-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Terraform destroy fails when state is empty #568
Comments
It would be cool if this could be solved in TF itself. Is there a github issue already existing? |
We are still facing the issue. when we can expect a new release with the fix? |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Any update on a solution here? |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
This is still happening in Specifically See Line 141 in f2c4383
Here's what the error output looks like.
If I end up with free time, I'll send in a PR to fix it. I assume it will just require a better test condition on the |
@tkent I think I've bumped into this issue as well while destroying a cluster. If you can propose a PR I can help you test. |
Also having the same issue. |
Same issue on 12.1.0
|
My team has found that if there are items that affect the infrastructure that terraform is not aware of, i.e. one stands up their kubernetes infrastructure with terraform and then deploys content into that infrastructure with ansible, timeouts can occur. Once those times happen, the tfstate file is not happy and now has trouble with outputs/locals/etc that have collection or tuple information they should be referencing. Even doing a refresh with terraform does not correct the state in the state file to clear this up. |
Do you have a typical workaround that you implement? |
This is one of those annoying edge cases when half the state has been removed. Running |
For me I failed removing my cluster because I forgot uninstalling helm/ingress/route53 before running Error message is quite similar, Update: A little bit more context:
For quick testing purposes I've removed all occurrences of error messages
Below is my terraform.tfstate{
"version": 4,
"terraform_version": "0.12.29",
"serial": 20,
"lineage": "746b2236-8d1d-3622-0d8b-9fb2673ec13c",
"outputs": {},
"resources": [
{
"module": "module.s3_bucket",
"mode": "data",
"type": "aws_elb_service_account",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "data",
"type": "aws_iam_instance_profile",
"name": "custom_worker_group_iam_instance_profile",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "data",
"type": "aws_iam_instance_profile",
"name": "custom_worker_group_launch_template_iam_instance_profile",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.iam_assumable_role_admin_gitlab_runner",
"mode": "data",
"type": "aws_iam_policy_document",
"name": "assume_role_with_oidc",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.iam_assumable_role_admin_autoscaler",
"mode": "data",
"type": "aws_iam_policy_document",
"name": "assume_role_with_oidc",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.iam_assumable_role_external_dns",
"mode": "data",
"type": "aws_iam_policy_document",
"name": "assume_role_with_oidc",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.iam_assumable_role_cert_manager",
"mode": "data",
"type": "aws_iam_policy_document",
"name": "assume_role_with_oidc",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "data",
"type": "aws_iam_policy_document",
"name": "cluster_elb_sl_role_creation",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.s3_bucket",
"mode": "data",
"type": "aws_iam_policy_document",
"name": "elb_log_delivery",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "data",
"type": "aws_iam_role",
"name": "custom_cluster_iam_role",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "apigw",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "cloudtrail",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "dynamodb",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "ec2",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "ec2messages",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "ecr_api",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "ecr_dkr",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "ecs",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "ecs_agent",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "ecs_telemetry",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "elasticloadbalancing",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "events",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "kms",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "logs",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "monitoring",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "s3",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "sns",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "sqs",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "ssm",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "data",
"type": "aws_vpc_endpoint_service",
"name": "ssmmessages",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "data",
"type": "template_file",
"name": "launch_template_userdata",
"each": "list",
"provider": "provider.template",
"instances": []
},
{
"module": "module.eks",
"mode": "data",
"type": "template_file",
"name": "userdata",
"each": "list",
"provider": "provider.template",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_autoscaling_group",
"name": "workers",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_autoscaling_group",
"name": "workers_launch_template",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_cloudwatch_log_group",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds.module.db_instance",
"mode": "managed",
"type": "aws_db_instance",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds.module.db_instance",
"mode": "managed",
"type": "aws_db_instance",
"name": "this_mssql",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds.module.db_option_group",
"mode": "managed",
"type": "aws_db_option_group",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds.module.db_parameter_group",
"mode": "managed",
"type": "aws_db_parameter_group",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds.module.db_parameter_group",
"mode": "managed",
"type": "aws_db_parameter_group",
"name": "this_no_prefix",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_db_subnet_group",
"name": "database",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds.module.db_subnet_group",
"mode": "managed",
"type": "aws_db_subnet_group",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_default_network_acl",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_default_vpc",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_eip",
"name": "nat",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_eks_cluster",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks.module.node_groups",
"mode": "managed",
"type": "aws_eks_node_group",
"name": "workers",
"each": "map",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_elasticache_subnet_group",
"name": "elasticache",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_instance_profile",
"name": "workers",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_instance_profile",
"name": "workers_launch_template",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_openid_connect_provider",
"name": "oidc_provider",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_role",
"name": "cluster",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds.module.db_instance",
"mode": "managed",
"type": "aws_iam_role",
"name": "enhanced_monitoring",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.iam_assumable_role_admin_gitlab_runner",
"mode": "managed",
"type": "aws_iam_role",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.iam_assumable_role_admin_autoscaler",
"mode": "managed",
"type": "aws_iam_role",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.iam_assumable_role_external_dns",
"mode": "managed",
"type": "aws_iam_role",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.iam_assumable_role_cert_manager",
"mode": "managed",
"type": "aws_iam_role",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_role",
"name": "workers",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_role_policy",
"name": "cluster_elb_sl_role_creation",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "cluster_AmazonEKSClusterPolicy",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "cluster_AmazonEKSServicePolicy",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.iam_assumable_role_admin_gitlab_runner",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "custom",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.iam_assumable_role_admin_autoscaler",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "custom",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.iam_assumable_role_external_dns",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "custom",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.iam_assumable_role_cert_manager",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "custom",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds.module.db_instance",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "enhanced_monitoring",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "workers_AmazonEC2ContainerRegistryReadOnly",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "workers_AmazonEKSWorkerNodePolicy",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "workers_AmazonEKS_CNI_Policy",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "workers_additional_policies",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor",
"mode": "managed",
"type": "aws_instance",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory",
"mode": "managed",
"type": "aws_instance",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_internet_gateway",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.keypair",
"mode": "managed",
"type": "aws_key_pair",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_launch_configuration",
"name": "workers",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_launch_template",
"name": "workers_launch_template",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_nat_gateway",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl",
"name": "database",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl",
"name": "elasticache",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl",
"name": "intra",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl",
"name": "private",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl",
"name": "public",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl",
"name": "redshift",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl_rule",
"name": "database_inbound",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl_rule",
"name": "database_outbound",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl_rule",
"name": "elasticache_inbound",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl_rule",
"name": "elasticache_outbound",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl_rule",
"name": "intra_inbound",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl_rule",
"name": "intra_outbound",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl_rule",
"name": "private_inbound",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl_rule",
"name": "private_outbound",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl_rule",
"name": "public_inbound",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl_rule",
"name": "public_outbound",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl_rule",
"name": "redshift_inbound",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_network_acl_rule",
"name": "redshift_outbound",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_redshift_subnet_group",
"name": "redshift",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route",
"name": "database_internet_gateway",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route",
"name": "database_nat_gateway",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route",
"name": "private_nat_gateway",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route",
"name": "public_internet_gateway",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route_table",
"name": "database",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route_table",
"name": "elasticache",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route_table",
"name": "intra",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route_table",
"name": "private",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route_table",
"name": "public",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route_table",
"name": "redshift",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route_table_association",
"name": "database",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route_table_association",
"name": "elasticache",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route_table_association",
"name": "intra",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route_table_association",
"name": "private",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route_table_association",
"name": "public",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route_table_association",
"name": "redshift",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_route_table_association",
"name": "redshift_public",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.s3_bucket",
"mode": "managed",
"type": "aws_s3_bucket",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.s3_bucket",
"mode": "managed",
"type": "aws_s3_bucket_policy",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.s3_bucket",
"mode": "managed",
"type": "aws_s3_bucket_public_access_block",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group",
"name": "cluster",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group",
"name": "this_name_prefix",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group",
"name": "this_name_prefix",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group",
"name": "this_name_prefix",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group",
"name": "this_name_prefix",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group",
"name": "this_name_prefix",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group",
"name": "workers",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "cluster_egress_internet",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "cluster_https_worker_ingress",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "cluster_primary_ingress_workers",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "cluster_private_access",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_egress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "computed_ingress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "egress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_rules",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_ipv6_cidr_blocks",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.rds_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.memcached_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.faktory_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.elasticsearch_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.monitor_sg",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "ingress_with_source_security_group_id",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "workers_egress_internet",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "workers_ingress_cluster",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "workers_ingress_cluster_https",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "workers_ingress_cluster_kubelet",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "workers_ingress_cluster_primary",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "workers_ingress_self",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_subnet",
"name": "database",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_subnet",
"name": "elasticache",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_subnet",
"name": "intra",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_subnet",
"name": "private",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_subnet",
"name": "public",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_subnet",
"name": "redshift",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_dhcp_options",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_dhcp_options_association",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "apigw",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "cloudtrail",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "dynamodb",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "ec2",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "ec2messages",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "ecr_api",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "ecr_dkr",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "ecs",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "ecs_agent",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "ecs_telemetry",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "elasticloadbalancing",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "events",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "kms",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "logs",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "monitoring",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "s3",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "sns",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "sqs",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "ssm",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint",
"name": "ssmmessages",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint_route_table_association",
"name": "intra_dynamodb",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint_route_table_association",
"name": "intra_s3",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint_route_table_association",
"name": "private_dynamodb",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint_route_table_association",
"name": "private_s3",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint_route_table_association",
"name": "public_dynamodb",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_endpoint_route_table_association",
"name": "public_s3",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpc_ipv4_cidr_block_association",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpn_gateway",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpn_gateway_attachment",
"name": "this",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpn_gateway_route_propagation",
"name": "private",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.vpc",
"mode": "managed",
"type": "aws_vpn_gateway_route_propagation",
"name": "public",
"each": "list",
"provider": "provider.aws",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "kubernetes_config_map",
"name": "aws_auth",
"each": "list",
"provider": "provider.kubernetes",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "local_file",
"name": "kubeconfig",
"each": "list",
"provider": "provider.local",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "null_resource",
"name": "wait_for_cluster",
"each": "list",
"provider": "provider.null",
"instances": []
},
{
"module": "module.eks.module.node_groups",
"mode": "managed",
"type": "random_pet",
"name": "node_groups",
"each": "map",
"provider": "provider.random",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "random_pet",
"name": "workers",
"each": "list",
"provider": "provider.random",
"instances": []
},
{
"module": "module.eks",
"mode": "managed",
"type": "random_pet",
"name": "workers_launch_template",
"each": "list",
"provider": "provider.random",
"instances": []
}
]
} |
This issue is bedeviling my development efforts right now. Also curious about the apparent abandonment of this issue and lack of workarounds. Are other organizations creating EKS clusters and never destroying them, so not encountering this bug (yet)? UPDATE: This seems to be triggered when an apply or destroy action is interrupted, such as with a timeout or expiration of AWS assumed role token. |
@acutchin-bitpusher @clushie Can you please test this and let me know if it solves your issue. |
expression and coalesce() to make module more robust and also fix another failure mode of terraform-aws-modules#568
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
I have issues
Terraform destroy fails when state is empty.
I've seen other issues that refer to similar problems, like #513 and #402. But those issues are not related to the same error I'm seeing.
I'm submitting a...
What is the current behavior?
When
terraform destroy
is called on an empty state, terraform errors withError: Invalid index
.The expressions that trigger this behaviour are things like:
If this is a bug, how to reproduce? Please include a code sample if relevant.
What's the expected behavior?
Are you able to fix this problem and submit a PR? Link here if you have already.
PR #569
Environment details
master
Any other relevant info
The reason why it is important for me to have the destroy command work well on an empty state is that I'm using this module in a project that uses terragrunt to "glue together" a tree of modules. When destroying, terragrunt will want to call
terraform destroy
on all the modules it knows about. Turns out that when an attempt to destroy the entire tree of modules does not completely finish, subsequent attempts will try and destroy modules that have already been destroyed and, therefore, have empty states. At that point this issue surfaces.The text was updated successfully, but these errors were encountered: