├── aws-terraform ├── .gitignore ├── set_env_variables.sh ├── terraform │ ├── outputs.tf │ ├── variables.tf │ ├── main.tf │ └── tf-graph ├── destroy_kubeflow.sh ├── iam │ ├── IamFullAccessKubeflow.json │ ├── EksFullAccess.json │ └── IamLimitedAccess.json ├── README.md ├── get_dependencies.sh └── deploy_kubeflow.sh ├── aws-cloudshell ├── create-cluster.yaml ├── kf-install.sh ├── Permissions.md └── README.md ├── README.md └── minikube └── README.md /aws-terraform/.gitignore: -------------------------------------------------------------------------------- 1 | .terraform/ 2 | .terraform.lock.hcl 3 | terraform.tfstate 4 | terraform.tfstate.backup -------------------------------------------------------------------------------- /aws-cloudshell/create-cluster.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: eksctl.io/v1alpha5 2 | kind: ClusterConfig 3 | 4 | metadata: 5 | name: eks-kubeflow 6 | region: us-east-2 7 | 8 | nodeGroups: 9 | - name: ng 10 | desiredCapacity: 2 11 | instanceType: m5.xlarge 12 | -------------------------------------------------------------------------------- /aws-terraform/set_env_variables.sh: -------------------------------------------------------------------------------- 1 | export CONFIG_EKS_CLUSTER_NAME="kubeflow_cluster" 2 | 3 | echo "Used configuration:" 4 | echo "AWS_DEFAULT_REGION: $AWS_DEFAULT_REGION" 5 | echo "AWS_ACCESS_KEY_ID: $AWS_ACCESS_KEY_ID" 6 | echo "AWS_SECRET_ACCESS_KEY: $AWS_SECRET_ACCESS_KEY" 7 | echo "CONFIG_EKS_CLUSTER_NAME: $CONFIG_EKS_CLUSTER_NAME" -------------------------------------------------------------------------------- /aws-terraform/terraform/outputs.tf: -------------------------------------------------------------------------------- 1 | output "eks_cluster_iam_role_arn" { 2 | description = "ARN of the EKS cluster Security Group" 3 | value = module.eks.cluster_iam_role_arn 4 | } 5 | 6 | output "eks_cluster_iam_role_name" { 7 | description = "Name of the EKS cluster Security Group" 8 | value = module.eks.cluster_iam_role_name 9 | } -------------------------------------------------------------------------------- /aws-terraform/destroy_kubeflow.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | # Exit when any command fails 4 | set -e 5 | 6 | # Display commands 7 | set -x 8 | 9 | # Set environment variables 10 | source set_env_variables.sh 11 | 12 | cd terraform 13 | 14 | terraform destroy -auto-approve \ 15 | -var="aws_region=$AWS_DEFAULT_REGION" \ 16 | -var="aws_access_key=$AWS_ACCESS_KEY_ID" \ 17 | -var="aws_secret_key=$AWS_SECRET_ACCESS_KEY" \ 18 | -var="aws_cluster_name=$CONFIG_EKS_CLUSTER_NAME" 19 | 20 | cd .. -------------------------------------------------------------------------------- /aws-cloudshell/kf-install.sh: -------------------------------------------------------------------------------- 1 | export AWS_CLUSTER_NAME=eks-kubeflow 2 | export KF_NAME=\${AWS_CLUSTER_NAME} 3 | 4 | export BASE_DIR=${HOME}/environment 5 | export KF_DIR=\${BASE_DIR}/\${KF_NAME} 6 | 7 | # export CONFIG_URI="https://raw.githubusercontent.com/kubeflow/manifests/v1.2-branch/kfdef/kfctl_aws_cognito.v1.2.0.yaml" 8 | export CONFIG_URI="https://raw.githubusercontent.com/kubeflow/manifests/v1.2-branch/kfdef/kfctl_aws.v1.2.0.yaml" 9 | 10 | export CONFIG_FILE=\${KF_DIR}/kfctl_aws.yaml 11 | -------------------------------------------------------------------------------- /aws-terraform/terraform/variables.tf: -------------------------------------------------------------------------------- 1 | variable "aws_region" { 2 | type = string 3 | description = "AWS Region where resources should be created" 4 | } 5 | 6 | variable "aws_access_key" { 7 | type = string 8 | description = "AWS Access Key" 9 | } 10 | 11 | 12 | variable "aws_secret_key" { 13 | type = string 14 | description = "AWS Secret Key" 15 | } 16 | 17 | 18 | variable "aws_cluster_name" { 19 | type = string 20 | description = "Name of Amazon EKS cluster to be created" 21 | } -------------------------------------------------------------------------------- /aws-terraform/iam/IamFullAccessKubeflow.json: -------------------------------------------------------------------------------- 1 | { 2 | "Version": "2012-10-17", 3 | "Statement": [ 4 | { 5 | "Effect": "Allow", 6 | "Action": [ 7 | "iam:*" 8 | ], 9 | "Resource": [ 10 | "arn:aws:iam::YOUR_AWS_ACCOUNT_ID_GOES_HERE:role/kf-*", 11 | "arn:aws:iam::YOUR_AWS_ACCOUNT_ID_GOES_HERE:role/kubeflow*", 12 | "arn:aws:iam::YOUR_AWS_ACCOUNT_ID_GOES_HERE:policy/kubeflow*" 13 | ] 14 | } 15 | ] 16 | } -------------------------------------------------------------------------------- /aws-terraform/iam/EksFullAccess.json: -------------------------------------------------------------------------------- 1 | { 2 | "Version": "2012-10-17", 3 | "Statement": [ 4 | { 5 | "Effect": "Allow", 6 | "Action": "eks:*", 7 | "Resource": "*" 8 | }, 9 | { 10 | "Action": [ 11 | "ssm:GetParameter", 12 | "ssm:GetParameters" 13 | ], 14 | "Resource": [ 15 | "arn:aws:ssm:*:YOUR_AWS_ACCOUNT_ID_GOES_HERE:parameter/aws/*", 16 | "arn:aws:ssm:*::parameter/aws/*" 17 | ], 18 | "Effect": "Allow" 19 | }, 20 | { 21 | "Action": [ 22 | "kms:CreateGrant", 23 | "kms:DescribeKey" 24 | ], 25 | "Resource": "*", 26 | "Effect": "Allow" 27 | } 28 | ] 29 | } -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | ## Kubeflow Deploy 2 | 3 | Mentioned in [Kubeflow (is not) for Dummies](https://mtszkw.substack.com/p/kubeflow-is-not-for-dummies) blog post. 4 | 5 | _Note 02.06.2021: these are instructions for deploying Kubeflow 1.2 (still using kfctl instead of kustomize)_ 6 | 7 | ### [AWS EKS + CloudShell](aws-cloudshell/) 8 | 9 | Deploying Kubeflow using AWS CloudShell and eksctl, no need to configure aws-cli. Poor reproducibility. 10 | 11 | ### [AWS EKS + Terraform](aws-terraform/) 12 | 13 | Deploying Kubeflow using Terraform code locally. You'll need few tools e.g. kubectl, aws-iam-authenticator but the script should install these for you. All you need then is configure AWS cli and a bash console. This approach has a simple configuration i.e. AWS profile, region, cluster name and creates a cluster than can be destroyed easily with destroy_kubeflow script. 14 | 15 | ### [Minikube (WSL)](minikube/) 16 | 17 | Instructions for deploying Kubeflow 1.2 locally on WSL using minikube. Quite simple, poor reproducibility and it's local only. 18 | -------------------------------------------------------------------------------- /aws-terraform/README.md: -------------------------------------------------------------------------------- 1 | ## Kubeflow on EKS with Terraform 2 | 3 | ## Requirements 4 | - aws CLI 5 | - aws-iam-authenticator 6 | - eksctl 7 | - kubectl 8 | - Terraform 9 | 10 | If any of these tools is not available, Kubeflow Deploy will try to download and install it. 11 | 12 | ## Deploy Kubeflow 13 | 14 | To run deployment you need to provide your AWS credentials, cluster name (optional) and start the deployment: 15 | 16 | You can set these in `set_env_variables.sh` script or in any other way: 17 | 18 | ```bash 19 | AWS_DEFAULT_REGION=XXX 20 | AWS_ACCESS_KEY_ID=XXXX 21 | AWS_SECRET_ACCESS_KEY=XXX 22 | CONFIG_EKS_CLUSTER_NAME=XXX 23 | ``` 24 | 25 | **Important**: The identity you're using needs certain permissions to be able to set up the infrastructure. You can find necessary IAM policies in [iam directory](iam/), apply these to your profile (e.g. add them to DevelopersKubeflow group whcih will be attached to your profile) before starting deploy. 26 | 27 | Run the script and wait for the deployment to finish (it may take up to 10 minutes): 28 | 29 | ``` 30 | source deploy_kubeflow.sh 31 | ``` 32 | 33 | ## Destroy Kubeflow 34 | 35 | Run `destroy_kubeflow` to destroy resources created before. 36 | Make sure that parameters in `set_env_variables` are the same as they were when you executed deploy. 37 | 38 | ```bash 39 | cd aws-terraform 40 | source destroy_kubeflow.sh 41 | ``` 42 | -------------------------------------------------------------------------------- /aws-terraform/get_dependencies.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | # Exit when any command fails 4 | set -e 5 | 6 | # Display commands 7 | set -x 8 | 9 | if ! [ -x "$(command -v terraform)" ]; then 10 | echo 'Error: Terraform is not installed.' >&2 11 | sudo apt-get update && sudo apt-get install -y gnupg software-properties-common curl && \ 12 | curl -fsSL https://apt.releases.hashicorp.com/gpg | sudo apt-key add - && \ 13 | sudo apt-add-repository "deb [arch=amd64] https://apt.releases.hashicorp.com $(lsb_release -cs) main" && \ 14 | sudo apt-get update && sudo apt-get install terraform 15 | # exit 1 16 | fi 17 | 18 | if ! [ -x "$(command -v aws)" ]; then 19 | echo 'Error: aws is not installed.' >&2 20 | exit 1 21 | fi 22 | 23 | if ! [ -x "$(command -v aws-iam-authenticator)" ]; then 24 | echo 'Error: aws-iam-authenticator is not installed.' >&2 25 | curl -o aws-iam-authenticator https://amazon-eks.s3.us-west-2.amazonaws.com/1.15.10/2020-02-22/bin/linux/amd64/aws-iam-authenticator && \ 26 | chmod +x aws-iam-authenticator && \ 27 | sudo mv aws-iam-authenticator /usr/local/bin 28 | # exit 1 29 | fi 30 | 31 | if ! [ -x "$(command -v kubectl)" ]; then 32 | echo 'Error: kubectl is not installed.' >&2 33 | curl -LO "https://dl.k8s.io/release/$(curl -L -s https://dl.k8s.io/release/stable.txt)/bin/linux/amd64/kubectl" && \ 34 | sudo install -o root -g root -m 0755 kubectl /usr/local/bin/kubectl && \ 35 | kubectl version --client 36 | # exit 1 37 | fi 38 | 39 | if ! [ -x "$(command -v eksctl)" ]; then 40 | echo 'Error: eksctl is not installed.' >&2 41 | curl --silent --location "https://github.com/weaveworks/eksctl/releases/latest/download/eksctl_$(uname -s)_amd64.tar.gz" | tar xz -C /tmp && \ 42 | sudo mv -v /tmp/eksctl /usr/local/bin 43 | # exit 1 44 | fi 45 | 46 | if ! [ -x "$(command -v kfctl)" ]; then 47 | echo 'Error: kfctl is not installed.' >&2 48 | curl --silent --location "https://github.com/kubeflow/kfctl/releases/download/v1.2.0/kfctl_v1.2.0-0-gbc038f9_linux.tar.gz" | tar xz -C . 49 | sudo mv -v kfctl /usr/local/bin 50 | # exit 1 51 | fi -------------------------------------------------------------------------------- /aws-terraform/deploy_kubeflow.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | # Exit when any command fails 4 | set -e 5 | 6 | # Display commands 7 | set -x 8 | 9 | # Set environment variables 10 | source set_env_variables.sh 11 | 12 | # Install and check dependencies 13 | source get_dependencies.sh 14 | 15 | # Setup infrastructure 16 | cd terraform && \ 17 | terraform init && \ 18 | terraform validate && \ 19 | terraform apply -auto-approve \ 20 | -var="aws_region=$AWS_DEFAULT_REGION" \ 21 | -var="aws_access_key=$AWS_ACCESS_KEY_ID" \ 22 | -var="aws_secret_key=$AWS_SECRET_ACCESS_KEY" \ 23 | -var="aws_cluster_name=$CONFIG_EKS_CLUSTER_NAME" 24 | 25 | TERRAFORM_EKS_CLUSTER_IAM_ROLE_NAME=$(terraform output -raw eks_cluster_iam_role_name) 26 | 27 | cd .. 28 | 29 | export KUBECONFIG="$PWD/terraform/kubeconfig_$CONFIG_EKS_CLUSTER_NAME" 30 | echo "KUBECONFIG=$KUBECONFIG" 31 | kubectl get nodes --all-namespaces 32 | 33 | # Prepare for Kubeflow deployment 34 | export KUBEFLOW_DIR="$PWD/$CONFIG_EKS_CLUSTER_NAME" 35 | export CONFIG_URI="https://raw.githubusercontent.com/kubeflow/manifests/v1.2-branch/kfdef/kfctl_aws.v1.2.0.yaml" 36 | export CONFIG_FILE="$KUBEFLOW_DIR/kfctl_aws.yaml" 37 | 38 | # Go to working directory and download kfctl_aws.yaml 39 | mkdir -p $KUBEFLOW_DIR && cd $KUBEFLOW_DIR 40 | wget -O $CONFIG_FILE $CONFIG_URI 41 | 42 | # Replace region in kfctl_aws.yaml 43 | sed -i -e "s/us-west-2/$AWS_DEFAULT_REGION/g" $CONFIG_FILE 44 | sed -i -e "s/#roles/roles/g" $CONFIG_FILE 45 | sed -i -e "s/#- eksctl-kubeflow-aws-nodegroup-ng-a2-NodeInstanceRole-xxxxxxx/- $TERRAFORM_EKS_CLUSTER_IAM_ROLE_NAME/g" $CONFIG_FILE 46 | sed -i -e "s/enablePodIamPolicy: true/enablePodIamPolicy: false/g" $CONFIG_FILE 47 | tail -15 $CONFIG_FILE 48 | 49 | # Pray 50 | kfctl apply -V -f $CONFIG_FILE 51 | echo "Waiting for all services to be ready (2 min)" && sleep 2m 52 | 53 | kubectl get service istio-ingressgateway -n istio-system 54 | # If you want to use LoadBalancer instead of NodePort 55 | # kubectl patch svc istio-ingressgateway -p '{"spec": {"type": "LoadBalancer"}}' -n istio-system 56 | kubectl port-forward svc/istio-ingressgateway -n istio-system 8080:80 57 | -------------------------------------------------------------------------------- /minikube/README.md: -------------------------------------------------------------------------------- 1 | Following tutorial is based on official [Kubeflow Deployment with kfctl_k8s_istio](https://www.kubeflow.org/docs/started/k8s/kfctl-k8s-istio/) guide, but in case that site modified in future, I'm writing down the instructions that worked out for me. 2 | 3 | 4 | ### Prerequisites (aka My local setup) 5 | - WSL 2 on Windows 10 6 | - Docker Desktop using WSL 2 7 | - `minikube` installed on WSL (my version: v1.18.1) 8 | 9 | ### Creating environment 10 | 11 | After starting minikube single-node cluster (`minikube start`), create the directory for Kubeflow environment and download Kubeflow: 12 | 13 | ```bash 14 | mkdir kubeflow-local 15 | cd kubeflow-local 16 | ``` 17 | 18 | ```bash 19 | curl -L -o kfctl_v1.2.0-0_linux.tar.gz https://github.com/kubeflow/kfctl/releases/download/v1.2.0/kfctl_v1.2.0-0-gbc038f9_linux.tar.gz 20 | tar -xvf kfctl_v1.2.0-0_linux.tar.gz 21 | ``` 22 | 23 | After downloading and unpacking kfctl, make sure it works: 24 | 25 | ```bash 26 | kfctl version 27 | ``` 28 | 29 | then create a directory for Kubeflow deployment and run kfctl apply using config file from Kubeflow manifests repo: 30 | ```bash 31 | mkdir kf-local 32 | cd kf-local 33 | ../kfctl apply -V -f https://raw.githubusercontent.com/kubeflow/manifests/v1.2-branch/kfdef/kfctl_k8s_istio.v1.2.0.yaml 34 | ``` 35 | 36 | Now it takes a couple of minutes to download and deploy all of Kubeflow internals. You may see several errors, but Kubeflow should get pass them eventually (after few retries). If after few minutes you see your prompt back and there are no errors at the end of the log, it should be fine. 37 | 38 | ### Accessing Kubeflow dashboard 39 | 40 | As stated in Kubeflow docs: _After Kubeflow is deployed, the Kubeflow Dashboard can be accessed via istio-ingressgateway service. If loadbalancer is not available in your environment, NodePort or Port forwarding can be used to access the Kubeflow Dashboard._ So let's check if istio-ingressgateway service is up and running: 41 | 42 | ```bash 43 | kubectl get svc istio-ingressgateway -n istio-system 44 | ``` 45 | 46 | Finally, let's follow the documentation and use port-forwarding to expose Kubeflow Dashboard. 47 | 48 | ```bash 49 | kubectl port-forward svc/istio-ingressgateway -n istio-system 8080:80 50 | ``` 51 | 52 | After that, the dashboard should be accessible at http://127.0.0.1:8080 53 | -------------------------------------------------------------------------------- /aws-terraform/terraform/main.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_providers { 3 | aws = { 4 | source = "hashicorp/aws" 5 | version = "~> 3.27" 6 | } 7 | } 8 | 9 | required_version = ">= 0.14.9" 10 | } 11 | 12 | provider "aws" { 13 | region = var.aws_region 14 | access_key = var.aws_access_key 15 | secret_key = var.aws_secret_key 16 | } 17 | 18 | data "aws_caller_identity" "current" {} 19 | 20 | locals { 21 | cluster_name = var.aws_cluster_name 22 | account_id = data.aws_caller_identity.current.account_id 23 | } 24 | 25 | data "aws_eks_cluster" "cluster" { 26 | name = module.eks.cluster_id 27 | } 28 | 29 | data "aws_eks_cluster_auth" "cluster" { 30 | name = module.eks.cluster_id 31 | } 32 | 33 | provider "kubernetes" { 34 | host = data.aws_eks_cluster.cluster.endpoint 35 | cluster_ca_certificate = base64decode(data.aws_eks_cluster.cluster.certificate_authority.0.data) 36 | token = data.aws_eks_cluster_auth.cluster.token 37 | load_config_file = false 38 | version = "~> 1.11" 39 | } 40 | 41 | data "aws_availability_zones" "available" { 42 | } 43 | 44 | # VPC 45 | module "vpc" { 46 | source = "terraform-aws-modules/vpc/aws" 47 | version = "3.0.0" 48 | 49 | name = "k8s-vpc" 50 | cidr = "172.16.0.0/16" 51 | azs = data.aws_availability_zones.available.names 52 | private_subnets = ["172.16.1.0/24", "172.16.2.0/24", "172.16.3.0/24"] 53 | public_subnets = ["172.16.4.0/24", "172.16.5.0/24", "172.16.6.0/24"] 54 | enable_nat_gateway = true 55 | single_nat_gateway = true 56 | enable_dns_hostnames = true 57 | 58 | public_subnet_tags = { 59 | "kubernetes.io/cluster/${local.cluster_name}" = "shared" 60 | "kubernetes.io/role/elb" = "1" 61 | } 62 | 63 | private_subnet_tags = { 64 | "kubernetes.io/cluster/${local.cluster_name}" = "shared" 65 | "kubernetes.io/role/internal-elb" = "1" 66 | } 67 | } 68 | 69 | module "eks" { 70 | source = "terraform-aws-modules/eks/aws" 71 | version = "15.1.0" 72 | 73 | cluster_name = "${local.cluster_name}" 74 | cluster_version = "1.18" 75 | subnets = module.vpc.private_subnets 76 | 77 | vpc_id = module.vpc.vpc_id 78 | 79 | node_groups = { 80 | first = { 81 | desired_capacity = 2 82 | max_capacity = 2 83 | min_capacity = 1 84 | 85 | instance_types = ["m5.xlarge", "m5.xlarge"] 86 | } 87 | } 88 | 89 | write_kubeconfig = true 90 | config_output_path = "./" 91 | } 92 | -------------------------------------------------------------------------------- /aws-terraform/iam/IamLimitedAccess.json: -------------------------------------------------------------------------------- 1 | { 2 | "Version": "2012-10-17", 3 | "Statement": [ 4 | { 5 | "Effect": "Allow", 6 | "Action": [ 7 | "iam:CreateInstanceProfile", 8 | "iam:DeleteInstanceProfile", 9 | "iam:GetInstanceProfile", 10 | "iam:RemoveRoleFromInstanceProfile", 11 | "iam:GetRole", 12 | "iam:CreateRole", 13 | "iam:DeleteRole", 14 | "iam:AttachRolePolicy", 15 | "iam:PutRolePolicy", 16 | "iam:ListInstanceProfiles", 17 | "iam:AddRoleToInstanceProfile", 18 | "iam:ListInstanceProfilesForRole", 19 | "iam:PassRole", 20 | "iam:DetachRolePolicy", 21 | "iam:DeleteRolePolicy", 22 | "iam:GetRolePolicy", 23 | "iam:GetOpenIDConnectProvider", 24 | "iam:CreateOpenIDConnectProvider", 25 | "iam:DeleteOpenIDConnectProvider", 26 | "iam:ListAttachedRolePolicies", 27 | "iam:TagRole" 28 | ], 29 | "Resource": [ 30 | "arn:aws:iam::YOUR_AWS_ACCOUNT_ID_GOES_HERE:instance-profile/eksctl-*", 31 | "arn:aws:iam::YOUR_AWS_ACCOUNT_ID_GOES_HERE:role/eksctl-*", 32 | "arn:aws:iam::YOUR_AWS_ACCOUNT_ID_GOES_HERE:oidc-provider/*", 33 | "arn:aws:iam::YOUR_AWS_ACCOUNT_ID_GOES_HERE:role/aws-service-role/eks-nodegroup.amazonaws.com/AWSServiceRoleForAmazonEKSNodegroup", 34 | "arn:aws:iam::YOUR_AWS_ACCOUNT_ID_GOES_HERE:role/eksctl-managed-*" 35 | ] 36 | }, 37 | { 38 | "Effect": "Allow", 39 | "Action": [ 40 | "iam:GetRole" 41 | ], 42 | "Resource": [ 43 | "arn:aws:iam::YOUR_AWS_ACCOUNT_ID_GOES_HERE:role/*" 44 | ] 45 | }, 46 | { 47 | "Effect": "Allow", 48 | "Action": [ 49 | "iam:GetGroup" 50 | ], 51 | "Resource": [ 52 | "arn:aws:iam::YOUR_AWS_ACCOUNT_ID_GOES_HERE:group/*" 53 | ] 54 | }, 55 | { 56 | "Effect": "Allow", 57 | "Action": [ 58 | "iam:CreateServiceLinkedRole" 59 | ], 60 | "Resource": "*", 61 | "Condition": { 62 | "StringEquals": { 63 | "iam:AWSServiceName": [ 64 | "eks.amazonaws.com", 65 | "eks-nodegroup.amazonaws.com", 66 | "eks-fargate.amazonaws.com" 67 | ] 68 | } 69 | } 70 | } 71 | ] 72 | } -------------------------------------------------------------------------------- /aws-cloudshell/Permissions.md: -------------------------------------------------------------------------------- 1 | # Permissions 2 | 3 | Whole EKS Kubeflow task has been finished by a user with following policies: 4 | 5 | ### AWS Managed 6 | * AmazonEC2FullAccess, 7 | * AWSCloudFormationFullAccess, 8 | * AWSCloudShellFullAccess - if you use Cloud Shell for executing CLI commands. 9 | 10 | ### User-defined 11 | 12 | * EksAllAccess (see [Minimum IAM policy for eksctl](https://eksctl.io/usage/minimum-iam-policies/)) 13 | 14 | ```json 15 | { 16 | "Version": "2012-10-17", 17 | "Statement": [ 18 | { 19 | "Effect": "Allow", 20 | "Action": "eks:*", 21 | "Resource": "*" 22 | }, 23 | { 24 | "Action": [ 25 | "ssm:GetParameter", 26 | "ssm:GetParameters" 27 | ], 28 | "Resource": [ 29 | "arn:aws:ssm:*::parameter/aws/*", 30 | "arn:aws:ssm:*::parameter/aws/*" 31 | ], 32 | "Effect": "Allow" 33 | }, 34 | { 35 | "Action": [ 36 | "kms:CreateGrant", 37 | "kms:DescribeKey" 38 | ], 39 | "Resource": "*", 40 | "Effect": "Allow" 41 | } 42 | ] 43 | } 44 | ``` 45 | 46 | * IamLimitedAccess (see [Minimum IAM policy for eksctl](https://eksctl.io/usage/minimum-iam-policies/)) 47 | 48 | ```json 49 | { 50 | "Version": "2012-10-17", 51 | "Statement": [ 52 | { 53 | "Effect": "Allow", 54 | "Action": [ 55 | "iam:CreateInstanceProfile", 56 | "iam:DeleteInstanceProfile", 57 | "iam:GetInstanceProfile", 58 | "iam:RemoveRoleFromInstanceProfile", 59 | "iam:GetRole", 60 | "iam:CreateRole", 61 | "iam:DeleteRole", 62 | "iam:AttachRolePolicy", 63 | "iam:PutRolePolicy", 64 | "iam:ListInstanceProfiles", 65 | "iam:AddRoleToInstanceProfile", 66 | "iam:ListInstanceProfilesForRole", 67 | "iam:PassRole", 68 | "iam:DetachRolePolicy", 69 | "iam:DeleteRolePolicy", 70 | "iam:GetRolePolicy", 71 | "iam:GetOpenIDConnectProvider", 72 | "iam:CreateOpenIDConnectProvider", 73 | "iam:DeleteOpenIDConnectProvider", 74 | "iam:ListAttachedRolePolicies", 75 | "iam:TagRole" 76 | ], 77 | "Resource": [ 78 | "arn:aws:iam:::instance-profile/eksctl-*", 79 | "arn:aws:iam:::role/eksctl-*", 80 | "arn:aws:iam:::oidc-provider/*", 81 | "arn:aws:iam:::role/aws-service-role/eks-nodegroup.amazonaws.com/AWSServiceRoleForAmazonEKSNodegroup", 82 | "arn:aws:iam:::role/eksctl-managed-*" 83 | ] 84 | }, 85 | { 86 | "Effect": "Allow", 87 | "Action": [ 88 | "iam:GetRole" 89 | ], 90 | "Resource": [ 91 | "arn:aws:iam:::role/*" 92 | ] 93 | }, 94 | { 95 | "Effect": "Allow", 96 | "Action": [ 97 | "iam:CreateServiceLinkedRole" 98 | ], 99 | "Resource": "*", 100 | "Condition": { 101 | "StringEquals": { 102 | "iam:AWSServiceName": [ 103 | "eks.amazonaws.com", 104 | "eks-nodegroup.amazonaws.com", 105 | "eks-fargate.amazonaws.com" 106 | ] 107 | } 108 | } 109 | } 110 | ] 111 | } 112 | ``` 113 | 114 | * IamFullAccessKubeflow - to be able to deploy KubeFlow 115 | 116 | ```json 117 | { 118 | "Version": "2012-10-17", 119 | "Statement": [ 120 | { 121 | "Effect": "Allow", 122 | "Action": [ 123 | "iam:*" 124 | ], 125 | "Resource": [ 126 | "arn:aws:iam:::role/kf-*" 127 | ] 128 | } 129 | ] 130 | } 131 | ``` 132 | -------------------------------------------------------------------------------- /aws-cloudshell/README.md: -------------------------------------------------------------------------------- 1 |

2 | 3 |

4 | 5 | # Kubeflow on Amazon EKS 6 | Instructions for deploying [Kubeflow](https://www.kubeflow.org/) on [Amazon EKS](https://aws.amazon.com/eks/) 7 | 8 | ### Prerequisites 9 | 10 | * Well, an AWS Account 11 | * Permissions (check [Permissions.md](Permissions.md) file for detailed description of policies used for this task) 12 | 13 | ### CreatingCloudShell environment 14 | 15 | In the very first step install kubectl and eksctl to be able to configure K8s and EKS cluster. 16 | I used CloudShell to execute CLI commands, but you're welcome to use local AWS CLI, Cloud9 IDE or whatnot. 17 | 18 | ```bash 19 | sudo curl --silent --location -o /usr/local/bin/kubectl https://amazon-eks.s3.us-west-2.amazonaws.com/1.17.11/2020-09-18/bin/linux/amd64/kubectl 20 | 21 | sudo chmod +x /usr/local/bin/kubectl 22 | 23 | curl --silent --location "https://github.com/weaveworks/eksctl/releases/latest/download/eksctl_$(uname -s)_amd64.tar.gz" | tar xz -C /tmp 24 | 25 | sudo mv -v /tmp/eksctl /usr/local/bin 26 | ``` 27 | 28 | ### Creating EKS Cluster 29 | 30 | As soon as eksctl is installed, you can create new EKS cluster. Two m5.xlarge instances were enough for me. 31 | 32 | ```bash 33 | cat << EoF > create-cluster.yaml 34 | apiVersion: eksctl.io/v1alpha5 35 | kind: ClusterConfig 36 | 37 | metadata: 38 | name: eks-kubeflow 39 | region: us-east-2 40 | 41 | nodeGroups: 42 | - name: ng 43 | desiredCapacity: 2 44 | instanceType: m5.xlarge 45 | EoF 46 | 47 | ``` 48 | 49 | ```bash 50 | eksctl create cluster -f create-cluster.yaml 51 | ``` 52 | 53 | If there were no errors when creating cluster, you should be able to see it now: 54 | 55 | ```bash 56 | eksctl get cluster 57 | ``` 58 | 59 | Along with two instances created in eks-kubeflow node group: 60 | 61 | ``` 62 | eksctl get nodegroup --cluster eks-kubeflow 63 | ``` 64 | 65 | After that, I couldn't see nodes when using `kubectl get nodes` so I had to update my kubeconfig first: 66 | 67 | ```bash 68 | aws eks --region us-east-2 update-kubeconfig --name eks-kubeflow 69 | ``` 70 | 71 | Done. Cluster and nodes should be up and running. Time for the next step. 72 | 73 | ### Install Kubeflow on Amazon EKS 74 | 75 | Check for [latest releases](https://github.com/kubeflow/kfctl/releases) or stay with the version below (1.2.0). 76 | 77 | ```bash 78 | curl --silent --location "https://github.com/kubeflow/kfctl/releases/download/v1.2.0/kfctl_v1.2.0-0-gbc038f9_linux.tar.gz" | tar xz -C /tmp 79 | sudo mv -v /tmp/kfctl /usr/local/bin 80 | ``` 81 | 82 | ### Set up Kubeflow configuration 83 | 84 | ```bash 85 | cat << EoF > kf-install.sh 86 | export AWS_CLUSTER_NAME=eks-kubeflow 87 | export KF_NAME=\${AWS_CLUSTER_NAME} 88 | 89 | export BASE_DIR=${HOME}/environment 90 | export KF_DIR=\${BASE_DIR}/\${KF_NAME} 91 | 92 | # export CONFIG_URI="https://raw.githubusercontent.com/kubeflow/manifests/v1.2-branch/kfdef/kfctl_aws_cognito.v1.2.0.yaml" 93 | export CONFIG_URI="https://raw.githubusercontent.com/kubeflow/manifests/v1.2-branch/kfdef/kfctl_aws.v1.2.0.yaml" 94 | 95 | export CONFIG_FILE=\${KF_DIR}/kfctl_aws.yaml 96 | EoF 97 | 98 | source kf-install.sh 99 | mkdir -p ${KF_DIR} && cd ${KF_DIR} 100 | ``` 101 | 102 | ```bash 103 | wget -O kfctl_aws.yaml $CONFIG_URI 104 | ``` 105 | 106 | Now you can adapt _kfctl_aws.yaml_ file to your needs, in section: 107 | 108 | spec: 109 | auth: 110 | basicAuth: 111 | password: 12341234 112 | username: admin@kubeflow.org 113 | region: us-west-2 114 | enablePodIamPolicy: true 115 | # If you don't use IAM Role for Service Account, you can still use node instance roles. 116 | #roles: 117 | #- eksctl-kubeflow-aws-nodegroup-ng-a2-NodeInstanceRole-xxxxxxx 118 | 119 | **Important**: Here you should region (us-east-2 is used in this README) and cluster name (by default its kubeflow-aws, see role name). In addition to that, you should decide whether you want to rely on IAM policy (enablePodIamPolicy: true) or node instance roles. Roles can be commented out if you want to use IAM only. 120 | 121 | ### Install AWS IAM Authenticator 122 | 123 | ```bash 124 | curl -o aws-iam-authenticator https://amazon-eks.s3.us-west-2.amazonaws.com/1.15.10/2020-02-22/bin/linux/amd64/aws-iam-authenticator 125 | chmod +x aws-iam-authenticator 126 | sudo mv aws-iam-authenticator /usr/local/bin 127 | ``` 128 | 129 | ### Deploy Kubeflow 130 | 131 | ```bash 132 | cd ${KF_DIR} && kfctl apply -V -f ${CONFIG_FILE} 133 | ``` 134 | 135 | Run this to check the status (you'll need to wait a minute or two for all services to be running): 136 | 137 | ```bash 138 | kubectl -n kubeflow get all 139 | ``` 140 | 141 | ### Accessing Kubeflow Dashboard using external IP 142 | 143 | When all services are up and running, you should also be able to see istio-ingressgateway: 144 | ```bash 145 | kubectl get service istio-ingressgateway -n istio-system 146 | ``` 147 | 148 | If service type is set to NodePort, edit its specification and replace NodePort with LoadBalancer if you want to access it from the outside of cluster (any web browser). After saving changes, istio-ingressgateway should have an external IP to be used to access it from the outside. Finally, use port-forwarding to expose Kubeflow Dashboard. Once again you'll need to wait a minute before you can access it. 149 | 150 | ```bash 151 | kubectl port-forward svc/istio-ingressgateway -n istio-system 8080:80 152 | ``` 153 | -------------------------------------------------------------------------------- /aws-terraform/terraform/tf-graph: -------------------------------------------------------------------------------- 1 | digraph { 2 | compound = "true" 3 | newrank = "true" 4 | subgraph "root" { 5 | "[root] aws_iam_group.group_KubeflowDevelopers (expand)" [label = "aws_iam_group.group_KubeflowDevelopers", shape = "box"] 6 | "[root] aws_iam_group_policy_attachment.attach_EksAllAccess_to_group (expand)" [label = "aws_iam_group_policy_attachment.attach_EksAllAccess_to_group", shape = "box"] 7 | "[root] aws_iam_group_policy_attachment.attach_IamFullKF_to_group (expand)" [label = "aws_iam_group_policy_attachment.attach_IamFullKF_to_group", shape = "box"] 8 | "[root] aws_iam_group_policy_attachment.attach_IamLimited_to_group (expand)" [label = "aws_iam_group_policy_attachment.attach_IamLimited_to_group", shape = "box"] 9 | "[root] aws_iam_policy.policy_EksAllAccess (expand)" [label = "aws_iam_policy.policy_EksAllAccess", shape = "box"] 10 | "[root] aws_iam_policy.policy_IamFullAccessKubeflow (expand)" [label = "aws_iam_policy.policy_IamFullAccessKubeflow", shape = "box"] 11 | "[root] aws_iam_policy.policy_IamLimitedAccess (expand)" [label = "aws_iam_policy.policy_IamLimitedAccess", shape = "box"] 12 | "[root] data.aws_availability_zones.available (expand)" [label = "data.aws_availability_zones.available", shape = "box"] 13 | "[root] data.aws_caller_identity.current (expand)" [label = "data.aws_caller_identity.current", shape = "box"] 14 | "[root] data.aws_eks_cluster.cluster (expand)" [label = "data.aws_eks_cluster.cluster", shape = "box"] 15 | "[root] data.aws_eks_cluster_auth.cluster (expand)" [label = "data.aws_eks_cluster_auth.cluster", shape = "box"] 16 | "[root] module.eks.aws_autoscaling_group.workers (expand)" [label = "module.eks.aws_autoscaling_group.workers", shape = "box"] 17 | "[root] module.eks.aws_autoscaling_group.workers_launch_template (expand)" [label = "module.eks.aws_autoscaling_group.workers_launch_template", shape = "box"] 18 | "[root] module.eks.aws_cloudwatch_log_group.this (expand)" [label = "module.eks.aws_cloudwatch_log_group.this", shape = "box"] 19 | "[root] module.eks.aws_eks_cluster.this (expand)" [label = "module.eks.aws_eks_cluster.this", shape = "box"] 20 | "[root] module.eks.aws_iam_instance_profile.workers (expand)" [label = "module.eks.aws_iam_instance_profile.workers", shape = "box"] 21 | "[root] module.eks.aws_iam_instance_profile.workers_launch_template (expand)" [label = "module.eks.aws_iam_instance_profile.workers_launch_template", shape = "box"] 22 | "[root] module.eks.aws_iam_openid_connect_provider.oidc_provider (expand)" [label = "module.eks.aws_iam_openid_connect_provider.oidc_provider", shape = "box"] 23 | "[root] module.eks.aws_iam_policy.cluster_elb_sl_role_creation (expand)" [label = "module.eks.aws_iam_policy.cluster_elb_sl_role_creation", shape = "box"] 24 | "[root] module.eks.aws_iam_role.cluster (expand)" [label = "module.eks.aws_iam_role.cluster", shape = "box"] 25 | "[root] module.eks.aws_iam_role.workers (expand)" [label = "module.eks.aws_iam_role.workers", shape = "box"] 26 | "[root] module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSClusterPolicy (expand)" [label = "module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSClusterPolicy", shape = "box"] 27 | "[root] module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSServicePolicy (expand)" [label = "module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSServicePolicy", shape = "box"] 28 | "[root] module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSVPCResourceControllerPolicy (expand)" [label = "module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSVPCResourceControllerPolicy", shape = "box"] 29 | "[root] module.eks.aws_iam_role_policy_attachment.cluster_elb_sl_role_creation (expand)" [label = "module.eks.aws_iam_role_policy_attachment.cluster_elb_sl_role_creation", shape = "box"] 30 | "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEC2ContainerRegistryReadOnly (expand)" [label = "module.eks.aws_iam_role_policy_attachment.workers_AmazonEC2ContainerRegistryReadOnly", shape = "box"] 31 | "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEKSWorkerNodePolicy (expand)" [label = "module.eks.aws_iam_role_policy_attachment.workers_AmazonEKSWorkerNodePolicy", shape = "box"] 32 | "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEKS_CNI_Policy (expand)" [label = "module.eks.aws_iam_role_policy_attachment.workers_AmazonEKS_CNI_Policy", shape = "box"] 33 | "[root] module.eks.aws_iam_role_policy_attachment.workers_additional_policies (expand)" [label = "module.eks.aws_iam_role_policy_attachment.workers_additional_policies", shape = "box"] 34 | "[root] module.eks.aws_launch_configuration.workers (expand)" [label = "module.eks.aws_launch_configuration.workers", shape = "box"] 35 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" [label = "module.eks.aws_launch_template.workers_launch_template", shape = "box"] 36 | "[root] module.eks.aws_security_group.cluster (expand)" [label = "module.eks.aws_security_group.cluster", shape = "box"] 37 | "[root] module.eks.aws_security_group.workers (expand)" [label = "module.eks.aws_security_group.workers", shape = "box"] 38 | "[root] module.eks.aws_security_group_rule.cluster_egress_internet (expand)" [label = "module.eks.aws_security_group_rule.cluster_egress_internet", shape = "box"] 39 | "[root] module.eks.aws_security_group_rule.cluster_https_worker_ingress (expand)" [label = "module.eks.aws_security_group_rule.cluster_https_worker_ingress", shape = "box"] 40 | "[root] module.eks.aws_security_group_rule.cluster_primary_ingress_workers (expand)" [label = "module.eks.aws_security_group_rule.cluster_primary_ingress_workers", shape = "box"] 41 | "[root] module.eks.aws_security_group_rule.cluster_private_access (expand)" [label = "module.eks.aws_security_group_rule.cluster_private_access", shape = "box"] 42 | "[root] module.eks.aws_security_group_rule.workers_egress_internet (expand)" [label = "module.eks.aws_security_group_rule.workers_egress_internet", shape = "box"] 43 | "[root] module.eks.aws_security_group_rule.workers_ingress_cluster (expand)" [label = "module.eks.aws_security_group_rule.workers_ingress_cluster", shape = "box"] 44 | "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_https (expand)" [label = "module.eks.aws_security_group_rule.workers_ingress_cluster_https", shape = "box"] 45 | "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_kubelet (expand)" [label = "module.eks.aws_security_group_rule.workers_ingress_cluster_kubelet", shape = "box"] 46 | "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_primary (expand)" [label = "module.eks.aws_security_group_rule.workers_ingress_cluster_primary", shape = "box"] 47 | "[root] module.eks.aws_security_group_rule.workers_ingress_self (expand)" [label = "module.eks.aws_security_group_rule.workers_ingress_self", shape = "box"] 48 | "[root] module.eks.data.aws_ami.eks_worker (expand)" [label = "module.eks.data.aws_ami.eks_worker", shape = "box"] 49 | "[root] module.eks.data.aws_ami.eks_worker_windows (expand)" [label = "module.eks.data.aws_ami.eks_worker_windows", shape = "box"] 50 | "[root] module.eks.data.aws_caller_identity.current (expand)" [label = "module.eks.data.aws_caller_identity.current", shape = "box"] 51 | "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_iam_instance_profile (expand)" [label = "module.eks.data.aws_iam_instance_profile.custom_worker_group_iam_instance_profile", shape = "box"] 52 | "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_launch_template_iam_instance_profile (expand)" [label = "module.eks.data.aws_iam_instance_profile.custom_worker_group_launch_template_iam_instance_profile", shape = "box"] 53 | "[root] module.eks.data.aws_iam_policy_document.cluster_assume_role_policy (expand)" [label = "module.eks.data.aws_iam_policy_document.cluster_assume_role_policy", shape = "box"] 54 | "[root] module.eks.data.aws_iam_policy_document.cluster_elb_sl_role_creation (expand)" [label = "module.eks.data.aws_iam_policy_document.cluster_elb_sl_role_creation", shape = "box"] 55 | "[root] module.eks.data.aws_iam_policy_document.workers_assume_role_policy (expand)" [label = "module.eks.data.aws_iam_policy_document.workers_assume_role_policy", shape = "box"] 56 | "[root] module.eks.data.aws_iam_role.custom_cluster_iam_role (expand)" [label = "module.eks.data.aws_iam_role.custom_cluster_iam_role", shape = "box"] 57 | "[root] module.eks.data.aws_partition.current (expand)" [label = "module.eks.data.aws_partition.current", shape = "box"] 58 | "[root] module.eks.data.template_file.launch_template_userdata (expand)" [label = "module.eks.data.template_file.launch_template_userdata", shape = "box"] 59 | "[root] module.eks.data.template_file.userdata (expand)" [label = "module.eks.data.template_file.userdata", shape = "box"] 60 | "[root] module.eks.kubernetes_config_map.aws_auth (expand)" [label = "module.eks.kubernetes_config_map.aws_auth", shape = "box"] 61 | "[root] module.eks.local_file.kubeconfig (expand)" [label = "module.eks.local_file.kubeconfig", shape = "box"] 62 | "[root] module.eks.module.fargate.aws_eks_fargate_profile.this (expand)" [label = "module.eks.module.fargate.aws_eks_fargate_profile.this", shape = "box"] 63 | "[root] module.eks.module.fargate.aws_iam_role.eks_fargate_pod (expand)" [label = "module.eks.module.fargate.aws_iam_role.eks_fargate_pod", shape = "box"] 64 | "[root] module.eks.module.fargate.aws_iam_role_policy_attachment.eks_fargate_pod (expand)" [label = "module.eks.module.fargate.aws_iam_role_policy_attachment.eks_fargate_pod", shape = "box"] 65 | "[root] module.eks.module.fargate.data.aws_iam_policy_document.eks_fargate_pod_assume_role (expand)" [label = "module.eks.module.fargate.data.aws_iam_policy_document.eks_fargate_pod_assume_role", shape = "box"] 66 | "[root] module.eks.module.fargate.data.aws_iam_role.custom_fargate_iam_role (expand)" [label = "module.eks.module.fargate.data.aws_iam_role.custom_fargate_iam_role", shape = "box"] 67 | "[root] module.eks.module.node_groups.aws_eks_node_group.workers (expand)" [label = "module.eks.module.node_groups.aws_eks_node_group.workers", shape = "box"] 68 | "[root] module.eks.module.node_groups.random_pet.node_groups (expand)" [label = "module.eks.module.node_groups.random_pet.node_groups", shape = "box"] 69 | "[root] module.eks.null_resource.wait_for_cluster (expand)" [label = "module.eks.null_resource.wait_for_cluster", shape = "box"] 70 | "[root] module.eks.random_pet.workers (expand)" [label = "module.eks.random_pet.workers", shape = "box"] 71 | "[root] module.eks.random_pet.workers_launch_template (expand)" [label = "module.eks.random_pet.workers_launch_template", shape = "box"] 72 | "[root] module.vpc.aws_cloudwatch_log_group.flow_log (expand)" [label = "module.vpc.aws_cloudwatch_log_group.flow_log", shape = "box"] 73 | "[root] module.vpc.aws_customer_gateway.this (expand)" [label = "module.vpc.aws_customer_gateway.this", shape = "box"] 74 | "[root] module.vpc.aws_db_subnet_group.database (expand)" [label = "module.vpc.aws_db_subnet_group.database", shape = "box"] 75 | "[root] module.vpc.aws_default_network_acl.this (expand)" [label = "module.vpc.aws_default_network_acl.this", shape = "box"] 76 | "[root] module.vpc.aws_default_route_table.default (expand)" [label = "module.vpc.aws_default_route_table.default", shape = "box"] 77 | "[root] module.vpc.aws_default_security_group.this (expand)" [label = "module.vpc.aws_default_security_group.this", shape = "box"] 78 | "[root] module.vpc.aws_default_vpc.this (expand)" [label = "module.vpc.aws_default_vpc.this", shape = "box"] 79 | "[root] module.vpc.aws_egress_only_internet_gateway.this (expand)" [label = "module.vpc.aws_egress_only_internet_gateway.this", shape = "box"] 80 | "[root] module.vpc.aws_eip.nat (expand)" [label = "module.vpc.aws_eip.nat", shape = "box"] 81 | "[root] module.vpc.aws_elasticache_subnet_group.elasticache (expand)" [label = "module.vpc.aws_elasticache_subnet_group.elasticache", shape = "box"] 82 | "[root] module.vpc.aws_flow_log.this (expand)" [label = "module.vpc.aws_flow_log.this", shape = "box"] 83 | "[root] module.vpc.aws_iam_policy.vpc_flow_log_cloudwatch (expand)" [label = "module.vpc.aws_iam_policy.vpc_flow_log_cloudwatch", shape = "box"] 84 | "[root] module.vpc.aws_iam_role.vpc_flow_log_cloudwatch (expand)" [label = "module.vpc.aws_iam_role.vpc_flow_log_cloudwatch", shape = "box"] 85 | "[root] module.vpc.aws_iam_role_policy_attachment.vpc_flow_log_cloudwatch (expand)" [label = "module.vpc.aws_iam_role_policy_attachment.vpc_flow_log_cloudwatch", shape = "box"] 86 | "[root] module.vpc.aws_internet_gateway.this (expand)" [label = "module.vpc.aws_internet_gateway.this", shape = "box"] 87 | "[root] module.vpc.aws_nat_gateway.this (expand)" [label = "module.vpc.aws_nat_gateway.this", shape = "box"] 88 | "[root] module.vpc.aws_network_acl.database (expand)" [label = "module.vpc.aws_network_acl.database", shape = "box"] 89 | "[root] module.vpc.aws_network_acl.elasticache (expand)" [label = "module.vpc.aws_network_acl.elasticache", shape = "box"] 90 | "[root] module.vpc.aws_network_acl.intra (expand)" [label = "module.vpc.aws_network_acl.intra", shape = "box"] 91 | "[root] module.vpc.aws_network_acl.outpost (expand)" [label = "module.vpc.aws_network_acl.outpost", shape = "box"] 92 | "[root] module.vpc.aws_network_acl.private (expand)" [label = "module.vpc.aws_network_acl.private", shape = "box"] 93 | "[root] module.vpc.aws_network_acl.public (expand)" [label = "module.vpc.aws_network_acl.public", shape = "box"] 94 | "[root] module.vpc.aws_network_acl.redshift (expand)" [label = "module.vpc.aws_network_acl.redshift", shape = "box"] 95 | "[root] module.vpc.aws_network_acl_rule.database_inbound (expand)" [label = "module.vpc.aws_network_acl_rule.database_inbound", shape = "box"] 96 | "[root] module.vpc.aws_network_acl_rule.database_outbound (expand)" [label = "module.vpc.aws_network_acl_rule.database_outbound", shape = "box"] 97 | "[root] module.vpc.aws_network_acl_rule.elasticache_inbound (expand)" [label = "module.vpc.aws_network_acl_rule.elasticache_inbound", shape = "box"] 98 | "[root] module.vpc.aws_network_acl_rule.elasticache_outbound (expand)" [label = "module.vpc.aws_network_acl_rule.elasticache_outbound", shape = "box"] 99 | "[root] module.vpc.aws_network_acl_rule.intra_inbound (expand)" [label = "module.vpc.aws_network_acl_rule.intra_inbound", shape = "box"] 100 | "[root] module.vpc.aws_network_acl_rule.intra_outbound (expand)" [label = "module.vpc.aws_network_acl_rule.intra_outbound", shape = "box"] 101 | "[root] module.vpc.aws_network_acl_rule.outpost_inbound (expand)" [label = "module.vpc.aws_network_acl_rule.outpost_inbound", shape = "box"] 102 | "[root] module.vpc.aws_network_acl_rule.outpost_outbound (expand)" [label = "module.vpc.aws_network_acl_rule.outpost_outbound", shape = "box"] 103 | "[root] module.vpc.aws_network_acl_rule.private_inbound (expand)" [label = "module.vpc.aws_network_acl_rule.private_inbound", shape = "box"] 104 | "[root] module.vpc.aws_network_acl_rule.private_outbound (expand)" [label = "module.vpc.aws_network_acl_rule.private_outbound", shape = "box"] 105 | "[root] module.vpc.aws_network_acl_rule.public_inbound (expand)" [label = "module.vpc.aws_network_acl_rule.public_inbound", shape = "box"] 106 | "[root] module.vpc.aws_network_acl_rule.public_outbound (expand)" [label = "module.vpc.aws_network_acl_rule.public_outbound", shape = "box"] 107 | "[root] module.vpc.aws_network_acl_rule.redshift_inbound (expand)" [label = "module.vpc.aws_network_acl_rule.redshift_inbound", shape = "box"] 108 | "[root] module.vpc.aws_network_acl_rule.redshift_outbound (expand)" [label = "module.vpc.aws_network_acl_rule.redshift_outbound", shape = "box"] 109 | "[root] module.vpc.aws_redshift_subnet_group.redshift (expand)" [label = "module.vpc.aws_redshift_subnet_group.redshift", shape = "box"] 110 | "[root] module.vpc.aws_route.database_internet_gateway (expand)" [label = "module.vpc.aws_route.database_internet_gateway", shape = "box"] 111 | "[root] module.vpc.aws_route.database_ipv6_egress (expand)" [label = "module.vpc.aws_route.database_ipv6_egress", shape = "box"] 112 | "[root] module.vpc.aws_route.database_nat_gateway (expand)" [label = "module.vpc.aws_route.database_nat_gateway", shape = "box"] 113 | "[root] module.vpc.aws_route.private_ipv6_egress (expand)" [label = "module.vpc.aws_route.private_ipv6_egress", shape = "box"] 114 | "[root] module.vpc.aws_route.private_nat_gateway (expand)" [label = "module.vpc.aws_route.private_nat_gateway", shape = "box"] 115 | "[root] module.vpc.aws_route.public_internet_gateway (expand)" [label = "module.vpc.aws_route.public_internet_gateway", shape = "box"] 116 | "[root] module.vpc.aws_route.public_internet_gateway_ipv6 (expand)" [label = "module.vpc.aws_route.public_internet_gateway_ipv6", shape = "box"] 117 | "[root] module.vpc.aws_route_table.database (expand)" [label = "module.vpc.aws_route_table.database", shape = "box"] 118 | "[root] module.vpc.aws_route_table.elasticache (expand)" [label = "module.vpc.aws_route_table.elasticache", shape = "box"] 119 | "[root] module.vpc.aws_route_table.intra (expand)" [label = "module.vpc.aws_route_table.intra", shape = "box"] 120 | "[root] module.vpc.aws_route_table.private (expand)" [label = "module.vpc.aws_route_table.private", shape = "box"] 121 | "[root] module.vpc.aws_route_table.public (expand)" [label = "module.vpc.aws_route_table.public", shape = "box"] 122 | "[root] module.vpc.aws_route_table.redshift (expand)" [label = "module.vpc.aws_route_table.redshift", shape = "box"] 123 | "[root] module.vpc.aws_route_table_association.database (expand)" [label = "module.vpc.aws_route_table_association.database", shape = "box"] 124 | "[root] module.vpc.aws_route_table_association.elasticache (expand)" [label = "module.vpc.aws_route_table_association.elasticache", shape = "box"] 125 | "[root] module.vpc.aws_route_table_association.intra (expand)" [label = "module.vpc.aws_route_table_association.intra", shape = "box"] 126 | "[root] module.vpc.aws_route_table_association.outpost (expand)" [label = "module.vpc.aws_route_table_association.outpost", shape = "box"] 127 | "[root] module.vpc.aws_route_table_association.private (expand)" [label = "module.vpc.aws_route_table_association.private", shape = "box"] 128 | "[root] module.vpc.aws_route_table_association.public (expand)" [label = "module.vpc.aws_route_table_association.public", shape = "box"] 129 | "[root] module.vpc.aws_route_table_association.redshift (expand)" [label = "module.vpc.aws_route_table_association.redshift", shape = "box"] 130 | "[root] module.vpc.aws_route_table_association.redshift_public (expand)" [label = "module.vpc.aws_route_table_association.redshift_public", shape = "box"] 131 | "[root] module.vpc.aws_subnet.database (expand)" [label = "module.vpc.aws_subnet.database", shape = "box"] 132 | "[root] module.vpc.aws_subnet.elasticache (expand)" [label = "module.vpc.aws_subnet.elasticache", shape = "box"] 133 | "[root] module.vpc.aws_subnet.intra (expand)" [label = "module.vpc.aws_subnet.intra", shape = "box"] 134 | "[root] module.vpc.aws_subnet.outpost (expand)" [label = "module.vpc.aws_subnet.outpost", shape = "box"] 135 | "[root] module.vpc.aws_subnet.private (expand)" [label = "module.vpc.aws_subnet.private", shape = "box"] 136 | "[root] module.vpc.aws_subnet.public (expand)" [label = "module.vpc.aws_subnet.public", shape = "box"] 137 | "[root] module.vpc.aws_subnet.redshift (expand)" [label = "module.vpc.aws_subnet.redshift", shape = "box"] 138 | "[root] module.vpc.aws_vpc.this (expand)" [label = "module.vpc.aws_vpc.this", shape = "box"] 139 | "[root] module.vpc.aws_vpc_dhcp_options.this (expand)" [label = "module.vpc.aws_vpc_dhcp_options.this", shape = "box"] 140 | "[root] module.vpc.aws_vpc_dhcp_options_association.this (expand)" [label = "module.vpc.aws_vpc_dhcp_options_association.this", shape = "box"] 141 | "[root] module.vpc.aws_vpc_ipv4_cidr_block_association.this (expand)" [label = "module.vpc.aws_vpc_ipv4_cidr_block_association.this", shape = "box"] 142 | "[root] module.vpc.aws_vpn_gateway.this (expand)" [label = "module.vpc.aws_vpn_gateway.this", shape = "box"] 143 | "[root] module.vpc.aws_vpn_gateway_attachment.this (expand)" [label = "module.vpc.aws_vpn_gateway_attachment.this", shape = "box"] 144 | "[root] module.vpc.aws_vpn_gateway_route_propagation.intra (expand)" [label = "module.vpc.aws_vpn_gateway_route_propagation.intra", shape = "box"] 145 | "[root] module.vpc.aws_vpn_gateway_route_propagation.private (expand)" [label = "module.vpc.aws_vpn_gateway_route_propagation.private", shape = "box"] 146 | "[root] module.vpc.aws_vpn_gateway_route_propagation.public (expand)" [label = "module.vpc.aws_vpn_gateway_route_propagation.public", shape = "box"] 147 | "[root] module.vpc.data.aws_iam_policy_document.flow_log_cloudwatch_assume_role (expand)" [label = "module.vpc.data.aws_iam_policy_document.flow_log_cloudwatch_assume_role", shape = "box"] 148 | "[root] module.vpc.data.aws_iam_policy_document.vpc_flow_log_cloudwatch (expand)" [label = "module.vpc.data.aws_iam_policy_document.vpc_flow_log_cloudwatch", shape = "box"] 149 | "[root] output.eks_cluster_iam_role_arn" [label = "output.eks_cluster_iam_role_arn", shape = "note"] 150 | "[root] output.eks_cluster_iam_role_name" [label = "output.eks_cluster_iam_role_name", shape = "note"] 151 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" [label = "provider[\"registry.terraform.io/hashicorp/aws\"]", shape = "diamond"] 152 | "[root] provider[\"registry.terraform.io/hashicorp/kubernetes\"]" [label = "provider[\"registry.terraform.io/hashicorp/kubernetes\"]", shape = "diamond"] 153 | "[root] provider[\"registry.terraform.io/hashicorp/local\"]" [label = "provider[\"registry.terraform.io/hashicorp/local\"]", shape = "diamond"] 154 | "[root] provider[\"registry.terraform.io/hashicorp/null\"]" [label = "provider[\"registry.terraform.io/hashicorp/null\"]", shape = "diamond"] 155 | "[root] provider[\"registry.terraform.io/hashicorp/random\"]" [label = "provider[\"registry.terraform.io/hashicorp/random\"]", shape = "diamond"] 156 | "[root] provider[\"registry.terraform.io/hashicorp/template\"]" [label = "provider[\"registry.terraform.io/hashicorp/template\"]", shape = "diamond"] 157 | "[root] var.aws_cluster_name" [label = "var.aws_cluster_name", shape = "note"] 158 | "[root] var.aws_profile" [label = "var.aws_profile", shape = "note"] 159 | "[root] var.aws_region" [label = "var.aws_region", shape = "note"] 160 | "[root] aws_iam_group.group_KubeflowDevelopers (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 161 | "[root] aws_iam_group_policy_attachment.attach_EksAllAccess_to_group (expand)" -> "[root] aws_iam_group.group_KubeflowDevelopers (expand)" 162 | "[root] aws_iam_group_policy_attachment.attach_EksAllAccess_to_group (expand)" -> "[root] aws_iam_policy.policy_EksAllAccess (expand)" 163 | "[root] aws_iam_group_policy_attachment.attach_IamFullKF_to_group (expand)" -> "[root] aws_iam_group.group_KubeflowDevelopers (expand)" 164 | "[root] aws_iam_group_policy_attachment.attach_IamFullKF_to_group (expand)" -> "[root] aws_iam_policy.policy_IamFullAccessKubeflow (expand)" 165 | "[root] aws_iam_group_policy_attachment.attach_IamLimited_to_group (expand)" -> "[root] aws_iam_group.group_KubeflowDevelopers (expand)" 166 | "[root] aws_iam_group_policy_attachment.attach_IamLimited_to_group (expand)" -> "[root] aws_iam_policy.policy_IamLimitedAccess (expand)" 167 | "[root] aws_iam_policy.policy_EksAllAccess (expand)" -> "[root] local.account_id (expand)" 168 | "[root] aws_iam_policy.policy_IamFullAccessKubeflow (expand)" -> "[root] local.account_id (expand)" 169 | "[root] aws_iam_policy.policy_IamLimitedAccess (expand)" -> "[root] local.account_id (expand)" 170 | "[root] data.aws_availability_zones.available (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 171 | "[root] data.aws_caller_identity.current (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 172 | "[root] data.aws_eks_cluster.cluster (expand)" -> "[root] module.eks.output.cluster_id (expand)" 173 | "[root] data.aws_eks_cluster_auth.cluster (expand)" -> "[root] module.eks.output.cluster_id (expand)" 174 | "[root] local.account_id (expand)" -> "[root] data.aws_caller_identity.current (expand)" 175 | "[root] local.cluster_name (expand)" -> "[root] var.aws_cluster_name" 176 | "[root] meta.count-boundary (EachMode fixup)" -> "[root] aws_iam_group_policy_attachment.attach_EksAllAccess_to_group (expand)" 177 | "[root] meta.count-boundary (EachMode fixup)" -> "[root] aws_iam_group_policy_attachment.attach_IamFullKF_to_group (expand)" 178 | "[root] meta.count-boundary (EachMode fixup)" -> "[root] aws_iam_group_policy_attachment.attach_IamLimited_to_group (expand)" 179 | "[root] meta.count-boundary (EachMode fixup)" -> "[root] module.eks (close)" 180 | "[root] meta.count-boundary (EachMode fixup)" -> "[root] module.vpc (close)" 181 | "[root] meta.count-boundary (EachMode fixup)" -> "[root] output.eks_cluster_iam_role_arn" 182 | "[root] meta.count-boundary (EachMode fixup)" -> "[root] output.eks_cluster_iam_role_name" 183 | "[root] module.eks (close)" -> "[root] module.eks.aws_iam_role_policy_attachment.cluster_elb_sl_role_creation (expand)" 184 | "[root] module.eks (close)" -> "[root] module.eks.module.fargate (close)" 185 | "[root] module.eks (close)" -> "[root] module.eks.module.node_groups (close)" 186 | "[root] module.eks (close)" -> "[root] module.eks.output.cloudwatch_log_group_arn (expand)" 187 | "[root] module.eks (close)" -> "[root] module.eks.output.cloudwatch_log_group_name (expand)" 188 | "[root] module.eks (close)" -> "[root] module.eks.output.cluster_arn (expand)" 189 | "[root] module.eks (close)" -> "[root] module.eks.output.cluster_certificate_authority_data (expand)" 190 | "[root] module.eks (close)" -> "[root] module.eks.output.cluster_endpoint (expand)" 191 | "[root] module.eks (close)" -> "[root] module.eks.output.cluster_iam_role_arn (expand)" 192 | "[root] module.eks (close)" -> "[root] module.eks.output.cluster_iam_role_name (expand)" 193 | "[root] module.eks (close)" -> "[root] module.eks.output.cluster_oidc_issuer_url (expand)" 194 | "[root] module.eks (close)" -> "[root] module.eks.output.cluster_primary_security_group_id (expand)" 195 | "[root] module.eks (close)" -> "[root] module.eks.output.cluster_security_group_id (expand)" 196 | "[root] module.eks (close)" -> "[root] module.eks.output.cluster_version (expand)" 197 | "[root] module.eks (close)" -> "[root] module.eks.output.config_map_aws_auth (expand)" 198 | "[root] module.eks (close)" -> "[root] module.eks.output.fargate_iam_role_arn (expand)" 199 | "[root] module.eks (close)" -> "[root] module.eks.output.fargate_iam_role_name (expand)" 200 | "[root] module.eks (close)" -> "[root] module.eks.output.fargate_profile_arns (expand)" 201 | "[root] module.eks (close)" -> "[root] module.eks.output.fargate_profile_ids (expand)" 202 | "[root] module.eks (close)" -> "[root] module.eks.output.kubeconfig (expand)" 203 | "[root] module.eks (close)" -> "[root] module.eks.output.kubeconfig_filename (expand)" 204 | "[root] module.eks (close)" -> "[root] module.eks.output.node_groups (expand)" 205 | "[root] module.eks (close)" -> "[root] module.eks.output.oidc_provider_arn (expand)" 206 | "[root] module.eks (close)" -> "[root] module.eks.output.security_group_rule_cluster_https_worker_ingress (expand)" 207 | "[root] module.eks (close)" -> "[root] module.eks.output.worker_iam_instance_profile_arns (expand)" 208 | "[root] module.eks (close)" -> "[root] module.eks.output.worker_iam_instance_profile_names (expand)" 209 | "[root] module.eks (close)" -> "[root] module.eks.output.worker_iam_role_arn (expand)" 210 | "[root] module.eks (close)" -> "[root] module.eks.output.worker_iam_role_name (expand)" 211 | "[root] module.eks (close)" -> "[root] module.eks.output.worker_security_group_id (expand)" 212 | "[root] module.eks (close)" -> "[root] module.eks.output.workers_asg_arns (expand)" 213 | "[root] module.eks (close)" -> "[root] module.eks.output.workers_asg_names (expand)" 214 | "[root] module.eks (close)" -> "[root] module.eks.output.workers_default_ami_id (expand)" 215 | "[root] module.eks (close)" -> "[root] module.eks.output.workers_launch_template_arns (expand)" 216 | "[root] module.eks (close)" -> "[root] module.eks.output.workers_launch_template_ids (expand)" 217 | "[root] module.eks (close)" -> "[root] module.eks.output.workers_launch_template_latest_versions (expand)" 218 | "[root] module.eks (close)" -> "[root] module.eks.output.workers_user_data (expand)" 219 | "[root] module.eks.aws_autoscaling_group.workers (expand)" -> "[root] module.eks.random_pet.workers (expand)" 220 | "[root] module.eks.aws_autoscaling_group.workers (expand)" -> "[root] module.eks.var.worker_create_initial_lifecycle_hooks (expand)" 221 | "[root] module.eks.aws_autoscaling_group.workers_launch_template (expand)" -> "[root] module.eks.random_pet.workers_launch_template (expand)" 222 | "[root] module.eks.aws_autoscaling_group.workers_launch_template (expand)" -> "[root] module.eks.var.worker_create_initial_lifecycle_hooks (expand)" 