Difference between revisions of "Apply complete! Resources: 63 added, 0 changed, 0 destroyed."

From wikieduonline
Jump to navigation Jump to search
(Created page with " terraform show | grep resource {{EKS module}}")
 
 
(3 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
  [[terraform show]] | grep resource
 
  [[terraform show]] | grep resource
  
 +
resource "[[aws_eks_addon]]" "ebs-csi" {
 +
resource "random_string" "suffix" {
 +
        not_resources = []
 +
        resources    = []
 +
resource "aws_cloudwatch_log_group" "this" {
 +
resource "aws_eks_cluster" "this" {
 +
        resources = [
 +
resource "aws_iam_openid_connect_provider" "oidc_provider" {
 +
resource "aws_iam_policy" "cluster_encryption" {
 +
resource "aws_iam_role" "this" {
 +
resource "aws_iam_role_policy_attachment" "cluster_encryption" {
 +
resource "aws_iam_role_policy_attachment" "this" {
 +
resource "aws_iam_role_policy_attachment" "this" {
 +
resource "aws_security_group" "cluster" {
 +
resource "aws_security_group" "node" {
 +
resource "aws_security_group_rule" "cluster" {
 +
resource "aws_security_group_rule" "node" {
 +
resource "aws_security_group_rule" "node" {
 +
resource "aws_security_group_rule" "node" {
 +
resource "aws_security_group_rule" "node" {
 +
resource "aws_security_group_rule" "node" {
 +
resource "aws_security_group_rule" "node" {
 +
resource "aws_security_group_rule" "node" {
 +
resource "aws_security_group_rule" "node" {
 +
resource "aws_security_group_rule" "node" {
 +
resource "aws_security_group_rule" "node" {
 +
resource "time_sleep" "this" {
 +
        not_resources = []
 +
        resources    = []
 +
resource "aws_eks_node_group" "this" {
 +
    resources              = [
 +
resource "[[aws_iam_role]]" "this" {
 +
resource "[[aws_iam_role_policy_attachment]]" "this" {
 +
resource "aws_iam_role_policy_attachment" "this" {
 +
resource "aws_iam_role_policy_attachment" "this" {
 +
resource "aws_launch_template" "this" {
 +
        resource_type = "instance"
 +
        resource_type = "network-interface"
 +
        resource_type = "volume"
 +
        not_resources = []
 +
        resources    = []
 +
resource "aws_eks_node_group" "this" {
 +
    resources              = [
 +
resource "aws_iam_role" "this" {
 +
resource "aws_iam_role_policy_attachment" "this" {
 +
resource "aws_iam_role_policy_attachment" "this" {
 +
resource "aws_iam_role_policy_attachment" "this" {
 +
resource "aws_launch_template" "this" {
 +
        resource_type = "instance"
 +
        resource_type = "network-interface"
 +
        resource_type = "volume"
 +
        not_resources = []
 +
        resources    = [
 +
        not_resources = []
 +
        resources    = [
 +
resource "aws_kms_alias" "this" {
 +
resource "aws_kms_key" "this" {
 +
        not_resources = []
 +
        resources    = []
 +
resource "aws_iam_role" "this" {
 +
resource "aws_iam_role_policy_attachment" "custom" {
 +
resource "aws_default_network_acl" "this" {
 +
resource "aws_default_route_table" "default" {
 +
resource "aws_default_security_group" "this" {
 +
resource "aws_eip" "nat" {
 +
resource "aws_internet_gateway" "this" {
 +
resource "aws_nat_gateway" "this" {
 +
resource "aws_route" "private_nat_gateway" {
 +
resource "aws_route" "public_internet_gateway" {
 +
resource "aws_route_table" "private" {
 +
resource "aws_route_table" "public" {
 +
resource "aws_route_table_association" "private" {
 +
resource "aws_route_table_association" "private" {
 +
resource "aws_route_table_association" "private" {
 +
resource "aws_route_table_association" "public" {
 +
resource "aws_route_table_association" "public" {
 +
resource "aws_route_table_association" "public" {
 +
resource "aws_subnet" "private" {
 +
    enable_resource_name_dns_a_record_on_launch    = false
 +
    enable_resource_name_dns_aaaa_record_on_launch = false
 +
resource "aws_subnet" "private" {
 +
    enable_resource_name_dns_a_record_on_launch    = false
 +
    enable_resource_name_dns_aaaa_record_on_launch = false
 +
resource "aws_subnet" "private" {
 +
    enable_resource_name_dns_a_record_on_launch    = false
 +
    enable_resource_name_dns_aaaa_record_on_launch = false
 +
resource "aws_subnet" "public" {
 +
    enable_resource_name_dns_a_record_on_launch    = false
 +
    enable_resource_name_dns_aaaa_record_on_launch = false
 +
resource "aws_subnet" "public" {
 +
    enable_resource_name_dns_a_record_on_launch    = false
 +
    enable_resource_name_dns_aaaa_record_on_launch = false
 +
resource "aws_subnet" "public" {
 +
    enable_resource_name_dns_a_record_on_launch    = false
 +
    enable_resource_name_dns_aaaa_record_on_launch = false
 +
resource "aws_vpc" "this" {
  
 +
== Related ==
 +
* [[Deploy EKS cluster using Terraform‎‎]]
  
 +
== See also ==
 +
* {{EKS module}}
  
{{EKS module}}
+
[[Category:EKS]]

Latest revision as of 21:49, 11 February 2024

terraform show | grep resource
resource "aws_eks_addon" "ebs-csi" {
resource "random_string" "suffix" {
        not_resources = []
        resources     = []
resource "aws_cloudwatch_log_group" "this" {
resource "aws_eks_cluster" "this" {
        resources = [
resource "aws_iam_openid_connect_provider" "oidc_provider" {
resource "aws_iam_policy" "cluster_encryption" {
resource "aws_iam_role" "this" {
resource "aws_iam_role_policy_attachment" "cluster_encryption" {
resource "aws_iam_role_policy_attachment" "this" {
resource "aws_iam_role_policy_attachment" "this" {
resource "aws_security_group" "cluster" {
resource "aws_security_group" "node" {
resource "aws_security_group_rule" "cluster" {
resource "aws_security_group_rule" "node" {
resource "aws_security_group_rule" "node" {
resource "aws_security_group_rule" "node" {
resource "aws_security_group_rule" "node" {
resource "aws_security_group_rule" "node" {
resource "aws_security_group_rule" "node" {
resource "aws_security_group_rule" "node" {
resource "aws_security_group_rule" "node" {
resource "aws_security_group_rule" "node" {
resource "aws_security_group_rule" "node" {
resource "time_sleep" "this" {
        not_resources = []
        resources     = []
resource "aws_eks_node_group" "this" {
    resources              = [
resource "aws_iam_role" "this" {
resource "aws_iam_role_policy_attachment" "this" {
resource "aws_iam_role_policy_attachment" "this" {
resource "aws_iam_role_policy_attachment" "this" {
resource "aws_launch_template" "this" {
        resource_type = "instance"
        resource_type = "network-interface"
        resource_type = "volume"
        not_resources = []
        resources     = []
resource "aws_eks_node_group" "this" {
    resources              = [
resource "aws_iam_role" "this" {
resource "aws_iam_role_policy_attachment" "this" {
resource "aws_iam_role_policy_attachment" "this" {
resource "aws_iam_role_policy_attachment" "this" {
resource "aws_launch_template" "this" {
        resource_type = "instance"
        resource_type = "network-interface"
        resource_type = "volume"
        not_resources = []
        resources     = [
        not_resources = []
        resources     = [
resource "aws_kms_alias" "this" {
resource "aws_kms_key" "this" {
        not_resources = []
        resources     = []
resource "aws_iam_role" "this" {
resource "aws_iam_role_policy_attachment" "custom" {
resource "aws_default_network_acl" "this" {
resource "aws_default_route_table" "default" {
resource "aws_default_security_group" "this" {
resource "aws_eip" "nat" {
resource "aws_internet_gateway" "this" {
resource "aws_nat_gateway" "this" {
resource "aws_route" "private_nat_gateway" {
resource "aws_route" "public_internet_gateway" {
resource "aws_route_table" "private" {
resource "aws_route_table" "public" {
resource "aws_route_table_association" "private" {
resource "aws_route_table_association" "private" {
resource "aws_route_table_association" "private" {
resource "aws_route_table_association" "public" {
resource "aws_route_table_association" "public" {
resource "aws_route_table_association" "public" {
resource "aws_subnet" "private" {
    enable_resource_name_dns_a_record_on_launch    = false
    enable_resource_name_dns_aaaa_record_on_launch = false
resource "aws_subnet" "private" {
    enable_resource_name_dns_a_record_on_launch    = false
    enable_resource_name_dns_aaaa_record_on_launch = false
resource "aws_subnet" "private" {
    enable_resource_name_dns_a_record_on_launch    = false
    enable_resource_name_dns_aaaa_record_on_launch = false
resource "aws_subnet" "public" {
    enable_resource_name_dns_a_record_on_launch    = false
    enable_resource_name_dns_aaaa_record_on_launch = false
resource "aws_subnet" "public" {
    enable_resource_name_dns_a_record_on_launch    = false
    enable_resource_name_dns_aaaa_record_on_launch = false
resource "aws_subnet" "public" {
    enable_resource_name_dns_a_record_on_launch    = false
    enable_resource_name_dns_aaaa_record_on_launch = false
resource "aws_vpc" "this" {

Related[edit]

See also[edit]

Advertising: