Skip to content

Conversation

@soerenmartius
Copy link
Contributor

No description provided.

@soerenmartius soerenmartius requested a review from a team as a code owner May 21, 2025 12:19
@terramate-cloud
Copy link

terramate-cloud bot commented May 21, 2025

Terramate Cloud Preview of commit 7461c31

Changed Resources

View Details on Terramate Cloud

Action Resource Target Name Account
✅ ADD null_resource.initial_trigger default (unknown) (unknown)
✅ ADD module.eks.aws_cloudwatch_log_group.this[0] default (unknown) (unknown)
✅ ADD module.eks.aws_ec2_tag.cluster_primary_security_group["Environment"] default (unknown) (unknown)
✅ ADD module.eks.aws_eks_access_entry.this["cluster_creator"] default (unknown) (unknown)
✅ ADD module.eks.aws_eks_access_policy_association.this["cluster_creator_admin"] default (unknown) (unknown)
✅ ADD module.eks.aws_eks_cluster.this[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_openid_connect_provider.oidc_provider[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_policy.cluster_encryption[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_policy.custom[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role.eks_auto[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role.this[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.cluster_encryption[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.custom[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.eks_auto["AmazonEC2ContainerRegistryPullOnly"] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.eks_auto["AmazonEKSWorkerNodeMinimalPolicy"] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.this["AmazonEKSBlockStoragePolicy"] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.this["AmazonEKSComputePolicy"] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.this["AmazonEKSLoadBalancingPolicy"] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.this["AmazonEKSNetworkingPolicy"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group.cluster[0] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group.node[0] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.cluster["ingress_nodes_443"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["egress_all"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_cluster_443"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_cluster_4443_webhook"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_cluster_6443_webhook"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_cluster_8443_webhook"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_cluster_9443_webhook"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_cluster_kubelet"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_nodes_ephemeral"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_self_coredns_tcp"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_self_coredns_udp"] default (unknown) (unknown)
✅ ADD module.eks.time_sleep.this[0] default (unknown) (unknown)
✅ ADD module.eks.module.kms.aws_kms_alias.this["cluster"] default (unknown) (unknown)
✅ ADD module.eks.module.kms.aws_kms_key.this[0] default (unknown) (unknown)
✅ ADD null_resource.initial_trigger default (unknown) (unknown)
✅ ADD module.eks.aws_cloudwatch_log_group.this[0] default (unknown) (unknown)
✅ ADD module.eks.aws_ec2_tag.cluster_primary_security_group["Environment"] default (unknown) (unknown)
✅ ADD module.eks.aws_eks_access_entry.this["cluster_creator"] default (unknown) (unknown)
✅ ADD module.eks.aws_eks_access_policy_association.this["cluster_creator_admin"] default (unknown) (unknown)
✅ ADD module.eks.aws_eks_cluster.this[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_openid_connect_provider.oidc_provider[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_policy.cluster_encryption[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_policy.custom[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role.eks_auto[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role.this[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.cluster_encryption[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.custom[0] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.eks_auto["AmazonEC2ContainerRegistryPullOnly"] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.eks_auto["AmazonEKSWorkerNodeMinimalPolicy"] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.this["AmazonEKSBlockStoragePolicy"] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.this["AmazonEKSComputePolicy"] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.this["AmazonEKSLoadBalancingPolicy"] default (unknown) (unknown)
✅ ADD module.eks.aws_iam_role_policy_attachment.this["AmazonEKSNetworkingPolicy"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group.cluster[0] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group.node[0] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.cluster["ingress_nodes_443"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["egress_all"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_cluster_443"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_cluster_4443_webhook"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_cluster_6443_webhook"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_cluster_8443_webhook"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_cluster_9443_webhook"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_cluster_kubelet"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_nodes_ephemeral"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_self_coredns_tcp"] default (unknown) (unknown)
✅ ADD module.eks.aws_security_group_rule.node["ingress_self_coredns_udp"] default (unknown) (unknown)
✅ ADD module.eks.time_sleep.this[0] default (unknown) (unknown)
✅ ADD module.eks.module.kms.aws_kms_alias.this["cluster"] default (unknown) (unknown)
✅ ADD module.eks.module.kms.aws_kms_key.this[0] default (unknown) (unknown)

Changed Stacks

⚠️ 2 stacks with changing resources

/stacks/terraform/envs/prd/eks
/stacks/terraform/envs/stg/eks

✅ 2 stacks without resource changes

/stacks/terraform/envs/stg/vpc
/stacks/terraform/envs/prd/vpc

💥 6 stacks failed to generate a preview

/stacks/terraform/envs/stg/eks/apps/app1
/stacks/terraform/envs/prd/eks/apps/app1
/stacks/terraform/envs/stg/eks/apps
/stacks/terraform/envs/prd/eks/apps/app2
/stacks/terraform/envs/prd/eks/apps
/stacks/terraform/envs/stg/eks/apps/app2

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants