Difference between revisions of "Terraform show (grep resource) in EKS"
Jump to navigation
Jump to search
Tags: Mobile web edit, Mobile edit |
Tags: Mobile web edit, Mobile edit |
||
Line 17: | Line 17: | ||
== Full list == | == Full list == | ||
[[terraform show]] | grep -w resource | [[terraform show]] | grep -w resource | ||
− | |||
resource "aws_eip" "nat" { | resource "aws_eip" "nat" { | ||
resource "[[aws_internet_gateway]]" "this" { | resource "[[aws_internet_gateway]]" "this" { |
Revision as of 19:00, 10 June 2022
terraform show | grep -w resource | sort | uniq terraform show | grep -w resource | sort | cut -d" " -f1,2 | uni
Resources
20 different types of resources created: K8s
Networking
aws_vpc, aws_subnet aws_nat_gateway aws_launch_configuration aws_internet_gateway aws_eip
aws_route_table, aws_route, aws_route_table_association
IAM
aws_security_group_rule aws_security_group aws_iam_role_policy_attachment aws_iam_role aws_iam_policy aws_iam_instance_profile, aws_autoscaling_group
Misc:
Full list
terraform show | grep -w resource resource "aws_eip" "nat" { resource "aws_internet_gateway" "this" { resource "aws_nat_gateway" "this" { resource "aws_route" "private_nat_gateway" { resource "aws_route" "public_internet_gateway" { resource "aws_route_table" "private" { resource "aws_route_table" "public" { resource "aws_route_table_association" "private" { resource "aws_route_table_association" "private" { resource "aws_route_table_association" "private" { resource "aws_route_table_association" "public" { resource "aws_route_table_association" "public" { resource "aws_route_table_association" "public" { resource "aws_subnet" "private" { resource "aws_subnet" "private" { resource "aws_subnet" "private" { resource "aws_subnet" "public" { resource "aws_subnet" "public" { resource "aws_subnet" "public" { resource "aws_vpc" "this" { resource "aws_security_group" "all_worker_mgmt" { resource "aws_security_group" "worker_group_mgmt_one" { resource "aws_security_group" "worker_group_mgmt_two" { resource "random_string" "suffix" { resource "aws_autoscaling_group" "workers" { resource "aws_eks_cluster" "this" { resource "aws_iam_instance_profile" "workers" { resource "aws_iam_policy" "cluster_deny_log_group" { resource "aws_iam_policy" "cluster_elb_sl_role_creation" { resource "aws_iam_role" "cluster" { resource "aws_iam_role" "workers" { resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSClusterPolicy" { resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSServicePolicy" { resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSVPCResourceControllerPolicy" { resource "aws_iam_role_policy_attachment" "cluster_deny_log_group" { resource "aws_iam_role_policy_attachment" "cluster_elb_sl_role_creation" { resource "aws_iam_role_policy_attachment" "workers_AmazonEC2ContainerRegistryReadOnly" { resource "aws_iam_role_policy_attachment" "workers_AmazonEKSWorkerNodePolicy" { resource "aws_iam_role_policy_attachment" "workers_AmazonEKS_CNI_Policy" { resource "aws_launch_configuration" "workers" { resource "aws_security_group" "cluster" { resource "aws_security_group" "workers" { resource "aws_security_group_rule" "cluster_egress_internet" { resource "aws_security_group_rule" "cluster_https_worker_ingress" { resource "aws_security_group_rule" "workers_egress_internet" { resource "aws_security_group_rule" "workers_ingress_cluster" { resource "aws_security_group_rule" "workers_ingress_cluster_https" { resource "aws_security_group_rule" "workers_ingress_self" { resource "kubernetes_config_map" "aws_auth" { resource "local_file" "kubeconfig" {
See also
Advertising: