes_namespace_v1", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/kubernetes\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "id": "spark-operator", + "metadata": [ + { + "annotations": {}, + "generate_name": "", + "generation": 0, + "labels": {}, + "name": "spark-operator", + "resource_version": "1075", + "uid": "2fa81378-a67c-4ee4-ac84-40f4f04c14a1" + } + ], + "timeouts": null + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiZGVsZXRlIjozMDAwMDAwMDAwMDB9fQ==", + "dependencies": [ + "aws_s3_bucket.this", + "aws_s3_bucket_acl.this", + "aws_s3_bucket_public_access_block.this", + "aws_s3_bucket_server_side_encryption_configuration.this", + "aws_s3_object.this", + "data.aws_availability_zones.available", + "data.aws_caller_identity.current", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.eks_blueprints_kubernetes_addons.module.spark_k8s_operator[0].module.helm_addon", + "mode": "managed", + "type": "helm_release", + "name": "addon", + "provider": "provider[\"registry.terraform.io/hashicorp/helm\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 1, + "attributes": { + "atomic": false, + "chart": "spark-operator", + "cleanup_on_fail": false, + "create_namespace": true, + "dependency_update": false, + "description": "The spark_k8s_operator HelmChart Ingress Controller deployment configuration", + "devel": null, + "disable_crd_hooks": false, + "disable_openapi_validation": false, + "disable_webhooks": false, + "force_update": false, + "id": "spark-operator", + "keyring": "", + "lint": false, + "manifest": null, + "max_history": 0, + "metadata": [ + { + "app_version": "v1beta2-1.3.8-3.1.1", + "chart": "spark-operator", + "name": "spark-operator", + "namespace": "spark-operator", + "revision": 1, + "values": "{\"batchScheduler\":{\"enable\":true},\"nodeSelector\":{\"NodeGroupType\":\"core\",\"kubernetes.io/os\":\"linux\"},\"replicaCount\":1,\"resources\":{\"limits\":{\"cpu\":\"200m\",\"memory\":\"1Gi\"},\"requests\":{\"cpu\":\"100m\",\"memory\":\"512Mi\"}},\"uiService\":{\"enable\":true},\"webhook\":{\"enable\":true,\"port\":8080}}", + "version": "1.1.26" + } + ], + "name": "spark-operator", + "namespace": "spark-operator", + "pass_credentials": false, + "postrender": [ + { + "args": [], + "binary_path": "" + } + ], + "recreate_pods": false, + "render_subchart_notes": true, + "replace": false, + "repository": "https://googlecloudplatform.github.io/spark-on-k8s-operator", + "repository_ca_file": null, + "repository_cert_file": "", + "repository_key_file": "", + "repository_password": "", + "repository_username": "", + "reset_values": false, + "reuse_values": false, + "set": [], + "set_sensitive": [], + "skip_crds": false, + "status": "uninstalling", + "timeout": 300, + "values": [ + "replicaCount: 1\n\n# nodeSelector -- Node labels for pod assignment\nnodeSelector:\n NodeGroupType: core\n kubernetes.io/os: linux\n\nwebhook:\n # -- Enable webhook server\n enable: true\n # -- Webhook service port\n port: 8080\n\n# resources -- Pod resource requests and limits\n# Note, that each job submission will spawn a JVM within the Spark Operator Pod using \"/usr/local/openjdk-11/bin/java -Xmx128m\".\n# Kubernetes may kill these Java processes at will to enforce resource limits. When that happens, you will see the following error:\n# 'failed to run spark-submit for SparkApplication [...]: signal: killed' - when this happens, you may want to increase memory limits.\nresources:\n limits:\n cpu: 200m\n memory: 1Gi\n requests:\n cpu: 100m\n memory: 512Mi\n\nbatchScheduler:\n # -- Enable batch scheduler for spark jobs scheduling. If enabled, users can specify batch scheduler name in spark application\n enable: true\n\n#------------------------------------\n# THIS WILL CREATE SERVICE AND INGRESS OBJECT FOR EACH SPARK APPLICATION\n#------------------------------------\nuiService:\n # -- Enable UI service creation for Spark application\n enable: true\n# -- Ingress URL format.\n# Requires the UI service to be enabled by setting `uiService.enable` to true.\n# 1/ Enable ingressUrlFormat to create an Ingress object for each Spark Job submitted using Spark Operator\n# 2/ This setup also requires ingres-nginx to be deployed with NLB as LB with IP based routing.\n# 3. Enter the NLB DNS name or enter Custom Domain name from route53 below which points to the NLB\n#ingressUrlFormat: '\u003cENTER_NLB_DNS_NAME/CUSTOM_DOMAIN_NAME\u003e/{{$appName}}'\n" + ], + "verify": false, + "version": "1.1.26", + "wait": true, + "wait_for_jobs": false + }, + "sensitive_attributes": [], + "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", + "dependencies": [ + "aws_s3_bucket.this", + "aws_s3_bucket_acl.this", + "aws_s3_bucket_public_access_block.this", + "aws_s3_bucket_server_side_encryption_configuration.this", + "aws_s3_object.this", + "data.aws_availability_zones.available", + "data.aws_caller_identity.current", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.eks_blueprints_kubernetes_addons.data.aws_caller_identity.current", + "module.eks_blueprints_kubernetes_addons.data.aws_eks_cluster.eks_cluster", + "module.eks_blueprints_kubernetes_addons.data.aws_partition.current", + "module.eks_blueprints_kubernetes_addons.data.aws_region.current", + "module.eks_blueprints_kubernetes_addons.module.spark_k8s_operator.kubernetes_namespace_v1.this", + "module.eks_blueprints_kubernetes_addons.module.spark_k8s_operator.module.helm_addon.module.irsa.aws_iam_role.irsa", + "module.eks_blueprints_kubernetes_addons.module.spark_k8s_operator.module.helm_addon.module.irsa.aws_iam_role_policy_attachment.irsa", + "module.eks_blueprints_kubernetes_addons.module.spark_k8s_operator.module.helm_addon.module.irsa.kubernetes_namespace_v1.irsa", + "module.eks_blueprints_kubernetes_addons.module.spark_k8s_operator.module.helm_addon.module.irsa.kubernetes_service_account_v1.irsa", + "module.eks_blueprints_kubernetes_addons.time_sleep.dataplane", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.irsa", + "mode": "managed", + "type": "aws_iam_role", + "name": "irsa", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::833162080385:role/spark-k8s-operator-spark-team-a-irsa", + "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringLike\":{\"oidc.eks.us-west-2.amazonaws.com/id/C22446710534ECE8BC397E6224EDBDA0:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-west-2.amazonaws.com/id/C22446710534ECE8BC397E6224EDBDA0:sub\":\"system:serviceaccount:spark-team-a:spark-team-a\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::833162080385:oidc-provider/oidc.eks.us-west-2.amazonaws.com/id/C22446710534ECE8BC397E6224EDBDA0\"}}],\"Version\":\"2012-10-17\"}", + "create_date": "2023-03-01T01:28:19Z", + "description": "AWS IAM Role for the Kubernetes service account spark-team-a.", + "force_detach_policies": true, + "id": "spark-k8s-operator-spark-team-a-irsa", + "inline_policy": [], + "managed_policy_arns": [ + "arn:aws:iam::833162080385:policy/spark-k8s-operator-spark-irsa" + ], + "max_session_duration": 3600, + "name": "spark-k8s-operator-spark-team-a-irsa", + "name_prefix": "", + "path": "/", + "permissions_boundary": "", + "tags": {}, + "tags_all": {}, + "unique_id": "AROA4D7CUOCAQ7QYYOEWO" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_policy.spark", + "data.aws_availability_zones.available", + "data.aws_caller_identity.current", + "data.aws_iam_policy_document.spark_operator", + "data.aws_partition.current", + "data.aws_region.current", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_openid_connect_provider.oidc_provider", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.data.tls_certificate.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.irsa", + "mode": "managed", + "type": "aws_iam_role_policy_attachment", + "name": "irsa", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "id": "spark-k8s-operator-spark-team-a-irsa-2023030101282218420000001d", + "policy_arn": "arn:aws:iam::833162080385:policy/spark-k8s-operator-spark-irsa", + "role": "spark-k8s-operator-spark-team-a-irsa" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_policy.spark", + "data.aws_availability_zones.available", + "data.aws_caller_identity.current", + "data.aws_iam_policy_document.spark_operator", + "data.aws_partition.current", + "data.aws_region.current", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_openid_connect_provider.oidc_provider", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.data.tls_certificate.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.irsa.aws_iam_role.irsa", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.irsa", + "mode": "managed", + "type": "kubernetes_namespace_v1", + "name": "irsa", + "provider": "provider[\"registry.terraform.io/hashicorp/kubernetes\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "id": "spark-team-a", + "metadata": [ + { + "annotations": {}, + "generate_name": "", + "generation": 0, + "labels": {}, + "name": "spark-team-a", + "resource_version": "1079", + "uid": "ee9b4eab-f6d1-4283-9cdb-79953fb4c84b" + } + ], + "timeouts": { + "delete": "15m" + } + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiZGVsZXRlIjo5MDAwMDAwMDAwMDB9fQ==", + "dependencies": [ + "data.aws_availability_zones.available", + "data.aws_eks_cluster_auth.this", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.irsa", + "mode": "managed", + "type": "kubernetes_service_account_v1", + "name": "irsa", + "provider": "provider[\"registry.terraform.io/hashicorp/kubernetes\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "automount_service_account_token": true, + "default_secret_name": "", + "id": "spark-team-a/spark-team-a", + "image_pull_secret": [], + "metadata": [ + { + "annotations": { + "eks.amazonaws.com/role-arn": "arn:aws:iam::833162080385:role/spark-k8s-operator-spark-team-a-irsa" + }, + "generate_name": "", + "generation": 0, + "labels": {}, + "name": "spark-team-a", + "namespace": "spark-team-a", + "resource_version": "1102", + "uid": "377a9c19-e4a6-407b-b43a-ea1989091b12" + } + ], + "secret": [], + "timeouts": null + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMH19", + "dependencies": [ + "aws_iam_policy.spark", + "data.aws_availability_zones.available", + "data.aws_caller_identity.current", + "data.aws_eks_cluster_auth.this", + "data.aws_iam_policy_document.spark_operator", + "data.aws_partition.current", + "data.aws_region.current", + "module.eks_blueprints.data.aws_caller_identity.current", + "module.eks_blueprints.data.aws_iam_policy_document.eks_key", + "module.eks_blueprints.data.aws_iam_session_context.current", + "module.eks_blueprints.data.aws_partition.current", + "module.eks_blueprints.data.aws_region.current", + "module.eks_blueprints.module.aws_eks.aws_cloudwatch_log_group.this", + "module.eks_blueprints.module.aws_eks.aws_eks_cluster.this", + "module.eks_blueprints.module.aws_eks.aws_iam_openid_connect_provider.oidc_provider", + "module.eks_blueprints.module.aws_eks.aws_iam_role.this", + "module.eks_blueprints.module.aws_eks.aws_iam_role_policy_attachment.this", + "module.eks_blueprints.module.aws_eks.aws_security_group.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group.node", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.cluster", + "module.eks_blueprints.module.aws_eks.aws_security_group_rule.node", + "module.eks_blueprints.module.aws_eks.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.data.aws_iam_policy_document.assume_role_policy", + "module.eks_blueprints.module.aws_eks.data.aws_partition.current", + "module.eks_blueprints.module.aws_eks.data.tls_certificate.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_external_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.aws_kms_key.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_caller_identity.current", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_iam_policy_document.this", + "module.eks_blueprints.module.aws_eks.module.kms.data.aws_partition.current", + "module.eks_blueprints.module.kms.aws_kms_key.this", + "module.irsa.aws_iam_role.irsa", + "module.irsa.kubernetes_namespace_v1.irsa", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.managed_prometheus", + "mode": "managed", + "type": "aws_prometheus_alert_manager_definition", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "definition": "alertmanager_config: |\n route:\n receiver: 'default'\n receivers:\n - name: 'default'\n", + "id": "ws-2fbbabea-4091-4c9d-b29a-66dd60208b90", + "workspace_id": "ws-2fbbabea-4091-4c9d-b29a-66dd60208b90" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "module.managed_prometheus.aws_prometheus_workspace.this" + ] + } + ] + }, + { + "module": "module.managed_prometheus", + "mode": "managed", + "type": "aws_prometheus_workspace", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "alias": "spark-k8s-operator", + "arn": "arn:aws:aps:us-west-2:833162080385:workspace/ws-2fbbabea-4091-4c9d-b29a-66dd60208b90", + "id": "ws-2fbbabea-4091-4c9d-b29a-66dd60208b90", + "logging_configuration": [], + "prometheus_endpoint": "https://aps-workspaces.us-west-2.amazonaws.com/workspaces/ws-2fbbabea-4091-4c9d-b29a-66dd60208b90/", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks" + } + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + } + ] + }, + { + "module": "module.vpc", + "mode": "managed", + "type": "aws_default_network_acl", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:network-acl/acl-0e9cc42bfbd16ea32", + "default_network_acl_id": "acl-0e9cc42bfbd16ea32", + "egress": [ + { + "action": "allow", + "cidr_block": "", + "from_port": 0, + "icmp_code": 0, + "icmp_type": 0, + "ipv6_cidr_block": "::/0", + "protocol": "-1", + "rule_no": 101, + "to_port": 0 + }, + { + "action": "allow", + "cidr_block": "0.0.0.0/0", + "from_port": 0, + "icmp_code": 0, + "icmp_type": 0, + "ipv6_cidr_block": "", + "protocol": "-1", + "rule_no": 100, + "to_port": 0 + } + ], + "id": "acl-0e9cc42bfbd16ea32", + "ingress": [ + { + "action": "allow", + "cidr_block": "", + "from_port": 0, + "icmp_code": 0, + "icmp_type": 0, + "ipv6_cidr_block": "::/0", + "protocol": "-1", + "rule_no": 101, + "to_port": 0 + }, + { + "action": "allow", + "cidr_block": "0.0.0.0/0", + "from_port": 0, + "icmp_code": 0, + "icmp_type": 0, + "ipv6_cidr_block": "", + "protocol": "-1", + "rule_no": 100, + "to_port": 0 + } + ], + "owner_id": "833162080385", + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-06a8b01c90a3f2e47", + "subnet-08df7f1867faf7d03", + "subnet-0a261cceaa9e07a5a", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-default" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-default" + }, + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "module.vpc.aws_vpc.this" + ] + } + ] + }, + { + "module": "module.vpc", + "mode": "managed", + "type": "aws_default_route_table", + "name": "default", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:route-table/rtb-07828efbd3d9b6153", + "default_route_table_id": "rtb-07828efbd3d9b6153", + "id": "rtb-07828efbd3d9b6153", + "owner_id": "833162080385", + "propagating_vgws": [], + "route": [], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-default" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-default" + }, + "timeouts": { + "create": "5m", + "update": "5m" + }, + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsInVwZGF0ZSI6MzAwMDAwMDAwMDAwfX0=", + "dependencies": [ + "module.vpc.aws_vpc.this" + ] + } + ] + }, + { + "module": "module.vpc", + "mode": "managed", + "type": "aws_default_security_group", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:security-group/sg-08e0f0496d630598a", + "description": "default VPC security group", + "egress": [ + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "", + "from_port": 0, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "-1", + "security_groups": [], + "self": false, + "to_port": 0 + } + ], + "id": "sg-08e0f0496d630598a", + "ingress": [ + { + "cidr_blocks": [ + "10.1.0.0/16" + ], + "description": "", + "from_port": 0, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "-1", + "security_groups": [], + "self": false, + "to_port": 0 + } + ], + "name": "default", + "name_prefix": "", + "owner_id": "833162080385", + "revoke_rules_on_delete": false, + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-default" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-default" + }, + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", + "dependencies": [ + "module.vpc.aws_vpc.this" + ] + } + ] + }, + { + "module": "module.vpc", + "mode": "managed", + "type": "aws_eip", + "name": "nat", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "address": null, + "allocation_id": "eipalloc-0736e51c85ba21eea", + "associate_with_private_ip": null, + "association_id": "eipassoc-02a8faf87aef4015c", + "carrier_ip": "", + "customer_owned_ip": "", + "customer_owned_ipv4_pool": "", + "domain": "vpc", + "id": "eipalloc-0736e51c85ba21eea", + "instance": "", + "network_border_group": "us-west-2", + "network_interface": "eni-0dd395fc59d96f792", + "private_dns": "ip-10-1-197-14.us-west-2.compute.internal", + "private_ip": "10.1.197.14", + "public_dns": "ec2-35-86-23-191.us-west-2.compute.amazonaws.com", + "public_ip": "35.86.23.191", + "public_ipv4_pool": "amazon", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-us-west-2a" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-us-west-2a" + }, + "timeouts": null, + "vpc": true + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiZGVsZXRlIjoxODAwMDAwMDAwMDAsInJlYWQiOjkwMDAwMDAwMDAwMCwidXBkYXRlIjozMDAwMDAwMDAwMDB9fQ==", + "dependencies": [ + "data.aws_availability_zones.available" + ] + } + ] + }, + { + "module": "module.vpc", + "mode": "managed", + "type": "aws_internet_gateway", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:internet-gateway/igw-0d110dac396fd61bb", + "id": "igw-0d110dac396fd61bb", + "owner_id": "833162080385", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator" + }, + "timeouts": null, + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjEyMDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19", + "dependencies": [ + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.vpc", + "mode": "managed", + "type": "aws_nat_gateway", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "allocation_id": "eipalloc-0736e51c85ba21eea", + "connectivity_type": "public", + "id": "nat-04e4e96a234947041", + "network_interface_id": "eni-0dd395fc59d96f792", + "private_ip": "10.1.197.14", + "public_ip": "35.86.23.191", + "subnet_id": "subnet-08df7f1867faf7d03", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-us-west-2a" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-us-west-2a" + } + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_eip.nat", + "module.vpc.aws_internet_gateway.this", + "module.vpc.aws_subnet.public", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.vpc", + "mode": "managed", + "type": "aws_route", + "name": "private_nat_gateway", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "carrier_gateway_id": "", + "core_network_arn": "", + "destination_cidr_block": "0.0.0.0/0", + "destination_ipv6_cidr_block": "", + "destination_prefix_list_id": "", + "egress_only_gateway_id": "", + "gateway_id": "", + "id": "r-rtb-02a566dee501b4ba71080289494", + "instance_id": "", + "instance_owner_id": "", + "local_gateway_id": "", + "nat_gateway_id": "nat-04e4e96a234947041", + "network_interface_id": "", + "origin": "CreateRoute", + "route_table_id": "rtb-02a566dee501b4ba7", + "state": "active", + "timeouts": { + "create": "5m", + "delete": null, + "update": null + }, + "transit_gateway_id": "", + "vpc_endpoint_id": "", + "vpc_peering_connection_id": "" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_eip.nat", + "module.vpc.aws_internet_gateway.this", + "module.vpc.aws_nat_gateway.this", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.public", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.vpc", + "mode": "managed", + "type": "aws_route", + "name": "public_internet_gateway", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "carrier_gateway_id": "", + "core_network_arn": "", + "destination_cidr_block": "0.0.0.0/0", + "destination_ipv6_cidr_block": "", + "destination_prefix_list_id": "", + "egress_only_gateway_id": "", + "gateway_id": "igw-0d110dac396fd61bb", + "id": "r-rtb-087ad61dbeefdc1381080289494", + "instance_id": "", + "instance_owner_id": "", + "local_gateway_id": "", + "nat_gateway_id": "", + "network_interface_id": "", + "origin": "CreateRoute", + "route_table_id": "rtb-087ad61dbeefdc138", + "state": "active", + "timeouts": { + "create": "5m", + "delete": null, + "update": null + }, + "transit_gateway_id": "", + "vpc_endpoint_id": "", + "vpc_peering_connection_id": "" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", + "dependencies": [ + "module.vpc.aws_internet_gateway.this", + "module.vpc.aws_route_table.public", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.vpc", + "mode": "managed", + "type": "aws_route_table", + "name": "private", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:route-table/rtb-02a566dee501b4ba7", + "id": "rtb-02a566dee501b4ba7", + "owner_id": "833162080385", + "propagating_vgws": [], + "route": [ + { + "carrier_gateway_id": "", + "cidr_block": "0.0.0.0/0", + "core_network_arn": "", + "destination_prefix_list_id": "", + "egress_only_gateway_id": "", + "gateway_id": "", + "instance_id": "", + "ipv6_cidr_block": "", + "local_gateway_id": "", + "nat_gateway_id": "nat-04e4e96a234947041", + "network_interface_id": "", + "transit_gateway_id": "", + "vpc_endpoint_id": "", + "vpc_peering_connection_id": "" + } + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-private" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-private" + }, + "timeouts": null, + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.vpc", + "mode": "managed", + "type": "aws_route_table", + "name": "public", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:route-table/rtb-087ad61dbeefdc138", + "id": "rtb-087ad61dbeefdc138", + "owner_id": "833162080385", + "propagating_vgws": [], + "route": [ + { + "carrier_gateway_id": "", + "cidr_block": "0.0.0.0/0", + "core_network_arn": "", + "destination_prefix_list_id": "", + "egress_only_gateway_id": "", + "gateway_id": "igw-0d110dac396fd61bb", + "instance_id": "", + "ipv6_cidr_block": "", + "local_gateway_id": "", + "nat_gateway_id": "", + "network_interface_id": "", + "transit_gateway_id": "", + "vpc_endpoint_id": "", + "vpc_peering_connection_id": "" + } + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-public" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-public" + }, + "timeouts": null, + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", + "dependencies": [ + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.vpc", + "mode": "managed", + "type": "aws_route_table_association", + "name": "private", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "gateway_id": "", + "id": "rtbassoc-06a56c0a431e74f15", + "route_table_id": "rtb-02a566dee501b4ba7", + "subnet_id": "subnet-0fefa6460af7bc584" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + }, + { + "index_key": 1, + "schema_version": 0, + "attributes": { + "gateway_id": "", + "id": "rtbassoc-0de28b9debe3163a3", + "route_table_id": "rtb-02a566dee501b4ba7", + "subnet_id": "subnet-021471d8746f8f7f7" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + }, + { + "index_key": 2, + "schema_version": 0, + "attributes": { + "gateway_id": "", + "id": "rtbassoc-0fc876c0bc644ff60", + "route_table_id": "rtb-02a566dee501b4ba7", + "subnet_id": "subnet-0bf5a95565543f69f" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.vpc", + "mode": "managed", + "type": "aws_route_table_association", + "name": "public", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 0, + "attributes": { + "gateway_id": "", + "id": "rtbassoc-0621b5d9e54864d48", + "route_table_id": "rtb-087ad61dbeefdc138", + "subnet_id": "subnet-08df7f1867faf7d03" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.public", + "module.vpc.aws_subnet.public", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + }, + { + "index_key": 1, + "schema_version": 0, + "attributes": { + "gateway_id": "", + "id": "rtbassoc-006b4714d64a8fb23", + "route_table_id": "rtb-087ad61dbeefdc138", + "subnet_id": "subnet-0a261cceaa9e07a5a" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.public", + "module.vpc.aws_subnet.public", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + }, + { + "index_key": 2, + "schema_version": 0, + "attributes": { + "gateway_id": "", + "id": "rtbassoc-0cf2016898cca325d", + "route_table_id": "rtb-087ad61dbeefdc138", + "subnet_id": "subnet-06a8b01c90a3f2e47" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.public", + "module.vpc.aws_subnet.public", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.vpc", + "mode": "managed", + "type": "aws_subnet", + "name": "private", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:subnet/subnet-0fefa6460af7bc584", + "assign_ipv6_address_on_creation": false, + "availability_zone": "us-west-2a", + "availability_zone_id": "usw2-az1", + "cidr_block": "10.1.0.0/18", + "customer_owned_ipv4_pool": "", + "enable_dns64": false, + "enable_resource_name_dns_a_record_on_launch": false, + "enable_resource_name_dns_aaaa_record_on_launch": false, + "id": "subnet-0fefa6460af7bc584", + "ipv6_cidr_block": "", + "ipv6_cidr_block_association_id": "", + "ipv6_native": false, + "map_customer_owned_ip_on_launch": false, + "map_public_ip_on_launch": false, + "outpost_arn": "", + "owner_id": "833162080385", + "private_dns_hostname_type_on_launch": "ip-name", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-private-us-west-2a", + "kubernetes.io/cluster/spark-k8s-operator": "shared", + "kubernetes.io/role/internal-elb": "1" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-private-us-west-2a", + "kubernetes.io/cluster/spark-k8s-operator": "shared", + "kubernetes.io/role/internal-elb": "1" + }, + "timeouts": null, + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + }, + { + "index_key": 1, + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:subnet/subnet-021471d8746f8f7f7", + "assign_ipv6_address_on_creation": false, + "availability_zone": "us-west-2b", + "availability_zone_id": "usw2-az2", + "cidr_block": "10.1.64.0/18", + "customer_owned_ipv4_pool": "", + "enable_dns64": false, + "enable_resource_name_dns_a_record_on_launch": false, + "enable_resource_name_dns_aaaa_record_on_launch": false, + "id": "subnet-021471d8746f8f7f7", + "ipv6_cidr_block": "", + "ipv6_cidr_block_association_id": "", + "ipv6_native": false, + "map_customer_owned_ip_on_launch": false, + "map_public_ip_on_launch": false, + "outpost_arn": "", + "owner_id": "833162080385", + "private_dns_hostname_type_on_launch": "ip-name", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-private-us-west-2b", + "kubernetes.io/cluster/spark-k8s-operator": "shared", + "kubernetes.io/role/internal-elb": "1" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-private-us-west-2b", + "kubernetes.io/cluster/spark-k8s-operator": "shared", + "kubernetes.io/role/internal-elb": "1" + }, + "timeouts": null, + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + }, + { + "index_key": 2, + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:subnet/subnet-0bf5a95565543f69f", + "assign_ipv6_address_on_creation": false, + "availability_zone": "us-west-2c", + "availability_zone_id": "usw2-az3", + "cidr_block": "10.1.128.0/18", + "customer_owned_ipv4_pool": "", + "enable_dns64": false, + "enable_resource_name_dns_a_record_on_launch": false, + "enable_resource_name_dns_aaaa_record_on_launch": false, + "id": "subnet-0bf5a95565543f69f", + "ipv6_cidr_block": "", + "ipv6_cidr_block_association_id": "", + "ipv6_native": false, + "map_customer_owned_ip_on_launch": false, + "map_public_ip_on_launch": false, + "outpost_arn": "", + "owner_id": "833162080385", + "private_dns_hostname_type_on_launch": "ip-name", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-private-us-west-2c", + "kubernetes.io/cluster/spark-k8s-operator": "shared", + "kubernetes.io/role/internal-elb": "1" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-private-us-west-2c", + "kubernetes.io/cluster/spark-k8s-operator": "shared", + "kubernetes.io/role/internal-elb": "1" + }, + "timeouts": null, + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.vpc", + "mode": "managed", + "type": "aws_subnet", + "name": "public", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:subnet/subnet-08df7f1867faf7d03", + "assign_ipv6_address_on_creation": false, + "availability_zone": "us-west-2a", + "availability_zone_id": "usw2-az1", + "cidr_block": "10.1.192.0/20", + "customer_owned_ipv4_pool": "", + "enable_dns64": false, + "enable_resource_name_dns_a_record_on_launch": false, + "enable_resource_name_dns_aaaa_record_on_launch": false, + "id": "subnet-08df7f1867faf7d03", + "ipv6_cidr_block": "", + "ipv6_cidr_block_association_id": "", + "ipv6_native": false, + "map_customer_owned_ip_on_launch": false, + "map_public_ip_on_launch": true, + "outpost_arn": "", + "owner_id": "833162080385", + "private_dns_hostname_type_on_launch": "ip-name", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-public-us-west-2a", + "kubernetes.io/cluster/spark-k8s-operator": "shared", + "kubernetes.io/role/elb": "1" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-public-us-west-2a", + "kubernetes.io/cluster/spark-k8s-operator": "shared", + "kubernetes.io/role/elb": "1" + }, + "timeouts": null, + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + }, + { + "index_key": 1, + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:subnet/subnet-0a261cceaa9e07a5a", + "assign_ipv6_address_on_creation": false, + "availability_zone": "us-west-2b", + "availability_zone_id": "usw2-az2", + "cidr_block": "10.1.208.0/20", + "customer_owned_ipv4_pool": "", + "enable_dns64": false, + "enable_resource_name_dns_a_record_on_launch": false, + "enable_resource_name_dns_aaaa_record_on_launch": false, + "id": "subnet-0a261cceaa9e07a5a", + "ipv6_cidr_block": "", + "ipv6_cidr_block_association_id": "", + "ipv6_native": false, + "map_customer_owned_ip_on_launch": false, + "map_public_ip_on_launch": true, + "outpost_arn": "", + "owner_id": "833162080385", + "private_dns_hostname_type_on_launch": "ip-name", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-public-us-west-2b", + "kubernetes.io/cluster/spark-k8s-operator": "shared", + "kubernetes.io/role/elb": "1" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-public-us-west-2b", + "kubernetes.io/cluster/spark-k8s-operator": "shared", + "kubernetes.io/role/elb": "1" + }, + "timeouts": null, + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + }, + { + "index_key": 2, + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:subnet/subnet-06a8b01c90a3f2e47", + "assign_ipv6_address_on_creation": false, + "availability_zone": "us-west-2c", + "availability_zone_id": "usw2-az3", + "cidr_block": "10.1.224.0/20", + "customer_owned_ipv4_pool": "", + "enable_dns64": false, + "enable_resource_name_dns_a_record_on_launch": false, + "enable_resource_name_dns_aaaa_record_on_launch": false, + "id": "subnet-06a8b01c90a3f2e47", + "ipv6_cidr_block": "", + "ipv6_cidr_block_association_id": "", + "ipv6_native": false, + "map_customer_owned_ip_on_launch": false, + "map_public_ip_on_launch": true, + "outpost_arn": "", + "owner_id": "833162080385", + "private_dns_hostname_type_on_launch": "ip-name", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-public-us-west-2c", + "kubernetes.io/cluster/spark-k8s-operator": "shared", + "kubernetes.io/role/elb": "1" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-public-us-west-2c", + "kubernetes.io/cluster/spark-k8s-operator": "shared", + "kubernetes.io/role/elb": "1" + }, + "timeouts": null, + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] + }, + { + "module": "module.vpc", + "mode": "managed", + "type": "aws_vpc", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc/vpc-06ca7bfc43c08c033", + "assign_generated_ipv6_cidr_block": false, + "cidr_block": "10.1.0.0/16", + "default_network_acl_id": "acl-0e9cc42bfbd16ea32", + "default_route_table_id": "rtb-07828efbd3d9b6153", + "default_security_group_id": "sg-08e0f0496d630598a", + "dhcp_options_id": "dopt-459d163d", + "enable_classiclink": false, + "enable_classiclink_dns_support": false, + "enable_dns_hostnames": true, + "enable_dns_support": true, + "enable_network_address_usage_metrics": false, + "id": "vpc-06ca7bfc43c08c033", + "instance_tenancy": "default", + "ipv4_ipam_pool_id": null, + "ipv4_netmask_length": null, + "ipv6_association_id": "", + "ipv6_cidr_block": "", + "ipv6_cidr_block_network_border_group": "", + "ipv6_ipam_pool_id": "", + "ipv6_netmask_length": 0, + "main_route_table_id": "rtb-07828efbd3d9b6153", + "owner_id": "833162080385", + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator" + } + }, + "sensitive_attributes": [], + "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", + "create_before_destroy": true + } + ] + }, + { + "module": "module.vpc_endpoints", + "mode": "data", + "type": "aws_vpc_endpoint_service", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": "autoscaling", + "schema_version": 0, + "attributes": { + "acceptance_required": false, + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint-service/vpce-svc-00fbaf2c04f5f8508", + "availability_zones": [ + "us-west-2a", + "us-west-2b", + "us-west-2c", + "us-west-2d" + ], + "base_endpoint_dns_names": [ + "autoscaling.us-west-2.vpce.amazonaws.com" + ], + "filter": [ + { + "name": "service-type", + "values": [ + "Interface" + ] + } + ], + "id": "238145577", + "manages_vpc_endpoints": false, + "owner": "amazon", + "private_dns_name": "autoscaling.us-west-2.amazonaws.com", + "service": "autoscaling", + "service_id": "vpce-svc-00fbaf2c04f5f8508", + "service_name": "com.amazonaws.us-west-2.autoscaling", + "service_type": "Interface", + "supported_ip_address_types": [ + "ipv4" + ], + "tags": {}, + "timeouts": null, + "vpc_endpoint_policy_supported": true + }, + "sensitive_attributes": [] + }, + { + "index_key": "ec2", + "schema_version": 0, + "attributes": { + "acceptance_required": false, + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint-service/vpce-svc-0ee6723c76642b3d8", + "availability_zones": [ + "us-west-2a", + "us-west-2b", + "us-west-2c", + "us-west-2d" + ], + "base_endpoint_dns_names": [ + "ec2.us-west-2.vpce.amazonaws.com" + ], + "filter": [ + { + "name": "service-type", + "values": [ + "Interface" + ] + } + ], + "id": "2763407252", + "manages_vpc_endpoints": false, + "owner": "amazon", + "private_dns_name": "ec2.us-west-2.amazonaws.com", + "service": "ec2", + "service_id": "vpce-svc-0ee6723c76642b3d8", + "service_name": "com.amazonaws.us-west-2.ec2", + "service_type": "Interface", + "supported_ip_address_types": [ + "ipv4" + ], + "tags": {}, + "timeouts": null, + "vpc_endpoint_policy_supported": true + }, + "sensitive_attributes": [] + }, + { + "index_key": "ec2messages", + "schema_version": 0, + "attributes": { + "acceptance_required": false, + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint-service/vpce-svc-0f70e5d200f09304f", + "availability_zones": [ + "us-west-2a", + "us-west-2b", + "us-west-2c", + "us-west-2d" + ], + "base_endpoint_dns_names": [ + "ec2messages.us-west-2.vpce.amazonaws.com" + ], + "filter": [ + { + "name": "service-type", + "values": [ + "Interface" + ] + } + ], + "id": "1742190616", + "manages_vpc_endpoints": false, + "owner": "amazon", + "private_dns_name": "ec2messages.us-west-2.amazonaws.com", + "service": "ec2messages", + "service_id": "vpce-svc-0f70e5d200f09304f", + "service_name": "com.amazonaws.us-west-2.ec2messages", + "service_type": "Interface", + "supported_ip_address_types": [ + "ipv4" + ], + "tags": {}, + "timeouts": null, + "vpc_endpoint_policy_supported": true + }, + "sensitive_attributes": [] + }, + { + "index_key": "ecr_api", + "schema_version": 0, + "attributes": { + "acceptance_required": false, + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint-service/vpce-svc-07d1f428f072fd172", + "availability_zones": [ + "us-west-2a", + "us-west-2b", + "us-west-2c", + "us-west-2d" + ], + "base_endpoint_dns_names": [ + "api.ecr.us-west-2.vpce.amazonaws.com" + ], + "filter": [ + { + "name": "service-type", + "values": [ + "Interface" + ] + } + ], + "id": "355460308", + "manages_vpc_endpoints": false, + "owner": "amazon", + "private_dns_name": "api.ecr.us-west-2.amazonaws.com", + "service": "ecr.api", + "service_id": "vpce-svc-07d1f428f072fd172", + "service_name": "com.amazonaws.us-west-2.ecr.api", + "service_type": "Interface", + "supported_ip_address_types": [ + "ipv4" + ], + "tags": {}, + "timeouts": null, + "vpc_endpoint_policy_supported": true + }, + "sensitive_attributes": [] + }, + { + "index_key": "ecr_dkr", + "schema_version": 0, + "attributes": { + "acceptance_required": false, + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint-service/vpce-svc-09d74a28015a69002", + "availability_zones": [ + "us-west-2a", + "us-west-2b", + "us-west-2c", + "us-west-2d" + ], + "base_endpoint_dns_names": [ + "dkr.ecr.us-west-2.vpce.amazonaws.com" + ], + "filter": [ + { + "name": "service-type", + "values": [ + "Interface" + ] + } + ], + "id": "817308745", + "manages_vpc_endpoints": false, + "owner": "amazon", + "private_dns_name": "*.dkr.ecr.us-west-2.amazonaws.com", + "service": "ecr.dkr", + "service_id": "vpce-svc-09d74a28015a69002", + "service_name": "com.amazonaws.us-west-2.ecr.dkr", + "service_type": "Interface", + "supported_ip_address_types": [ + "ipv4" + ], + "tags": {}, + "timeouts": null, + "vpc_endpoint_policy_supported": true + }, + "sensitive_attributes": [] + }, + { + "index_key": "elasticloadbalancing", + "schema_version": 0, + "attributes": { + "acceptance_required": false, + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint-service/vpce-svc-061cdcc9c29aedd6d", + "availability_zones": [ + "us-west-2a", + "us-west-2b", + "us-west-2c", + "us-west-2d" + ], + "base_endpoint_dns_names": [ + "elasticloadbalancing.us-west-2.vpce.amazonaws.com" + ], + "filter": [ + { + "name": "service-type", + "values": [ + "Interface" + ] + } + ], + "id": "1553699775", + "manages_vpc_endpoints": false, + "owner": "amazon", + "private_dns_name": "elasticloadbalancing.us-west-2.amazonaws.com", + "service": "elasticloadbalancing", + "service_id": "vpce-svc-061cdcc9c29aedd6d", + "service_name": "com.amazonaws.us-west-2.elasticloadbalancing", + "service_type": "Interface", + "supported_ip_address_types": [ + "ipv4" + ], + "tags": {}, + "timeouts": null, + "vpc_endpoint_policy_supported": true + }, + "sensitive_attributes": [] + }, + { + "index_key": "kms", + "schema_version": 0, + "attributes": { + "acceptance_required": false, + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint-service/vpce-svc-0596e4991e17a31c4", + "availability_zones": [ + "us-west-2a", + "us-west-2b", + "us-west-2c", + "us-west-2d" + ], + "base_endpoint_dns_names": [ + "kms.us-west-2.vpce.amazonaws.com" + ], + "filter": [ + { + "name": "service-type", + "values": [ + "Interface" + ] + } + ], + "id": "829443606", + "manages_vpc_endpoints": false, + "owner": "amazon", + "private_dns_name": "kms.us-west-2.amazonaws.com", + "service": "kms", + "service_id": "vpce-svc-0596e4991e17a31c4", + "service_name": "com.amazonaws.us-west-2.kms", + "service_type": "Interface", + "supported_ip_address_types": [ + "ipv4" + ], + "tags": {}, + "timeouts": null, + "vpc_endpoint_policy_supported": true + }, + "sensitive_attributes": [] + }, + { + "index_key": "logs", + "schema_version": 0, + "attributes": { + "acceptance_required": false, + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint-service/vpce-svc-06f816fad0803d466", + "availability_zones": [ + "us-west-2a", + "us-west-2b", + "us-west-2c", + "us-west-2d" + ], + "base_endpoint_dns_names": [ + "logs.us-west-2.vpce.amazonaws.com" + ], + "filter": [ + { + "name": "service-type", + "values": [ + "Interface" + ] + } + ], + "id": "1595290006", + "manages_vpc_endpoints": false, + "owner": "amazon", + "private_dns_name": "logs.us-west-2.amazonaws.com", + "service": "logs", + "service_id": "vpce-svc-06f816fad0803d466", + "service_name": "com.amazonaws.us-west-2.logs", + "service_type": "Interface", + "supported_ip_address_types": [ + "ipv4" + ], + "tags": {}, + "timeouts": null, + "vpc_endpoint_policy_supported": true + }, + "sensitive_attributes": [] + }, + { + "index_key": "s3", + "schema_version": 0, + "attributes": { + "acceptance_required": false, + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint-service/vpce-svc-0001be97e1865c74e", + "availability_zones": [ + "us-west-2a", + "us-west-2b", + "us-west-2c", + "us-west-2d" + ], + "base_endpoint_dns_names": [ + "s3.us-west-2.amazonaws.com" + ], + "filter": [ + { + "name": "service-type", + "values": [ + "Gateway" + ] + } + ], + "id": "526544209", + "manages_vpc_endpoints": false, + "owner": "amazon", + "private_dns_name": "", + "service": "s3", + "service_id": "vpce-svc-0001be97e1865c74e", + "service_name": "com.amazonaws.us-west-2.s3", + "service_type": "Gateway", + "supported_ip_address_types": [ + "ipv4" + ], + "tags": {}, + "timeouts": null, + "vpc_endpoint_policy_supported": true + }, + "sensitive_attributes": [] + }, + { + "index_key": "ssm", + "schema_version": 0, + "attributes": { + "acceptance_required": false, + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint-service/vpce-svc-0039038d504694533", + "availability_zones": [ + "us-west-2a", + "us-west-2b", + "us-west-2c", + "us-west-2d" + ], + "base_endpoint_dns_names": [ + "ssm.us-west-2.vpce.amazonaws.com" + ], + "filter": [ + { + "name": "service-type", + "values": [ + "Interface" + ] + } + ], + "id": "218873442", + "manages_vpc_endpoints": false, + "owner": "amazon", + "private_dns_name": "ssm.us-west-2.amazonaws.com", + "service": "ssm", + "service_id": "vpce-svc-0039038d504694533", + "service_name": "com.amazonaws.us-west-2.ssm", + "service_type": "Interface", + "supported_ip_address_types": [ + "ipv4" + ], + "tags": {}, + "timeouts": null, + "vpc_endpoint_policy_supported": true + }, + "sensitive_attributes": [] + }, + { + "index_key": "ssmmessages", + "schema_version": 0, + "attributes": { + "acceptance_required": false, + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint-service/vpce-svc-05531521310252ac3", + "availability_zones": [ + "us-west-2a", + "us-west-2b", + "us-west-2c", + "us-west-2d" + ], + "base_endpoint_dns_names": [ + "ssmmessages.us-west-2.vpce.amazonaws.com" + ], + "filter": [ + { + "name": "service-type", + "values": [ + "Interface" + ] + } + ], + "id": "2882648543", + "manages_vpc_endpoints": false, + "owner": "amazon", + "private_dns_name": "ssmmessages.us-west-2.amazonaws.com", + "service": "ssmmessages", + "service_id": "vpce-svc-05531521310252ac3", + "service_name": "com.amazonaws.us-west-2.ssmmessages", + "service_type": "Interface", + "supported_ip_address_types": [ + "ipv4" + ], + "tags": {}, + "timeouts": null, + "vpc_endpoint_policy_supported": true + }, + "sensitive_attributes": [] + }, + { + "index_key": "sts", + "schema_version": 0, + "attributes": { + "acceptance_required": false, + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint-service/vpce-svc-06681ce20e9a3e8c4", + "availability_zones": [ + "us-west-2a", + "us-west-2b", + "us-west-2c", + "us-west-2d" + ], + "base_endpoint_dns_names": [ + "sts.us-west-2.vpce.amazonaws.com" + ], + "filter": [ + { + "name": "service-type", + "values": [ + "Interface" + ] + } + ], + "id": "3091535302", + "manages_vpc_endpoints": false, + "owner": "amazon", + "private_dns_name": "sts.us-west-2.amazonaws.com", + "service": "sts", + "service_id": "vpce-svc-06681ce20e9a3e8c4", + "service_name": "com.amazonaws.us-west-2.sts", + "service_type": "Interface", + "supported_ip_address_types": [ + "ipv4" + ], + "tags": {}, + "timeouts": null, + "vpc_endpoint_policy_supported": true + }, + "sensitive_attributes": [] + } + ] + }, + { + "module": "module.vpc_endpoints", + "mode": "managed", + "type": "aws_vpc_endpoint", + "name": "this", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": "autoscaling", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint/vpce-025515029cdc5e340", + "auto_accept": null, + "cidr_blocks": [], + "dns_entry": [ + { + "dns_name": "vpce-025515029cdc5e340-gywrm2y2.autoscaling.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-025515029cdc5e340-gywrm2y2-us-west-2a.autoscaling.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-025515029cdc5e340-gywrm2y2-us-west-2b.autoscaling.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-025515029cdc5e340-gywrm2y2-us-west-2c.autoscaling.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "autoscaling.us-west-2.amazonaws.com", + "hosted_zone_id": "Z0800755ZOYXADQ5U7JY" + } + ], + "dns_options": [ + { + "dns_record_ip_type": "ipv4" + } + ], + "id": "vpce-025515029cdc5e340", + "ip_address_type": "ipv4", + "network_interface_ids": [ + "eni-06792db50c5501852", + "eni-0738a7d7f789c41d1", + "eni-0d8a5fc5ec962bccb" + ], + "owner_id": "833162080385", + "policy": "{\"Statement\":[{\"Action\":\"*\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Resource\":\"*\"}]}", + "prefix_list_id": null, + "private_dns_enabled": true, + "requester_managed": false, + "route_table_ids": [], + "security_group_ids": [ + "sg-0eae295258deca7cb" + ], + "service_name": "com.amazonaws.us-west-2.autoscaling", + "state": "available", + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-autoscaling" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-autoscaling" + }, + "timeouts": { + "create": "10m", + "delete": "10m", + "update": "10m" + }, + "vpc_endpoint_type": "Interface", + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwLCJ1cGRhdGUiOjYwMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this", + "module.vpc_endpoints.data.aws_vpc_endpoint_service.this", + "module.vpc_endpoints_sg.aws_security_group.this", + "module.vpc_endpoints_sg.aws_security_group.this_name_prefix" + ] + }, + { + "index_key": "ec2", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint/vpce-06cc3d30909e38b93", + "auto_accept": null, + "cidr_blocks": [], + "dns_entry": [ + { + "dns_name": "vpce-06cc3d30909e38b93-b09smxek.ec2.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-06cc3d30909e38b93-b09smxek-us-west-2c.ec2.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-06cc3d30909e38b93-b09smxek-us-west-2b.ec2.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-06cc3d30909e38b93-b09smxek-us-west-2a.ec2.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "ec2.us-west-2.amazonaws.com", + "hosted_zone_id": "Z08815983J1O8ERKOVQ8Y" + }, + { + "dns_name": "ec2.us-west-2.api.aws", + "hosted_zone_id": "Z04524341SHCJ0Z95PRXP" + } + ], + "dns_options": [ + { + "dns_record_ip_type": "ipv4" + } + ], + "id": "vpce-06cc3d30909e38b93", + "ip_address_type": "ipv4", + "network_interface_ids": [ + "eni-05a4ea19a860108b7", + "eni-0685b644ede2a4874", + "eni-0e2fba2587aadcc9b" + ], + "owner_id": "833162080385", + "policy": "{\"Statement\":[{\"Action\":\"*\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Resource\":\"*\"}]}", + "prefix_list_id": null, + "private_dns_enabled": true, + "requester_managed": false, + "route_table_ids": [], + "security_group_ids": [ + "sg-0eae295258deca7cb" + ], + "service_name": "com.amazonaws.us-west-2.ec2", + "state": "available", + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-ec2" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-ec2" + }, + "timeouts": { + "create": "10m", + "delete": "10m", + "update": "10m" + }, + "vpc_endpoint_type": "Interface", + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwLCJ1cGRhdGUiOjYwMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this", + "module.vpc_endpoints.data.aws_vpc_endpoint_service.this", + "module.vpc_endpoints_sg.aws_security_group.this", + "module.vpc_endpoints_sg.aws_security_group.this_name_prefix" + ] + }, + { + "index_key": "ec2messages", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint/vpce-09be294ff02e8fc5e", + "auto_accept": null, + "cidr_blocks": [], + "dns_entry": [ + { + "dns_name": "vpce-09be294ff02e8fc5e-bwqz3z4j.ec2messages.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-09be294ff02e8fc5e-bwqz3z4j-us-west-2a.ec2messages.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-09be294ff02e8fc5e-bwqz3z4j-us-west-2b.ec2messages.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-09be294ff02e8fc5e-bwqz3z4j-us-west-2c.ec2messages.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "ec2messages.us-west-2.amazonaws.com", + "hosted_zone_id": "Z08809212EMSN1MMEED79" + } + ], + "dns_options": [ + { + "dns_record_ip_type": "ipv4" + } + ], + "id": "vpce-09be294ff02e8fc5e", + "ip_address_type": "ipv4", + "network_interface_ids": [ + "eni-0156fe14bd5647062", + "eni-064993610858f0843", + "eni-09b7d7782fbfbb6b6" + ], + "owner_id": "833162080385", + "policy": "{\"Statement\":[{\"Action\":\"*\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Resource\":\"*\"}]}", + "prefix_list_id": null, + "private_dns_enabled": true, + "requester_managed": false, + "route_table_ids": [], + "security_group_ids": [ + "sg-0eae295258deca7cb" + ], + "service_name": "com.amazonaws.us-west-2.ec2messages", + "state": "available", + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-ec2messages" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-ec2messages" + }, + "timeouts": { + "create": "10m", + "delete": "10m", + "update": "10m" + }, + "vpc_endpoint_type": "Interface", + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwLCJ1cGRhdGUiOjYwMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this", + "module.vpc_endpoints.data.aws_vpc_endpoint_service.this", + "module.vpc_endpoints_sg.aws_security_group.this", + "module.vpc_endpoints_sg.aws_security_group.this_name_prefix" + ] + }, + { + "index_key": "ecr_api", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint/vpce-0fd1a7e43b9d05bd6", + "auto_accept": null, + "cidr_blocks": [], + "dns_entry": [ + { + "dns_name": "vpce-0fd1a7e43b9d05bd6-gjqtqnlw.api.ecr.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-0fd1a7e43b9d05bd6-gjqtqnlw-us-west-2b.api.ecr.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-0fd1a7e43b9d05bd6-gjqtqnlw-us-west-2c.api.ecr.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-0fd1a7e43b9d05bd6-gjqtqnlw-us-west-2a.api.ecr.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "api.ecr.us-west-2.amazonaws.com", + "hosted_zone_id": "Z08402873HY9YGSO7SFI2" + } + ], + "dns_options": [ + { + "dns_record_ip_type": "ipv4" + } + ], + "id": "vpce-0fd1a7e43b9d05bd6", + "ip_address_type": "ipv4", + "network_interface_ids": [ + "eni-00a785eafabfc6f24", + "eni-042877f61c794d2de", + "eni-07ab4eaa63aaeb144" + ], + "owner_id": "833162080385", + "policy": "{\"Statement\":[{\"Action\":\"*\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Resource\":\"*\"}]}", + "prefix_list_id": null, + "private_dns_enabled": true, + "requester_managed": false, + "route_table_ids": [], + "security_group_ids": [ + "sg-0eae295258deca7cb" + ], + "service_name": "com.amazonaws.us-west-2.ecr.api", + "state": "available", + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-ecr.api" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-ecr.api" + }, + "timeouts": { + "create": "10m", + "delete": "10m", + "update": "10m" + }, + "vpc_endpoint_type": "Interface", + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwLCJ1cGRhdGUiOjYwMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this", + "module.vpc_endpoints.data.aws_vpc_endpoint_service.this", + "module.vpc_endpoints_sg.aws_security_group.this", + "module.vpc_endpoints_sg.aws_security_group.this_name_prefix" + ] + }, + { + "index_key": "ecr_dkr", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint/vpce-01ab9e2d3e26e0ec0", + "auto_accept": null, + "cidr_blocks": [], + "dns_entry": [ + { + "dns_name": "vpce-01ab9e2d3e26e0ec0-h3uwtvli.dkr.ecr.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-01ab9e2d3e26e0ec0-h3uwtvli-us-west-2a.dkr.ecr.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-01ab9e2d3e26e0ec0-h3uwtvli-us-west-2c.dkr.ecr.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-01ab9e2d3e26e0ec0-h3uwtvli-us-west-2b.dkr.ecr.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "dkr.ecr.us-west-2.amazonaws.com", + "hosted_zone_id": "Z08820843P8NEKQB79BWN" + }, + { + "dns_name": "*.dkr.ecr.us-west-2.amazonaws.com", + "hosted_zone_id": "Z08820843P8NEKQB79BWN" + } + ], + "dns_options": [ + { + "dns_record_ip_type": "ipv4" + } + ], + "id": "vpce-01ab9e2d3e26e0ec0", + "ip_address_type": "ipv4", + "network_interface_ids": [ + "eni-055d45af2b564e81c", + "eni-07937a863dbd37cbe", + "eni-0e293a43db85a66f8" + ], + "owner_id": "833162080385", + "policy": "{\"Statement\":[{\"Action\":\"*\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Resource\":\"*\"}]}", + "prefix_list_id": null, + "private_dns_enabled": true, + "requester_managed": false, + "route_table_ids": [], + "security_group_ids": [ + "sg-0eae295258deca7cb" + ], + "service_name": "com.amazonaws.us-west-2.ecr.dkr", + "state": "available", + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-ecr.dkr" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-ecr.dkr" + }, + "timeouts": { + "create": "10m", + "delete": "10m", + "update": "10m" + }, + "vpc_endpoint_type": "Interface", + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwLCJ1cGRhdGUiOjYwMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this", + "module.vpc_endpoints.data.aws_vpc_endpoint_service.this", + "module.vpc_endpoints_sg.aws_security_group.this", + "module.vpc_endpoints_sg.aws_security_group.this_name_prefix" + ] + }, + { + "index_key": "elasticloadbalancing", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint/vpce-0012e350ceb2caf40", + "auto_accept": null, + "cidr_blocks": [], + "dns_entry": [ + { + "dns_name": "vpce-0012e350ceb2caf40-40sw96sw.elasticloadbalancing.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-0012e350ceb2caf40-40sw96sw-us-west-2a.elasticloadbalancing.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-0012e350ceb2caf40-40sw96sw-us-west-2b.elasticloadbalancing.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-0012e350ceb2caf40-40sw96sw-us-west-2c.elasticloadbalancing.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "elasticloadbalancing.us-west-2.amazonaws.com", + "hosted_zone_id": "Z08631132D7ST3UIBQ3Y4" + } + ], + "dns_options": [ + { + "dns_record_ip_type": "ipv4" + } + ], + "id": "vpce-0012e350ceb2caf40", + "ip_address_type": "ipv4", + "network_interface_ids": [ + "eni-0071c404aea07ecb8", + "eni-03fe25a2e0afb4419", + "eni-0d42c7e6be8ccf357" + ], + "owner_id": "833162080385", + "policy": "{\"Statement\":[{\"Action\":\"*\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Resource\":\"*\"}]}", + "prefix_list_id": null, + "private_dns_enabled": true, + "requester_managed": false, + "route_table_ids": [], + "security_group_ids": [ + "sg-0eae295258deca7cb" + ], + "service_name": "com.amazonaws.us-west-2.elasticloadbalancing", + "state": "available", + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-elasticloadbalancing" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-elasticloadbalancing" + }, + "timeouts": { + "create": "10m", + "delete": "10m", + "update": "10m" + }, + "vpc_endpoint_type": "Interface", + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwLCJ1cGRhdGUiOjYwMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this", + "module.vpc_endpoints.data.aws_vpc_endpoint_service.this", + "module.vpc_endpoints_sg.aws_security_group.this", + "module.vpc_endpoints_sg.aws_security_group.this_name_prefix" + ] + }, + { + "index_key": "kms", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint/vpce-03b4d6d05f038a7db", + "auto_accept": null, + "cidr_blocks": [], + "dns_entry": [ + { + "dns_name": "vpce-03b4d6d05f038a7db-av1zu8as.kms.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-03b4d6d05f038a7db-av1zu8as-us-west-2a.kms.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-03b4d6d05f038a7db-av1zu8as-us-west-2b.kms.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-03b4d6d05f038a7db-av1zu8as-us-west-2c.kms.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "kms.us-west-2.amazonaws.com", + "hosted_zone_id": "Z08622433OJOO5RRW2AN7" + } + ], + "dns_options": [ + { + "dns_record_ip_type": "ipv4" + } + ], + "id": "vpce-03b4d6d05f038a7db", + "ip_address_type": "ipv4", + "network_interface_ids": [ + "eni-027fad9864073f4b7", + "eni-02eab238697e6b54a", + "eni-07e5e28012928f044" + ], + "owner_id": "833162080385", + "policy": "{\"Statement\":[{\"Action\":\"*\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Resource\":\"*\"}]}", + "prefix_list_id": null, + "private_dns_enabled": true, + "requester_managed": false, + "route_table_ids": [], + "security_group_ids": [ + "sg-0eae295258deca7cb" + ], + "service_name": "com.amazonaws.us-west-2.kms", + "state": "available", + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-kms" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-kms" + }, + "timeouts": { + "create": "10m", + "delete": "10m", + "update": "10m" + }, + "vpc_endpoint_type": "Interface", + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwLCJ1cGRhdGUiOjYwMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this", + "module.vpc_endpoints.data.aws_vpc_endpoint_service.this", + "module.vpc_endpoints_sg.aws_security_group.this", + "module.vpc_endpoints_sg.aws_security_group.this_name_prefix" + ] + }, + { + "index_key": "logs", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint/vpce-0ddbc95562a17db5a", + "auto_accept": null, + "cidr_blocks": [], + "dns_entry": [ + { + "dns_name": "vpce-0ddbc95562a17db5a-1d9hey7j.logs.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-0ddbc95562a17db5a-1d9hey7j-us-west-2a.logs.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-0ddbc95562a17db5a-1d9hey7j-us-west-2b.logs.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-0ddbc95562a17db5a-1d9hey7j-us-west-2c.logs.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "logs.us-west-2.amazonaws.com", + "hosted_zone_id": "Z080076212RCOW4BGQXE9" + } + ], + "dns_options": [ + { + "dns_record_ip_type": "ipv4" + } + ], + "id": "vpce-0ddbc95562a17db5a", + "ip_address_type": "ipv4", + "network_interface_ids": [ + "eni-030309b87c46a1a1a", + "eni-063ab9d52a965fa8e", + "eni-0d73fc458cc2d4d60" + ], + "owner_id": "833162080385", + "policy": "{\"Statement\":[{\"Action\":\"*\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Resource\":\"*\"}]}", + "prefix_list_id": null, + "private_dns_enabled": true, + "requester_managed": false, + "route_table_ids": [], + "security_group_ids": [ + "sg-0eae295258deca7cb" + ], + "service_name": "com.amazonaws.us-west-2.logs", + "state": "available", + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-logs" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-logs" + }, + "timeouts": { + "create": "10m", + "delete": "10m", + "update": "10m" + }, + "vpc_endpoint_type": "Interface", + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwLCJ1cGRhdGUiOjYwMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this", + "module.vpc_endpoints.data.aws_vpc_endpoint_service.this", + "module.vpc_endpoints_sg.aws_security_group.this", + "module.vpc_endpoints_sg.aws_security_group.this_name_prefix" + ] + }, + { + "index_key": "s3", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint/vpce-0b16831edef68f944", + "auto_accept": null, + "cidr_blocks": [ + "3.5.76.0/22", + "3.5.80.0/21", + "18.34.48.0/20", + "18.34.244.0/22", + "52.92.128.0/17", + "52.218.128.0/17" + ], + "dns_entry": [], + "dns_options": [], + "id": "vpce-0b16831edef68f944", + "ip_address_type": "", + "network_interface_ids": [], + "owner_id": "833162080385", + "policy": "{\"Statement\":[{\"Action\":\"*\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Resource\":\"*\"}],\"Version\":\"2008-10-17\"}", + "prefix_list_id": "pl-68a54001", + "private_dns_enabled": false, + "requester_managed": false, + "route_table_ids": [ + "rtb-02a566dee501b4ba7" + ], + "security_group_ids": [], + "service_name": "com.amazonaws.us-west-2.s3", + "state": "available", + "subnet_ids": [], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-s3" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-s3" + }, + "timeouts": { + "create": "10m", + "delete": "10m", + "update": "10m" + }, + "vpc_endpoint_type": "Gateway", + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwLCJ1cGRhdGUiOjYwMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this", + "module.vpc_endpoints.data.aws_vpc_endpoint_service.this", + "module.vpc_endpoints_sg.aws_security_group.this", + "module.vpc_endpoints_sg.aws_security_group.this_name_prefix" + ] + }, + { + "index_key": "ssm", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint/vpce-012b4fd3657af21fa", + "auto_accept": null, + "cidr_blocks": [], + "dns_entry": [ + { + "dns_name": "vpce-012b4fd3657af21fa-y2djdtny.ssm.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-012b4fd3657af21fa-y2djdtny-us-west-2c.ssm.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-012b4fd3657af21fa-y2djdtny-us-west-2b.ssm.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-012b4fd3657af21fa-y2djdtny-us-west-2a.ssm.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "ssm.us-west-2.amazonaws.com", + "hosted_zone_id": "Z0863156B92C7T1XW2CU" + } + ], + "dns_options": [ + { + "dns_record_ip_type": "ipv4" + } + ], + "id": "vpce-012b4fd3657af21fa", + "ip_address_type": "ipv4", + "network_interface_ids": [ + "eni-010cc54999ff852fd", + "eni-0561728e745eb9a25", + "eni-0894b0242f856a779" + ], + "owner_id": "833162080385", + "policy": "{\"Statement\":[{\"Action\":\"*\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Resource\":\"*\"}]}", + "prefix_list_id": null, + "private_dns_enabled": true, + "requester_managed": false, + "route_table_ids": [], + "security_group_ids": [ + "sg-0eae295258deca7cb" + ], + "service_name": "com.amazonaws.us-west-2.ssm", + "state": "available", + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-ssm" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-ssm" + }, + "timeouts": { + "create": "10m", + "delete": "10m", + "update": "10m" + }, + "vpc_endpoint_type": "Interface", + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwLCJ1cGRhdGUiOjYwMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this", + "module.vpc_endpoints.data.aws_vpc_endpoint_service.this", + "module.vpc_endpoints_sg.aws_security_group.this", + "module.vpc_endpoints_sg.aws_security_group.this_name_prefix" + ] + }, + { + "index_key": "ssmmessages", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint/vpce-08ac879babf430de9", + "auto_accept": null, + "cidr_blocks": [], + "dns_entry": [ + { + "dns_name": "vpce-08ac879babf430de9-2et10ihn.ssmmessages.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-08ac879babf430de9-2et10ihn-us-west-2b.ssmmessages.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-08ac879babf430de9-2et10ihn-us-west-2a.ssmmessages.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-08ac879babf430de9-2et10ihn-us-west-2c.ssmmessages.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "ssmmessages.us-west-2.amazonaws.com", + "hosted_zone_id": "Z0871603IFJF0GXSHYZ2" + } + ], + "dns_options": [ + { + "dns_record_ip_type": "ipv4" + } + ], + "id": "vpce-08ac879babf430de9", + "ip_address_type": "ipv4", + "network_interface_ids": [ + "eni-07d42897cc325003e", + "eni-08baa3e4d7b559717", + "eni-0b5e50da8b11e9e3b" + ], + "owner_id": "833162080385", + "policy": "{\"Statement\":[{\"Action\":\"*\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Resource\":\"*\"}]}", + "prefix_list_id": null, + "private_dns_enabled": true, + "requester_managed": false, + "route_table_ids": [], + "security_group_ids": [ + "sg-0eae295258deca7cb" + ], + "service_name": "com.amazonaws.us-west-2.ssmmessages", + "state": "available", + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-ssmmessages" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-ssmmessages" + }, + "timeouts": { + "create": "10m", + "delete": "10m", + "update": "10m" + }, + "vpc_endpoint_type": "Interface", + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwLCJ1cGRhdGUiOjYwMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this", + "module.vpc_endpoints.data.aws_vpc_endpoint_service.this", + "module.vpc_endpoints_sg.aws_security_group.this", + "module.vpc_endpoints_sg.aws_security_group.this_name_prefix" + ] + }, + { + "index_key": "sts", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:vpc-endpoint/vpce-0c6dc49f7f801929b", + "auto_accept": null, + "cidr_blocks": [], + "dns_entry": [ + { + "dns_name": "vpce-0c6dc49f7f801929b-6r1xkea8.sts.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-0c6dc49f7f801929b-6r1xkea8-us-west-2a.sts.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-0c6dc49f7f801929b-6r1xkea8-us-west-2b.sts.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "vpce-0c6dc49f7f801929b-6r1xkea8-us-west-2c.sts.us-west-2.vpce.amazonaws.com", + "hosted_zone_id": "Z1YSA3EXCYUU9Z" + }, + { + "dns_name": "sts.us-west-2.amazonaws.com", + "hosted_zone_id": "Z08807703P3ZLJK7STQG" + } + ], + "dns_options": [ + { + "dns_record_ip_type": "ipv4" + } + ], + "id": "vpce-0c6dc49f7f801929b", + "ip_address_type": "ipv4", + "network_interface_ids": [ + "eni-02dbc2fb37df49ab2", + "eni-0ef78241b82b9ad64", + "eni-0f246fb3faaab0134" + ], + "owner_id": "833162080385", + "policy": "{\"Statement\":[{\"Action\":\"*\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Resource\":\"*\"}]}", + "prefix_list_id": null, + "private_dns_enabled": true, + "requester_managed": false, + "route_table_ids": [], + "security_group_ids": [ + "sg-0eae295258deca7cb" + ], + "service_name": "com.amazonaws.us-west-2.sts", + "state": "available", + "subnet_ids": [ + "subnet-021471d8746f8f7f7", + "subnet-0bf5a95565543f69f", + "subnet-0fefa6460af7bc584" + ], + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-sts" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-sts" + }, + "timeouts": { + "create": "10m", + "delete": "10m", + "update": "10m" + }, + "vpc_endpoint_type": "Interface", + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwLCJ1cGRhdGUiOjYwMDAwMDAwMDAwMH19", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_route_table.private", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this", + "module.vpc_endpoints.data.aws_vpc_endpoint_service.this", + "module.vpc_endpoints_sg.aws_security_group.this", + "module.vpc_endpoints_sg.aws_security_group.this_name_prefix" + ] + } + ] + }, + { + "module": "module.vpc_endpoints_sg", + "mode": "managed", + "type": "aws_security_group", + "name": "this_name_prefix", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:us-west-2:833162080385:security-group/sg-0eae295258deca7cb", + "description": "Security group for VPC endpoint access", + "egress": [ + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "All egress HTTPS", + "from_port": 443, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 443 + } + ], + "id": "sg-0eae295258deca7cb", + "ingress": [ + { + "cidr_blocks": [ + "10.1.0.0/18", + "10.1.64.0/18", + "10.1.128.0/18" + ], + "description": "VPC CIDR HTTPS", + "from_port": 443, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 443 + } + ], + "name": "spark-k8s-operator-vpc-endpoints-20230301011555953100000004", + "name_prefix": "spark-k8s-operator-vpc-endpoints-", + "owner_id": "833162080385", + "revoke_rules_on_delete": false, + "tags": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-vpc-endpoints" + }, + "tags_all": { + "Blueprint": "spark-k8s-operator", + "GithubRepo": "github.com/awslabs/data-on-eks", + "Name": "spark-k8s-operator-vpc-endpoints" + }, + "timeouts": { + "create": "10m", + "delete": "15m" + }, + "vpc_id": "vpc-06ca7bfc43c08c033" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=", + "dependencies": [ + "module.vpc.aws_vpc.this" + ], + "create_before_destroy": true + } + ] + }, + { + "module": "module.vpc_endpoints_sg", + "mode": "managed", + "type": "aws_security_group_rule", + "name": "egress_with_cidr_blocks", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 2, + "attributes": { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "All egress HTTPS", + "from_port": 443, + "id": "sgrule-827885538", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "tcp", + "security_group_id": "sg-0eae295258deca7cb", + "security_group_rule_id": "sgr-0175b0a83acf324b6", + "self": false, + "source_security_group_id": null, + "timeouts": null, + "to_port": 443, + "type": "egress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "module.vpc.aws_vpc.this", + "module.vpc_endpoints_sg.aws_security_group.this", + "module.vpc_endpoints_sg.aws_security_group.this_name_prefix" + ] + } + ] + }, + { + "module": "module.vpc_endpoints_sg", + "mode": "managed", + "type": "aws_security_group_rule", + "name": "ingress_with_cidr_blocks", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 2, + "attributes": { + "cidr_blocks": [ + "10.1.0.0/18", + "10.1.64.0/18", + "10.1.128.0/18" + ], + "description": "VPC CIDR HTTPS", + "from_port": 443, + "id": "sgrule-2176494076", + "ipv6_cidr_blocks": null, + "prefix_list_ids": [], + "protocol": "tcp", + "security_group_id": "sg-0eae295258deca7cb", + "security_group_rule_id": "", + "self": false, + "source_security_group_id": null, + "timeouts": null, + "to_port": 443, + "type": "ingress" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_subnet.private", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this", + "module.vpc_endpoints_sg.aws_security_group.this", + "module.vpc_endpoints_sg.aws_security_group.this_name_prefix" + ] + } + ] + } + ], + "check_results": null +} \ No newline at end of file diff --git a/plugins/workflows/src/index.ts b/plugins/workflows/src/index.ts new file mode 100644 index 0000000..1f093e7 --- /dev/null +++ b/plugins/workflows/src/index.ts @@ -0,0 +1 @@ +export { workflowsPlugin, WorkflowsPage } from './plugin'; diff --git a/plugins/workflows/src/plugin.test.ts b/plugins/workflows/src/plugin.test.ts new file mode 100644 index 0000000..a12979f --- /dev/null +++ b/plugins/workflows/src/plugin.test.ts @@ -0,0 +1,7 @@ +import { workflowsPlugin } from './plugin'; + +describe('workflows', () => { + it('should export plugin', () => { + expect(workflowsPlugin).toBeDefined(); + }); +}); diff --git a/plugins/workflows/src/plugin.ts b/plugins/workflows/src/plugin.ts new file mode 100644 index 0000000..7a2fba3 --- /dev/null +++ b/plugins/workflows/src/plugin.ts @@ -0,0 +1,19 @@ +import { createPlugin, createRoutableExtension } from '@backstage/core-plugin-api'; + +import { rootRouteRef } from './routes'; + +export const workflowsPlugin = createPlugin({ + id: 'workflows', + routes: { + root: rootRouteRef, + }, +}); + +export const WorkflowsPage = workflowsPlugin.provide( + createRoutableExtension({ + name: 'WorkflowsPage', + component: () => + import('./components/ExampleComponent').then(m => m.ExampleComponent), + mountPoint: rootRouteRef, + }), +); diff --git a/plugins/workflows/src/routes.ts b/plugins/workflows/src/routes.ts new file mode 100644 index 0000000..85716d2 --- /dev/null +++ b/plugins/workflows/src/routes.ts @@ -0,0 +1,5 @@ +import { createRouteRef } from '@backstage/core-plugin-api'; + +export const rootRouteRef = createRouteRef({ + id: 'workflows', +}); diff --git a/plugins/workflows/src/setupTests.ts b/plugins/workflows/src/setupTests.ts new file mode 100644 index 0000000..48c09b5 --- /dev/null +++ b/plugins/workflows/src/setupTests.ts @@ -0,0 +1,2 @@ +import '@testing-library/jest-dom'; +import 'cross-fetch/polyfill';