223 | "[root] module.eks.aws_cloudwatch_log_group.this (expand)" -> "[root] module.eks.var.cluster_enabled_log_types (expand)" 224 | "[root] module.eks.aws_cloudwatch_log_group.this (expand)" -> "[root] module.eks.var.cluster_log_kms_key_id (expand)" 225 | "[root] module.eks.aws_cloudwatch_log_group.this (expand)" -> "[root] module.eks.var.cluster_log_retention_in_days (expand)" 226 | "[root] module.eks.aws_cloudwatch_log_group.this (expand)" -> "[root] module.eks.var.cluster_name (expand)" 227 | "[root] module.eks.aws_cloudwatch_log_group.this (expand)" -> "[root] module.eks.var.create_eks (expand)" 228 | "[root] module.eks.aws_cloudwatch_log_group.this (expand)" -> "[root] module.eks.var.tags (expand)" 229 | "[root] module.eks.aws_cloudwatch_log_group.this (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 230 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.aws_cloudwatch_log_group.this (expand)" 231 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSClusterPolicy (expand)" 232 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSServicePolicy (expand)" 233 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSVPCResourceControllerPolicy (expand)" 234 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.aws_security_group_rule.cluster_egress_internet (expand)" 235 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.aws_security_group_rule.cluster_https_worker_ingress (expand)" 236 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.local.cluster_iam_role_arn (expand)" 237 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.var.cluster_create_timeout (expand)" 238 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.var.cluster_delete_timeout (expand)" 239 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.var.cluster_encryption_config (expand)" 240 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.var.cluster_endpoint_private_access (expand)" 241 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.var.cluster_endpoint_public_access (expand)" 242 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.var.cluster_endpoint_public_access_cidrs (expand)" 243 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.var.cluster_service_ipv4_cidr (expand)" 244 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.var.cluster_version (expand)" 245 | "[root] module.eks.aws_eks_cluster.this (expand)" -> "[root] module.eks.var.subnets (expand)" 246 | "[root] module.eks.aws_iam_instance_profile.workers (expand)" -> "[root] module.eks.local.default_iam_role_id (expand)" 247 | "[root] module.eks.aws_iam_instance_profile.workers (expand)" -> "[root] module.eks.local.worker_group_count (expand)" 248 | "[root] module.eks.aws_iam_instance_profile.workers_launch_template (expand)" -> "[root] module.eks.local.default_iam_role_id (expand)" 249 | "[root] module.eks.aws_iam_instance_profile.workers_launch_template (expand)" -> "[root] module.eks.local.worker_group_launch_template_count (expand)" 250 | "[root] module.eks.aws_iam_openid_connect_provider.oidc_provider (expand)" -> "[root] module.eks.aws_eks_cluster.this (expand)" 251 | "[root] module.eks.aws_iam_openid_connect_provider.oidc_provider (expand)" -> "[root] module.eks.local.sts_principal (expand)" 252 | "[root] module.eks.aws_iam_openid_connect_provider.oidc_provider (expand)" -> "[root] module.eks.var.eks_oidc_root_ca_thumbprint (expand)" 253 | "[root] module.eks.aws_iam_openid_connect_provider.oidc_provider (expand)" -> "[root] module.eks.var.enable_irsa (expand)" 254 | "[root] module.eks.aws_iam_policy.cluster_elb_sl_role_creation (expand)" -> "[root] module.eks.data.aws_iam_policy_document.cluster_elb_sl_role_creation (expand)" 255 | "[root] module.eks.aws_iam_policy.cluster_elb_sl_role_creation (expand)" -> "[root] module.eks.var.cluster_name (expand)" 256 | "[root] module.eks.aws_iam_policy.cluster_elb_sl_role_creation (expand)" -> "[root] module.eks.var.iam_path (expand)" 257 | "[root] module.eks.aws_iam_role.cluster (expand)" -> "[root] module.eks.data.aws_iam_policy_document.cluster_assume_role_policy (expand)" 258 | "[root] module.eks.aws_iam_role.cluster (expand)" -> "[root] module.eks.var.cluster_name (expand)" 259 | "[root] module.eks.aws_iam_role.cluster (expand)" -> "[root] module.eks.var.create_eks (expand)" 260 | "[root] module.eks.aws_iam_role.cluster (expand)" -> "[root] module.eks.var.iam_path (expand)" 261 | "[root] module.eks.aws_iam_role.cluster (expand)" -> "[root] module.eks.var.manage_cluster_iam_resources (expand)" 262 | "[root] module.eks.aws_iam_role.cluster (expand)" -> "[root] module.eks.var.permissions_boundary (expand)" 263 | "[root] module.eks.aws_iam_role.cluster (expand)" -> "[root] module.eks.var.tags (expand)" 264 | "[root] module.eks.aws_iam_role.workers (expand)" -> "[root] module.eks.aws_eks_cluster.this (expand)" 265 | "[root] module.eks.aws_iam_role.workers (expand)" -> "[root] module.eks.data.aws_iam_policy_document.workers_assume_role_policy (expand)" 266 | "[root] module.eks.aws_iam_role.workers (expand)" -> "[root] module.eks.var.manage_worker_iam_resources (expand)" 267 | "[root] module.eks.aws_iam_role.workers (expand)" -> "[root] module.eks.var.workers_role_name (expand)" 268 | "[root] module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSClusterPolicy (expand)" -> "[root] module.eks.local.cluster_iam_role_name (expand)" 269 | "[root] module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSClusterPolicy (expand)" -> "[root] module.eks.local.policy_arn_prefix (expand)" 270 | "[root] module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSServicePolicy (expand)" -> "[root] module.eks.local.cluster_iam_role_name (expand)" 271 | "[root] module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSServicePolicy (expand)" -> "[root] module.eks.local.policy_arn_prefix (expand)" 272 | "[root] module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSVPCResourceControllerPolicy (expand)" -> "[root] module.eks.local.cluster_iam_role_name (expand)" 273 | "[root] module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSVPCResourceControllerPolicy (expand)" -> "[root] module.eks.local.policy_arn_prefix (expand)" 274 | "[root] module.eks.aws_iam_role_policy_attachment.cluster_elb_sl_role_creation (expand)" -> "[root] module.eks.aws_iam_policy.cluster_elb_sl_role_creation (expand)" 275 | "[root] module.eks.aws_iam_role_policy_attachment.cluster_elb_sl_role_creation (expand)" -> "[root] module.eks.local.cluster_iam_role_name (expand)" 276 | "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEC2ContainerRegistryReadOnly (expand)" -> "[root] module.eks.aws_iam_role.workers (expand)" 277 | "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEKSWorkerNodePolicy (expand)" -> "[root] module.eks.aws_iam_role.workers (expand)" 278 | "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEKS_CNI_Policy (expand)" -> "[root] module.eks.aws_iam_role.workers (expand)" 279 | "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEKS_CNI_Policy (expand)" -> "[root] module.eks.var.attach_worker_cni_policy (expand)" 280 | "[root] module.eks.aws_iam_role_policy_attachment.workers_additional_policies (expand)" -> "[root] module.eks.aws_iam_role.workers (expand)" 281 | "[root] module.eks.aws_iam_role_policy_attachment.workers_additional_policies (expand)" -> "[root] module.eks.var.workers_additional_policies (expand)" 282 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.aws_iam_instance_profile.workers (expand)" 283 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEC2ContainerRegistryReadOnly (expand)" 284 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEKSWorkerNodePolicy (expand)" 285 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEKS_CNI_Policy (expand)" 286 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.aws_iam_role_policy_attachment.workers_additional_policies (expand)" 287 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.aws_security_group_rule.cluster_primary_ingress_workers (expand)" 288 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.aws_security_group_rule.workers_egress_internet (expand)" 289 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.aws_security_group_rule.workers_ingress_cluster (expand)" 290 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_https (expand)" 291 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_kubelet (expand)" 292 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_primary (expand)" 293 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.aws_security_group_rule.workers_ingress_self (expand)" 294 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_iam_instance_profile (expand)" 295 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.data.template_file.userdata (expand)" 296 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.local.default_ami_id_linux (expand)" 297 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.local.default_ami_id_windows (expand)" 298 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.local.ebs_optimized_not_supported (expand)" 299 | "[root] module.eks.aws_launch_configuration.workers (expand)" -> "[root] module.eks.var.worker_additional_security_group_ids (expand)" 300 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.aws_iam_instance_profile.workers_launch_template (expand)" 301 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEC2ContainerRegistryReadOnly (expand)" 302 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEKSWorkerNodePolicy (expand)" 303 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEKS_CNI_Policy (expand)" 304 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.aws_iam_role_policy_attachment.workers_additional_policies (expand)" 305 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.aws_security_group_rule.cluster_primary_ingress_workers (expand)" 306 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.aws_security_group_rule.workers_egress_internet (expand)" 307 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.aws_security_group_rule.workers_ingress_cluster (expand)" 308 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_https (expand)" 309 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_kubelet (expand)" 310 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_primary (expand)" 311 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.aws_security_group_rule.workers_ingress_self (expand)" 312 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_launch_template_iam_instance_profile (expand)" 313 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.data.template_file.launch_template_userdata (expand)" 314 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.local.default_ami_id_linux (expand)" 315 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.local.default_ami_id_windows (expand)" 316 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.local.ebs_optimized_not_supported (expand)" 317 | "[root] module.eks.aws_launch_template.workers_launch_template (expand)" -> "[root] module.eks.var.worker_additional_security_group_ids (expand)" 318 | "[root] module.eks.aws_security_group.cluster (expand)" -> "[root] module.eks.var.cluster_create_security_group (expand)" 319 | "[root] module.eks.aws_security_group.cluster (expand)" -> "[root] module.eks.var.cluster_name (expand)" 320 | "[root] module.eks.aws_security_group.cluster (expand)" -> "[root] module.eks.var.create_eks (expand)" 321 | "[root] module.eks.aws_security_group.cluster (expand)" -> "[root] module.eks.var.tags (expand)" 322 | "[root] module.eks.aws_security_group.cluster (expand)" -> "[root] module.eks.var.vpc_id (expand)" 323 | "[root] module.eks.aws_security_group.workers (expand)" -> "[root] module.eks.var.cluster_name (expand)" 324 | "[root] module.eks.aws_security_group.workers (expand)" -> "[root] module.eks.var.create_eks (expand)" 325 | "[root] module.eks.aws_security_group.workers (expand)" -> "[root] module.eks.var.tags (expand)" 326 | "[root] module.eks.aws_security_group.workers (expand)" -> "[root] module.eks.var.vpc_id (expand)" 327 | "[root] module.eks.aws_security_group.workers (expand)" -> "[root] module.eks.var.worker_create_security_group (expand)" 328 | "[root] module.eks.aws_security_group_rule.cluster_egress_internet (expand)" -> "[root] module.eks.local.cluster_security_group_id (expand)" 329 | "[root] module.eks.aws_security_group_rule.cluster_https_worker_ingress (expand)" -> "[root] module.eks.local.cluster_security_group_id (expand)" 330 | "[root] module.eks.aws_security_group_rule.cluster_https_worker_ingress (expand)" -> "[root] module.eks.local.worker_security_group_id (expand)" 331 | "[root] module.eks.aws_security_group_rule.cluster_primary_ingress_workers (expand)" -> "[root] module.eks.local.cluster_primary_security_group_id (expand)" 332 | "[root] module.eks.aws_security_group_rule.cluster_primary_ingress_workers (expand)" -> "[root] module.eks.var.worker_create_cluster_primary_security_group_rules (expand)" 333 | "[root] module.eks.aws_security_group_rule.cluster_private_access (expand)" -> "[root] module.eks.aws_eks_cluster.this (expand)" 334 | "[root] module.eks.aws_security_group_rule.cluster_private_access (expand)" -> "[root] module.eks.var.cluster_create_endpoint_private_access_sg_rule (expand)" 335 | "[root] module.eks.aws_security_group_rule.cluster_private_access (expand)" -> "[root] module.eks.var.cluster_endpoint_private_access_cidrs (expand)" 336 | "[root] module.eks.aws_security_group_rule.workers_egress_internet (expand)" -> "[root] module.eks.local.worker_security_group_id (expand)" 337 | "[root] module.eks.aws_security_group_rule.workers_ingress_cluster (expand)" -> "[root] module.eks.local.cluster_security_group_id (expand)" 338 | "[root] module.eks.aws_security_group_rule.workers_ingress_cluster (expand)" -> "[root] module.eks.local.worker_security_group_id (expand)" 339 | "[root] module.eks.aws_security_group_rule.workers_ingress_cluster (expand)" -> "[root] module.eks.var.worker_sg_ingress_from_port (expand)" 340 | "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_https (expand)" -> "[root] module.eks.local.cluster_security_group_id (expand)" 341 | "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_https (expand)" -> "[root] module.eks.local.worker_security_group_id (expand)" 342 | "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_kubelet (expand)" -> "[root] module.eks.local.cluster_security_group_id (expand)" 343 | "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_kubelet (expand)" -> "[root] module.eks.local.worker_security_group_id (expand)" 344 | "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_kubelet (expand)" -> "[root] module.eks.var.worker_sg_ingress_from_port (expand)" 345 | "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_primary (expand)" -> "[root] module.eks.local.cluster_primary_security_group_id (expand)" 346 | "[root] module.eks.aws_security_group_rule.workers_ingress_cluster_primary (expand)" -> "[root] module.eks.var.worker_create_cluster_primary_security_group_rules (expand)" 347 | "[root] module.eks.aws_security_group_rule.workers_ingress_self (expand)" -> "[root] module.eks.local.worker_security_group_id (expand)" 348 | "[root] module.eks.data.aws_ami.eks_worker (expand)" -> "[root] module.eks.local.worker_ami_name_filter (expand)" 349 | "[root] module.eks.data.aws_ami.eks_worker (expand)" -> "[root] module.eks.var.worker_ami_owner_id (expand)" 350 | "[root] module.eks.data.aws_ami.eks_worker (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 351 | "[root] module.eks.data.aws_ami.eks_worker_windows (expand)" -> "[root] module.eks.local.worker_ami_name_filter_windows (expand)" 352 | "[root] module.eks.data.aws_ami.eks_worker_windows (expand)" -> "[root] module.eks.var.worker_ami_owner_id_windows (expand)" 353 | "[root] module.eks.data.aws_ami.eks_worker_windows (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 354 | "[root] module.eks.data.aws_caller_identity.current (expand)" -> "[root] module.eks (expand)" 355 | "[root] module.eks.data.aws_caller_identity.current (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 356 | "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_iam_instance_profile (expand)" -> "[root] module.eks.local.worker_group_count (expand)" 357 | "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_iam_instance_profile (expand)" -> "[root] module.eks.local.workers_group_defaults (expand)" 358 | "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_iam_instance_profile (expand)" -> "[root] module.eks.var.manage_worker_iam_resources (expand)" 359 | "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_launch_template_iam_instance_profile (expand)" -> "[root] module.eks.local.worker_group_launch_template_count (expand)" 360 | "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_launch_template_iam_instance_profile (expand)" -> "[root] module.eks.local.workers_group_defaults (expand)" 361 | "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_launch_template_iam_instance_profile (expand)" -> "[root] module.eks.var.manage_worker_iam_resources (expand)" 362 | "[root] module.eks.data.aws_iam_policy_document.cluster_assume_role_policy (expand)" -> "[root] module.eks (expand)" 363 | "[root] module.eks.data.aws_iam_policy_document.cluster_assume_role_policy (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 364 | "[root] module.eks.data.aws_iam_policy_document.cluster_elb_sl_role_creation (expand)" -> "[root] module.eks.var.create_eks (expand)" 365 | "[root] module.eks.data.aws_iam_policy_document.cluster_elb_sl_role_creation (expand)" -> "[root] module.eks.var.manage_cluster_iam_resources (expand)" 366 | "[root] module.eks.data.aws_iam_policy_document.cluster_elb_sl_role_creation (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 367 | "[root] module.eks.data.aws_iam_policy_document.workers_assume_role_policy (expand)" -> "[root] module.eks.local.ec2_principal (expand)" 368 | "[root] module.eks.data.aws_iam_role.custom_cluster_iam_role (expand)" -> "[root] module.eks.var.cluster_iam_role_name (expand)" 369 | "[root] module.eks.data.aws_iam_role.custom_cluster_iam_role (expand)" -> "[root] module.eks.var.manage_cluster_iam_resources (expand)" 370 | "[root] module.eks.data.aws_iam_role.custom_cluster_iam_role (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 371 | "[root] module.eks.data.aws_partition.current (expand)" -> "[root] module.eks (expand)" 372 | "[root] module.eks.data.aws_partition.current (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 373 | "[root] module.eks.data.template_file.launch_template_userdata (expand)" -> "[root] module.eks.aws_eks_cluster.this (expand)" 374 | "[root] module.eks.data.template_file.launch_template_userdata (expand)" -> "[root] module.eks.local.worker_group_launch_template_count (expand)" 375 | "[root] module.eks.data.template_file.launch_template_userdata (expand)" -> "[root] module.eks.local.workers_group_defaults (expand)" 376 | "[root] module.eks.data.template_file.launch_template_userdata (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/template\"]" 377 | "[root] module.eks.data.template_file.userdata (expand)" -> "[root] module.eks.aws_eks_cluster.this (expand)" 378 | "[root] module.eks.data.template_file.userdata (expand)" -> "[root] module.eks.local.worker_group_count (expand)" 379 | "[root] module.eks.data.template_file.userdata (expand)" -> "[root] module.eks.local.workers_group_defaults (expand)" 380 | "[root] module.eks.data.template_file.userdata (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/template\"]" 381 | "[root] module.eks.kubernetes_config_map.aws_auth (expand)" -> "[root] module.eks.local.configmap_roles (expand)" 382 | "[root] module.eks.kubernetes_config_map.aws_auth (expand)" -> "[root] module.eks.var.aws_auth_additional_labels (expand)" 383 | "[root] module.eks.kubernetes_config_map.aws_auth (expand)" -> "[root] module.eks.var.map_accounts (expand)" 384 | "[root] module.eks.kubernetes_config_map.aws_auth (expand)" -> "[root] module.eks.var.map_roles (expand)" 385 | "[root] module.eks.kubernetes_config_map.aws_auth (expand)" -> "[root] module.eks.var.map_users (expand)" 386 | "[root] module.eks.kubernetes_config_map.aws_auth (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/kubernetes\"]" 387 | "[root] module.eks.local.auth_launch_template_worker_roles (expand)" -> "[root] module.eks.aws_iam_instance_profile.workers_launch_template (expand)" 388 | "[root] module.eks.local.auth_launch_template_worker_roles (expand)" -> "[root] module.eks.data.aws_caller_identity.current (expand)" 389 | "[root] module.eks.local.auth_launch_template_worker_roles (expand)" -> "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_launch_template_iam_instance_profile (expand)" 390 | "[root] module.eks.local.auth_worker_roles (expand)" -> "[root] module.eks.aws_iam_instance_profile.workers (expand)" 391 | "[root] module.eks.local.auth_worker_roles (expand)" -> "[root] module.eks.data.aws_caller_identity.current (expand)" 392 | "[root] module.eks.local.auth_worker_roles (expand)" -> "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_iam_instance_profile (expand)" 393 | "[root] module.eks.local.cluster_iam_role_arn (expand)" -> "[root] module.eks.aws_iam_role.cluster (expand)" 394 | "[root] module.eks.local.cluster_iam_role_arn (expand)" -> "[root] module.eks.data.aws_iam_role.custom_cluster_iam_role (expand)" 395 | "[root] module.eks.local.cluster_iam_role_name (expand)" -> "[root] module.eks.aws_iam_role.cluster (expand)" 396 | "[root] module.eks.local.cluster_iam_role_name (expand)" -> "[root] module.eks.var.cluster_iam_role_name (expand)" 397 | "[root] module.eks.local.cluster_primary_security_group_id (expand)" -> "[root] module.eks.aws_eks_cluster.this (expand)" 398 | "[root] module.eks.local.cluster_security_group_id (expand)" -> "[root] module.eks.aws_security_group.cluster (expand)" 399 | "[root] module.eks.local.cluster_security_group_id (expand)" -> "[root] module.eks.var.cluster_security_group_id (expand)" 400 | "[root] module.eks.local.configmap_roles (expand)" -> "[root] module.eks.local.auth_launch_template_worker_roles (expand)" 401 | "[root] module.eks.local.configmap_roles (expand)" -> "[root] module.eks.local.auth_worker_roles (expand)" 402 | "[root] module.eks.local.configmap_roles (expand)" -> "[root] module.eks.module.fargate.output.aws_auth_roles (expand)" 403 | "[root] module.eks.local.configmap_roles (expand)" -> "[root] module.eks.module.node_groups.output.aws_auth_roles (expand)" 404 | "[root] module.eks.local.default_ami_id_linux (expand)" -> "[root] module.eks.local.workers_group_defaults (expand)" 405 | "[root] module.eks.local.default_ami_id_windows (expand)" -> "[root] module.eks.data.aws_ami.eks_worker_windows (expand)" 406 | "[root] module.eks.local.default_ami_id_windows (expand)" -> "[root] module.eks.local.workers_group_defaults (expand)" 407 | "[root] module.eks.local.default_iam_role_id (expand)" -> "[root] module.eks.aws_iam_role.workers (expand)" 408 | "[root] module.eks.local.ebs_optimized_not_supported (expand)" -> "[root] module.eks (expand)" 409 | "[root] module.eks.local.ec2_principal (expand)" -> "[root] module.eks.data.aws_partition.current (expand)" 410 | "[root] module.eks.local.kubeconfig (expand)" -> "[root] module.eks.aws_eks_cluster.this (expand)" 411 | "[root] module.eks.local.kubeconfig (expand)" -> "[root] module.eks.local.kubeconfig_name (expand)" 412 | "[root] module.eks.local.kubeconfig (expand)" -> "[root] module.eks.var.kubeconfig_aws_authenticator_additional_args (expand)" 413 | "[root] module.eks.local.kubeconfig (expand)" -> "[root] module.eks.var.kubeconfig_aws_authenticator_command (expand)" 414 | "[root] module.eks.local.kubeconfig (expand)" -> "[root] module.eks.var.kubeconfig_aws_authenticator_command_args (expand)" 415 | "[root] module.eks.local.kubeconfig (expand)" -> "[root] module.eks.var.kubeconfig_aws_authenticator_env_variables (expand)" 416 | "[root] module.eks.local.kubeconfig_name (expand)" -> "[root] module.eks.var.cluster_name (expand)" 417 | "[root] module.eks.local.kubeconfig_name (expand)" -> "[root] module.eks.var.kubeconfig_name (expand)" 418 | "[root] module.eks.local.policy_arn_prefix (expand)" -> "[root] module.eks.data.aws_partition.current (expand)" 419 | "[root] module.eks.local.sts_principal (expand)" -> "[root] module.eks.data.aws_partition.current (expand)" 420 | "[root] module.eks.local.worker_ami_name_filter (expand)" -> "[root] module.eks.var.cluster_version (expand)" 421 | "[root] module.eks.local.worker_ami_name_filter (expand)" -> "[root] module.eks.var.worker_ami_name_filter (expand)" 422 | "[root] module.eks.local.worker_ami_name_filter_windows (expand)" -> "[root] module.eks.var.cluster_version (expand)" 423 | "[root] module.eks.local.worker_ami_name_filter_windows (expand)" -> "[root] module.eks.var.worker_ami_name_filter_windows (expand)" 424 | "[root] module.eks.local.worker_group_count (expand)" -> "[root] module.eks.var.worker_groups (expand)" 425 | "[root] module.eks.local.worker_group_launch_template_count (expand)" -> "[root] module.eks.var.worker_groups_launch_template (expand)" 426 | "[root] module.eks.local.worker_security_group_id (expand)" -> "[root] module.eks.aws_security_group.workers (expand)" 427 | "[root] module.eks.local.worker_security_group_id (expand)" -> "[root] module.eks.var.worker_security_group_id (expand)" 428 | "[root] module.eks.local.workers_group_defaults (expand)" -> "[root] module.eks.local.workers_group_defaults_defaults (expand)" 429 | "[root] module.eks.local.workers_group_defaults (expand)" -> "[root] module.eks.var.workers_group_defaults (expand)" 430 | "[root] module.eks.local.workers_group_defaults_defaults (expand)" -> "[root] module.eks.data.aws_ami.eks_worker (expand)" 431 | "[root] module.eks.local.workers_group_defaults_defaults (expand)" -> "[root] module.eks.var.subnets (expand)" 432 | "[root] module.eks.local_file.kubeconfig (expand)" -> "[root] module.eks.local.kubeconfig (expand)" 433 | "[root] module.eks.local_file.kubeconfig (expand)" -> "[root] module.eks.var.config_output_path (expand)" 434 | "[root] module.eks.local_file.kubeconfig (expand)" -> "[root] module.eks.var.write_kubeconfig (expand)" 435 | "[root] module.eks.local_file.kubeconfig (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/local\"]" 436 | "[root] module.eks.module.fargate (close)" -> "[root] module.eks.module.fargate.aws_iam_role_policy_attachment.eks_fargate_pod (expand)" 437 | "[root] module.eks.module.fargate (close)" -> "[root] module.eks.module.fargate.output.fargate_profile_arns (expand)" 438 | "[root] module.eks.module.fargate (close)" -> "[root] module.eks.module.fargate.output.fargate_profile_ids (expand)" 439 | "[root] module.eks.module.fargate (close)" -> "[root] module.eks.module.fargate.output.iam_role_arn (expand)" 440 | "[root] module.eks.module.fargate (close)" -> "[root] module.eks.module.fargate.output.iam_role_name (expand)" 441 | "[root] module.eks.module.fargate (expand)" -> "[root] module.eks (expand)" 442 | "[root] module.eks.module.fargate.aws_eks_fargate_profile.this (expand)" -> "[root] module.eks.module.fargate.local.fargate_profiles_expanded (expand)" 443 | "[root] module.eks.module.fargate.aws_eks_fargate_profile.this (expand)" -> "[root] module.eks.module.fargate.var.eks_depends_on (expand)" 444 | "[root] module.eks.module.fargate.aws_eks_fargate_profile.this (expand)" -> "[root] module.eks.module.fargate.var.subnets (expand)" 445 | "[root] module.eks.module.fargate.aws_iam_role.eks_fargate_pod (expand)" -> "[root] module.eks.module.fargate.data.aws_iam_policy_document.eks_fargate_pod_assume_role (expand)" 446 | "[root] module.eks.module.fargate.aws_iam_role.eks_fargate_pod (expand)" -> "[root] module.eks.module.fargate.var.cluster_name (expand)" 447 | "[root] module.eks.module.fargate.aws_iam_role.eks_fargate_pod (expand)" -> "[root] module.eks.module.fargate.var.iam_path (expand)" 448 | "[root] module.eks.module.fargate.aws_iam_role.eks_fargate_pod (expand)" -> "[root] module.eks.module.fargate.var.permissions_boundary (expand)" 449 | "[root] module.eks.module.fargate.aws_iam_role.eks_fargate_pod (expand)" -> "[root] module.eks.module.fargate.var.tags (expand)" 450 | "[root] module.eks.module.fargate.aws_iam_role_policy_attachment.eks_fargate_pod (expand)" -> "[root] module.eks.module.fargate.aws_iam_role.eks_fargate_pod (expand)" 451 | "[root] module.eks.module.fargate.aws_iam_role_policy_attachment.eks_fargate_pod (expand)" -> "[root] module.eks.module.fargate.var.iam_policy_arn_prefix (expand)" 452 | "[root] module.eks.module.fargate.data.aws_iam_policy_document.eks_fargate_pod_assume_role (expand)" -> "[root] module.eks.module.fargate.local.create_eks (expand)" 453 | "[root] module.eks.module.fargate.data.aws_iam_policy_document.eks_fargate_pod_assume_role (expand)" -> "[root] module.eks.module.fargate.var.create_fargate_pod_execution_role (expand)" 454 | "[root] module.eks.module.fargate.data.aws_iam_policy_document.eks_fargate_pod_assume_role (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 455 | "[root] module.eks.module.fargate.data.aws_iam_role.custom_fargate_iam_role (expand)" -> "[root] module.eks.module.fargate.local.create_eks (expand)" 456 | "[root] module.eks.module.fargate.data.aws_iam_role.custom_fargate_iam_role (expand)" -> "[root] module.eks.module.fargate.var.create_fargate_pod_execution_role (expand)" 457 | "[root] module.eks.module.fargate.data.aws_iam_role.custom_fargate_iam_role (expand)" -> "[root] module.eks.module.fargate.var.fargate_pod_execution_role_name (expand)" 458 | "[root] module.eks.module.fargate.data.aws_iam_role.custom_fargate_iam_role (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 459 | "[root] module.eks.module.fargate.local.create_eks (expand)" -> "[root] module.eks.module.fargate.var.create_eks (expand)" 460 | "[root] module.eks.module.fargate.local.create_eks (expand)" -> "[root] module.eks.module.fargate.var.fargate_profiles (expand)" 461 | "[root] module.eks.module.fargate.local.fargate_profiles_expanded (expand)" -> "[root] module.eks.module.fargate.var.create_eks (expand)" 462 | "[root] module.eks.module.fargate.local.fargate_profiles_expanded (expand)" -> "[root] module.eks.module.fargate.var.fargate_profiles (expand)" 463 | "[root] module.eks.module.fargate.local.fargate_profiles_expanded (expand)" -> "[root] module.eks.module.fargate.var.tags (expand)" 464 | "[root] module.eks.module.fargate.local.pod_execution_role_arn (expand)" -> "[root] module.eks.module.fargate.aws_iam_role.eks_fargate_pod (expand)" 465 | "[root] module.eks.module.fargate.local.pod_execution_role_arn (expand)" -> "[root] module.eks.module.fargate.data.aws_iam_role.custom_fargate_iam_role (expand)" 466 | "[root] module.eks.module.fargate.local.pod_execution_role_name (expand)" -> "[root] module.eks.module.fargate.aws_iam_role.eks_fargate_pod (expand)" 467 | "[root] module.eks.module.fargate.local.pod_execution_role_name (expand)" -> "[root] module.eks.module.fargate.data.aws_iam_role.custom_fargate_iam_role (expand)" 468 | "[root] module.eks.module.fargate.output.aws_auth_roles (expand)" -> "[root] module.eks.module.fargate.local.pod_execution_role_arn (expand)" 469 | "[root] module.eks.module.fargate.output.fargate_profile_arns (expand)" -> "[root] module.eks.module.fargate.aws_eks_fargate_profile.this (expand)" 470 | "[root] module.eks.module.fargate.output.fargate_profile_ids (expand)" -> "[root] module.eks.module.fargate.aws_eks_fargate_profile.this (expand)" 471 | "[root] module.eks.module.fargate.output.iam_role_arn (expand)" -> "[root] module.eks.module.fargate.local.pod_execution_role_arn (expand)" 472 | "[root] module.eks.module.fargate.output.iam_role_name (expand)" -> "[root] module.eks.module.fargate.local.pod_execution_role_name (expand)" 473 | "[root] module.eks.module.fargate.var.cluster_name (expand)" -> "[root] module.eks.aws_eks_cluster.this (expand)" 474 | "[root] module.eks.module.fargate.var.cluster_name (expand)" -> "[root] module.eks.module.fargate (expand)" 475 | "[root] module.eks.module.fargate.var.create_eks (expand)" -> "[root] module.eks.module.fargate (expand)" 476 | "[root] module.eks.module.fargate.var.create_eks (expand)" -> "[root] module.eks.var.create_eks (expand)" 477 | "[root] module.eks.module.fargate.var.create_fargate_pod_execution_role (expand)" -> "[root] module.eks.module.fargate (expand)" 478 | "[root] module.eks.module.fargate.var.create_fargate_pod_execution_role (expand)" -> "[root] module.eks.var.create_fargate_pod_execution_role (expand)" 479 | "[root] module.eks.module.fargate.var.eks_depends_on (expand)" -> "[root] module.eks.kubernetes_config_map.aws_auth (expand)" 480 | "[root] module.eks.module.fargate.var.fargate_pod_execution_role_name (expand)" -> "[root] module.eks.module.fargate (expand)" 481 | "[root] module.eks.module.fargate.var.fargate_pod_execution_role_name (expand)" -> "[root] module.eks.var.fargate_pod_execution_role_name (expand)" 482 | "[root] module.eks.module.fargate.var.fargate_profiles (expand)" -> "[root] module.eks.module.fargate (expand)" 483 | "[root] module.eks.module.fargate.var.fargate_profiles (expand)" -> "[root] module.eks.var.fargate_profiles (expand)" 484 | "[root] module.eks.module.fargate.var.iam_path (expand)" -> "[root] module.eks.module.fargate (expand)" 485 | "[root] module.eks.module.fargate.var.iam_path (expand)" -> "[root] module.eks.var.iam_path (expand)" 486 | "[root] module.eks.module.fargate.var.iam_policy_arn_prefix (expand)" -> "[root] module.eks.local.policy_arn_prefix (expand)" 487 | "[root] module.eks.module.fargate.var.iam_policy_arn_prefix (expand)" -> "[root] module.eks.module.fargate (expand)" 488 | "[root] module.eks.module.fargate.var.permissions_boundary (expand)" -> "[root] module.eks.module.fargate (expand)" 489 | "[root] module.eks.module.fargate.var.permissions_boundary (expand)" -> "[root] module.eks.var.permissions_boundary (expand)" 490 | "[root] module.eks.module.fargate.var.subnets (expand)" -> "[root] module.eks.module.fargate (expand)" 491 | "[root] module.eks.module.fargate.var.subnets (expand)" -> "[root] module.eks.var.subnets (expand)" 492 | "[root] module.eks.module.fargate.var.tags (expand)" -> "[root] module.eks.module.fargate (expand)" 493 | "[root] module.eks.module.fargate.var.tags (expand)" -> "[root] module.eks.var.tags (expand)" 494 | "[root] module.eks.module.node_groups (close)" -> "[root] module.eks.module.node_groups.output.node_groups (expand)" 495 | "[root] module.eks.module.node_groups (expand)" -> "[root] module.eks (expand)" 496 | "[root] module.eks.module.node_groups.aws_eks_node_group.workers (expand)" -> "[root] module.eks.module.node_groups.random_pet.node_groups (expand)" 497 | "[root] module.eks.module.node_groups.aws_eks_node_group.workers (expand)" -> "[root] module.eks.module.node_groups.var.tags (expand)" 498 | "[root] module.eks.module.node_groups.local.node_groups_expanded (expand)" -> "[root] module.eks.module.node_groups.var.create_eks (expand)" 499 | "[root] module.eks.module.node_groups.local.node_groups_expanded (expand)" -> "[root] module.eks.module.node_groups.var.default_iam_role_arn (expand)" 500 | "[root] module.eks.module.node_groups.local.node_groups_expanded (expand)" -> "[root] module.eks.module.node_groups.var.node_groups (expand)" 501 | "[root] module.eks.module.node_groups.local.node_groups_expanded (expand)" -> "[root] module.eks.module.node_groups.var.node_groups_defaults (expand)" 502 | "[root] module.eks.module.node_groups.local.node_groups_expanded (expand)" -> "[root] module.eks.module.node_groups.var.workers_group_defaults (expand)" 503 | "[root] module.eks.module.node_groups.output.aws_auth_roles (expand)" -> "[root] module.eks.module.node_groups.local.node_groups_expanded (expand)" 504 | "[root] module.eks.module.node_groups.output.node_groups (expand)" -> "[root] module.eks.module.node_groups.aws_eks_node_group.workers (expand)" 505 | "[root] module.eks.module.node_groups.random_pet.node_groups (expand)" -> "[root] module.eks.module.node_groups.var.cluster_name (expand)" 506 | "[root] module.eks.module.node_groups.random_pet.node_groups (expand)" -> "[root] module.eks.module.node_groups.var.ng_depends_on (expand)" 507 | "[root] module.eks.module.node_groups.random_pet.node_groups (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/random\"]" 508 | "[root] module.eks.module.node_groups.var.cluster_name (expand)" -> "[root] module.eks.aws_eks_cluster.this (expand)" 509 | "[root] module.eks.module.node_groups.var.cluster_name (expand)" -> "[root] module.eks.module.node_groups (expand)" 510 | "[root] module.eks.module.node_groups.var.create_eks (expand)" -> "[root] module.eks.module.node_groups (expand)" 511 | "[root] module.eks.module.node_groups.var.create_eks (expand)" -> "[root] module.eks.var.create_eks (expand)" 512 | "[root] module.eks.module.node_groups.var.default_iam_role_arn (expand)" -> "[root] module.eks.aws_iam_role.workers (expand)" 513 | "[root] module.eks.module.node_groups.var.default_iam_role_arn (expand)" -> "[root] module.eks.module.node_groups (expand)" 514 | "[root] module.eks.module.node_groups.var.ng_depends_on (expand)" -> "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEC2ContainerRegistryReadOnly (expand)" 515 | "[root] module.eks.module.node_groups.var.ng_depends_on (expand)" -> "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEKSWorkerNodePolicy (expand)" 516 | "[root] module.eks.module.node_groups.var.ng_depends_on (expand)" -> "[root] module.eks.aws_iam_role_policy_attachment.workers_AmazonEKS_CNI_Policy (expand)" 517 | "[root] module.eks.module.node_groups.var.ng_depends_on (expand)" -> "[root] module.eks.kubernetes_config_map.aws_auth (expand)" 518 | "[root] module.eks.module.node_groups.var.node_groups (expand)" -> "[root] module.eks.module.node_groups (expand)" 519 | "[root] module.eks.module.node_groups.var.node_groups (expand)" -> "[root] module.eks.var.node_groups (expand)" 520 | "[root] module.eks.module.node_groups.var.node_groups_defaults (expand)" -> "[root] module.eks.module.node_groups (expand)" 521 | "[root] module.eks.module.node_groups.var.node_groups_defaults (expand)" -> "[root] module.eks.var.node_groups_defaults (expand)" 522 | "[root] module.eks.module.node_groups.var.tags (expand)" -> "[root] module.eks.module.node_groups (expand)" 523 | "[root] module.eks.module.node_groups.var.tags (expand)" -> "[root] module.eks.var.tags (expand)" 524 | "[root] module.eks.module.node_groups.var.workers_group_defaults (expand)" -> "[root] module.eks.local.workers_group_defaults (expand)" 525 | "[root] module.eks.module.node_groups.var.workers_group_defaults (expand)" -> "[root] module.eks.module.node_groups (expand)" 526 | "[root] module.eks.null_resource.wait_for_cluster (expand)" -> "[root] module.eks.aws_security_group_rule.cluster_private_access (expand)" 527 | "[root] module.eks.null_resource.wait_for_cluster (expand)" -> "[root] module.eks.var.manage_aws_auth (expand)" 528 | "[root] module.eks.null_resource.wait_for_cluster (expand)" -> "[root] module.eks.var.wait_for_cluster_cmd (expand)" 529 | "[root] module.eks.null_resource.wait_for_cluster (expand)" -> "[root] module.eks.var.wait_for_cluster_interpreter (expand)" 530 | "[root] module.eks.null_resource.wait_for_cluster (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/null\"]" 531 | "[root] module.eks.output.cloudwatch_log_group_arn (expand)" -> "[root] module.eks.aws_cloudwatch_log_group.this (expand)" 532 | "[root] module.eks.output.cloudwatch_log_group_name (expand)" -> "[root] module.eks.aws_cloudwatch_log_group.this (expand)" 533 | "[root] module.eks.output.cluster_arn (expand)" -> "[root] module.eks.aws_eks_cluster.this (expand)" 534 | "[root] module.eks.output.cluster_certificate_authority_data (expand)" -> "[root] module.eks.aws_eks_cluster.this (expand)" 535 | "[root] module.eks.output.cluster_endpoint (expand)" -> "[root] module.eks.aws_eks_cluster.this (expand)" 536 | "[root] module.eks.output.cluster_iam_role_arn (expand)" -> "[root] module.eks.local.cluster_iam_role_arn (expand)" 537 | "[root] module.eks.output.cluster_iam_role_name (expand)" -> "[root] module.eks.local.cluster_iam_role_name (expand)" 538 | "[root] module.eks.output.cluster_id (expand)" -> "[root] module.eks.null_resource.wait_for_cluster (expand)" 539 | "[root] module.eks.output.cluster_oidc_issuer_url (expand)" -> "[root] module.eks.aws_eks_cluster.this (expand)" 540 | "[root] module.eks.output.cluster_primary_security_group_id (expand)" -> "[root] module.eks.local.cluster_primary_security_group_id (expand)" 541 | "[root] module.eks.output.cluster_security_group_id (expand)" -> "[root] module.eks.local.cluster_security_group_id (expand)" 542 | "[root] module.eks.output.cluster_version (expand)" -> "[root] module.eks.aws_eks_cluster.this (expand)" 543 | "[root] module.eks.output.config_map_aws_auth (expand)" -> "[root] module.eks.kubernetes_config_map.aws_auth (expand)" 544 | "[root] module.eks.output.fargate_iam_role_arn (expand)" -> "[root] module.eks.module.fargate.output.iam_role_arn (expand)" 545 | "[root] module.eks.output.fargate_iam_role_name (expand)" -> "[root] module.eks.module.fargate.output.iam_role_name (expand)" 546 | "[root] module.eks.output.fargate_profile_arns (expand)" -> "[root] module.eks.module.fargate.output.fargate_profile_arns (expand)" 547 | "[root] module.eks.output.fargate_profile_ids (expand)" -> "[root] module.eks.module.fargate.output.fargate_profile_ids (expand)" 548 | "[root] module.eks.output.kubeconfig (expand)" -> "[root] module.eks.local.kubeconfig (expand)" 549 | "[root] module.eks.output.kubeconfig_filename (expand)" -> "[root] module.eks.local_file.kubeconfig (expand)" 550 | "[root] module.eks.output.node_groups (expand)" -> "[root] module.eks.module.node_groups.output.node_groups (expand)" 551 | "[root] module.eks.output.oidc_provider_arn (expand)" -> "[root] module.eks.aws_iam_openid_connect_provider.oidc_provider (expand)" 552 | "[root] module.eks.output.security_group_rule_cluster_https_worker_ingress (expand)" -> "[root] module.eks.aws_security_group_rule.cluster_https_worker_ingress (expand)" 553 | "[root] module.eks.output.worker_iam_instance_profile_arns (expand)" -> "[root] module.eks.aws_iam_instance_profile.workers (expand)" 554 | "[root] module.eks.output.worker_iam_instance_profile_arns (expand)" -> "[root] module.eks.aws_iam_instance_profile.workers_launch_template (expand)" 555 | "[root] module.eks.output.worker_iam_instance_profile_names (expand)" -> "[root] module.eks.aws_iam_instance_profile.workers (expand)" 556 | "[root] module.eks.output.worker_iam_instance_profile_names (expand)" -> "[root] module.eks.aws_iam_instance_profile.workers_launch_template (expand)" 557 | "[root] module.eks.output.worker_iam_role_arn (expand)" -> "[root] module.eks.aws_iam_role.workers (expand)" 558 | "[root] module.eks.output.worker_iam_role_arn (expand)" -> "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_iam_instance_profile (expand)" 559 | "[root] module.eks.output.worker_iam_role_arn (expand)" -> "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_launch_template_iam_instance_profile (expand)" 560 | "[root] module.eks.output.worker_iam_role_name (expand)" -> "[root] module.eks.aws_iam_role.workers (expand)" 561 | "[root] module.eks.output.worker_iam_role_name (expand)" -> "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_iam_instance_profile (expand)" 562 | "[root] module.eks.output.worker_iam_role_name (expand)" -> "[root] module.eks.data.aws_iam_instance_profile.custom_worker_group_launch_template_iam_instance_profile (expand)" 563 | "[root] module.eks.output.worker_security_group_id (expand)" -> "[root] module.eks.local.worker_security_group_id (expand)" 564 | "[root] module.eks.output.workers_asg_arns (expand)" -> "[root] module.eks.aws_autoscaling_group.workers (expand)" 565 | "[root] module.eks.output.workers_asg_arns (expand)" -> "[root] module.eks.aws_autoscaling_group.workers_launch_template (expand)" 566 | "[root] module.eks.output.workers_asg_names (expand)" -> "[root] module.eks.aws_autoscaling_group.workers (expand)" 567 | "[root] module.eks.output.workers_asg_names (expand)" -> "[root] module.eks.aws_autoscaling_group.workers_launch_template (expand)" 568 | "[root] module.eks.output.workers_default_ami_id (expand)" -> "[root] module.eks.data.aws_ami.eks_worker (expand)" 569 | "[root] module.eks.output.workers_launch_template_arns (expand)" -> "[root] module.eks.aws_launch_template.workers_launch_template (expand)" 570 | "[root] module.eks.output.workers_launch_template_ids (expand)" -> "[root] module.eks.aws_launch_template.workers_launch_template (expand)" 571 | "[root] module.eks.output.workers_launch_template_latest_versions (expand)" -> "[root] module.eks.aws_launch_template.workers_launch_template (expand)" 572 | "[root] module.eks.output.workers_user_data (expand)" -> "[root] module.eks.data.template_file.launch_template_userdata (expand)" 573 | "[root] module.eks.output.workers_user_data (expand)" -> "[root] module.eks.data.template_file.userdata (expand)" 574 | "[root] module.eks.random_pet.workers (expand)" -> "[root] module.eks.aws_launch_configuration.workers (expand)" 575 | "[root] module.eks.random_pet.workers (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/random\"]" 576 | "[root] module.eks.random_pet.workers_launch_template (expand)" -> "[root] module.eks.aws_launch_template.workers_launch_template (expand)" 577 | "[root] module.eks.random_pet.workers_launch_template (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/random\"]" 578 | "[root] module.eks.var.attach_worker_cni_policy (expand)" -> "[root] module.eks (expand)" 579 | "[root] module.eks.var.aws_auth_additional_labels (expand)" -> "[root] module.eks (expand)" 580 | "[root] module.eks.var.cluster_create_endpoint_private_access_sg_rule (expand)" -> "[root] module.eks (expand)" 581 | "[root] module.eks.var.cluster_create_security_group (expand)" -> "[root] module.eks (expand)" 582 | "[root] module.eks.var.cluster_create_timeout (expand)" -> "[root] module.eks (expand)" 583 | "[root] module.eks.var.cluster_delete_timeout (expand)" -> "[root] module.eks (expand)" 584 | "[root] module.eks.var.cluster_enabled_log_types (expand)" -> "[root] module.eks (expand)" 585 | "[root] module.eks.var.cluster_encryption_config (expand)" -> "[root] module.eks (expand)" 586 | "[root] module.eks.var.cluster_endpoint_private_access (expand)" -> "[root] module.eks (expand)" 587 | "[root] module.eks.var.cluster_endpoint_private_access_cidrs (expand)" -> "[root] module.eks (expand)" 588 | "[root] module.eks.var.cluster_endpoint_public_access (expand)" -> "[root] module.eks (expand)" 589 | "[root] module.eks.var.cluster_endpoint_public_access_cidrs (expand)" -> "[root] module.eks (expand)" 590 | "[root] module.eks.var.cluster_iam_role_name (expand)" -> "[root] module.eks (expand)" 591 | "[root] module.eks.var.cluster_log_kms_key_id (expand)" -> "[root] module.eks (expand)" 592 | "[root] module.eks.var.cluster_log_retention_in_days (expand)" -> "[root] module.eks (expand)" 593 | "[root] module.eks.var.cluster_name (expand)" -> "[root] local.cluster_name (expand)" 594 | "[root] module.eks.var.cluster_name (expand)" -> "[root] module.eks (expand)" 595 | "[root] module.eks.var.cluster_security_group_id (expand)" -> "[root] module.eks (expand)" 596 | "[root] module.eks.var.cluster_service_ipv4_cidr (expand)" -> "[root] module.eks (expand)" 597 | "[root] module.eks.var.cluster_version (expand)" -> "[root] module.eks (expand)" 598 | "[root] module.eks.var.config_output_path (expand)" -> "[root] module.eks (expand)" 599 | "[root] module.eks.var.create_eks (expand)" -> "[root] module.eks (expand)" 600 | "[root] module.eks.var.create_fargate_pod_execution_role (expand)" -> "[root] module.eks (expand)" 601 | "[root] module.eks.var.eks_oidc_root_ca_thumbprint (expand)" -> "[root] module.eks (expand)" 602 | "[root] module.eks.var.enable_irsa (expand)" -> "[root] module.eks (expand)" 603 | "[root] module.eks.var.fargate_pod_execution_role_name (expand)" -> "[root] module.eks (expand)" 604 | "[root] module.eks.var.fargate_profiles (expand)" -> "[root] module.eks (expand)" 605 | "[root] module.eks.var.iam_path (expand)" -> "[root] module.eks (expand)" 606 | "[root] module.eks.var.kubeconfig_aws_authenticator_additional_args (expand)" -> "[root] module.eks (expand)" 607 | "[root] module.eks.var.kubeconfig_aws_authenticator_command (expand)" -> "[root] module.eks (expand)" 608 | "[root] module.eks.var.kubeconfig_aws_authenticator_command_args (expand)" -> "[root] module.eks (expand)" 609 | "[root] module.eks.var.kubeconfig_aws_authenticator_env_variables (expand)" -> "[root] module.eks (expand)" 610 | "[root] module.eks.var.kubeconfig_name (expand)" -> "[root] module.eks (expand)" 611 | "[root] module.eks.var.manage_aws_auth (expand)" -> "[root] module.eks (expand)" 612 | "[root] module.eks.var.manage_cluster_iam_resources (expand)" -> "[root] module.eks (expand)" 613 | "[root] module.eks.var.manage_worker_iam_resources (expand)" -> "[root] module.eks (expand)" 614 | "[root] module.eks.var.map_accounts (expand)" -> "[root] module.eks (expand)" 615 | "[root] module.eks.var.map_roles (expand)" -> "[root] module.eks (expand)" 616 | "[root] module.eks.var.map_users (expand)" -> "[root] module.eks (expand)" 617 | "[root] module.eks.var.node_groups (expand)" -> "[root] module.eks (expand)" 618 | "[root] module.eks.var.node_groups_defaults (expand)" -> "[root] module.eks (expand)" 619 | "[root] module.eks.var.permissions_boundary (expand)" -> "[root] module.eks (expand)" 620 | "[root] module.eks.var.subnets (expand)" -> "[root] module.eks (expand)" 621 | "[root] module.eks.var.subnets (expand)" -> "[root] module.vpc.output.private_subnets (expand)" 622 | "[root] module.eks.var.tags (expand)" -> "[root] module.eks (expand)" 623 | "[root] module.eks.var.vpc_id (expand)" -> "[root] module.eks (expand)" 624 | "[root] module.eks.var.vpc_id (expand)" -> "[root] module.vpc.output.vpc_id (expand)" 625 | "[root] module.eks.var.wait_for_cluster_cmd (expand)" -> "[root] module.eks (expand)" 626 | "[root] module.eks.var.wait_for_cluster_interpreter (expand)" -> "[root] module.eks (expand)" 627 | "[root] module.eks.var.worker_additional_security_group_ids (expand)" -> "[root] module.eks (expand)" 628 | "[root] module.eks.var.worker_ami_name_filter (expand)" -> "[root] module.eks (expand)" 629 | "[root] module.eks.var.worker_ami_name_filter_windows (expand)" -> "[root] module.eks (expand)" 630 | "[root] module.eks.var.worker_ami_owner_id (expand)" -> "[root] module.eks (expand)" 631 | "[root] module.eks.var.worker_ami_owner_id_windows (expand)" -> "[root] module.eks (expand)" 632 | "[root] module.eks.var.worker_create_cluster_primary_security_group_rules (expand)" -> "[root] module.eks (expand)" 633 | "[root] module.eks.var.worker_create_initial_lifecycle_hooks (expand)" -> "[root] module.eks (expand)" 634 | "[root] module.eks.var.worker_create_security_group (expand)" -> "[root] module.eks (expand)" 635 | "[root] module.eks.var.worker_groups (expand)" -> "[root] module.eks (expand)" 636 | "[root] module.eks.var.worker_groups_launch_template (expand)" -> "[root] module.eks (expand)" 637 | "[root] module.eks.var.worker_security_group_id (expand)" -> "[root] module.eks (expand)" 638 | "[root] module.eks.var.worker_sg_ingress_from_port (expand)" -> "[root] module.eks (expand)" 639 | "[root] module.eks.var.workers_additional_policies (expand)" -> "[root] module.eks (expand)" 640 | "[root] module.eks.var.workers_group_defaults (expand)" -> "[root] module.eks (expand)" 641 | "[root] module.eks.var.workers_role_name (expand)" -> "[root] module.eks (expand)" 642 | "[root] module.eks.var.write_kubeconfig (expand)" -> "[root] module.eks (expand)" 643 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_default_network_acl.this (expand)" 644 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_default_route_table.default (expand)" 645 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_default_security_group.this (expand)" 646 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_iam_role_policy_attachment.vpc_flow_log_cloudwatch (expand)" 647 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_network_acl_rule.database_inbound (expand)" 648 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_network_acl_rule.database_outbound (expand)" 649 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_network_acl_rule.elasticache_inbound (expand)" 650 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_network_acl_rule.elasticache_outbound (expand)" 651 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_network_acl_rule.intra_inbound (expand)" 652 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_network_acl_rule.intra_outbound (expand)" 653 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_network_acl_rule.outpost_inbound (expand)" 654 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_network_acl_rule.outpost_outbound (expand)" 655 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_network_acl_rule.private_inbound (expand)" 656 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_network_acl_rule.private_outbound (expand)" 657 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_network_acl_rule.public_inbound (expand)" 658 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_network_acl_rule.public_outbound (expand)" 659 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_network_acl_rule.redshift_inbound (expand)" 660 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_network_acl_rule.redshift_outbound (expand)" 661 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_route_table_association.outpost (expand)" 662 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_vpc_dhcp_options_association.this (expand)" 663 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_vpn_gateway_route_propagation.intra (expand)" 664 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_vpn_gateway_route_propagation.private (expand)" 665 | "[root] module.vpc (close)" -> "[root] module.vpc.aws_vpn_gateway_route_propagation.public (expand)" 666 | "[root] module.vpc (close)" -> "[root] module.vpc.output.azs (expand)" 667 | "[root] module.vpc (close)" -> "[root] module.vpc.output.cgw_arns (expand)" 668 | "[root] module.vpc (close)" -> "[root] module.vpc.output.cgw_ids (expand)" 669 | "[root] module.vpc (close)" -> "[root] module.vpc.output.database_internet_gateway_route_id (expand)" 670 | "[root] module.vpc (close)" -> "[root] module.vpc.output.database_ipv6_egress_route_id (expand)" 671 | "[root] module.vpc (close)" -> "[root] module.vpc.output.database_nat_gateway_route_ids (expand)" 672 | "[root] module.vpc (close)" -> "[root] module.vpc.output.database_network_acl_arn (expand)" 673 | "[root] module.vpc (close)" -> "[root] module.vpc.output.database_network_acl_id (expand)" 674 | "[root] module.vpc (close)" -> "[root] module.vpc.output.database_route_table_association_ids (expand)" 675 | "[root] module.vpc (close)" -> "[root] module.vpc.output.database_route_table_ids (expand)" 676 | "[root] module.vpc (close)" -> "[root] module.vpc.output.database_subnet_arns (expand)" 677 | "[root] module.vpc (close)" -> "[root] module.vpc.output.database_subnet_group (expand)" 678 | "[root] module.vpc (close)" -> "[root] module.vpc.output.database_subnet_group_name (expand)" 679 | "[root] module.vpc (close)" -> "[root] module.vpc.output.database_subnets (expand)" 680 | "[root] module.vpc (close)" -> "[root] module.vpc.output.database_subnets_cidr_blocks (expand)" 681 | "[root] module.vpc (close)" -> "[root] module.vpc.output.database_subnets_ipv6_cidr_blocks (expand)" 682 | "[root] module.vpc (close)" -> "[root] module.vpc.output.default_network_acl_id (expand)" 683 | "[root] module.vpc (close)" -> "[root] module.vpc.output.default_route_table_id (expand)" 684 | "[root] module.vpc (close)" -> "[root] module.vpc.output.default_security_group_id (expand)" 685 | "[root] module.vpc (close)" -> "[root] module.vpc.output.default_vpc_arn (expand)" 686 | "[root] module.vpc (close)" -> "[root] module.vpc.output.default_vpc_cidr_block (expand)" 687 | "[root] module.vpc (close)" -> "[root] module.vpc.output.default_vpc_default_network_acl_id (expand)" 688 | "[root] module.vpc (close)" -> "[root] module.vpc.output.default_vpc_default_route_table_id (expand)" 689 | "[root] module.vpc (close)" -> "[root] module.vpc.output.default_vpc_default_security_group_id (expand)" 690 | "[root] module.vpc (close)" -> "[root] module.vpc.output.default_vpc_enable_dns_hostnames (expand)" 691 | "[root] module.vpc (close)" -> "[root] module.vpc.output.default_vpc_enable_dns_support (expand)" 692 | "[root] module.vpc (close)" -> "[root] module.vpc.output.default_vpc_id (expand)" 693 | "[root] module.vpc (close)" -> "[root] module.vpc.output.default_vpc_instance_tenancy (expand)" 694 | "[root] module.vpc (close)" -> "[root] module.vpc.output.default_vpc_main_route_table_id (expand)" 695 | "[root] module.vpc (close)" -> "[root] module.vpc.output.egress_only_internet_gateway_id (expand)" 696 | "[root] module.vpc (close)" -> "[root] module.vpc.output.elasticache_network_acl_arn (expand)" 697 | "[root] module.vpc (close)" -> "[root] module.vpc.output.elasticache_network_acl_id (expand)" 698 | "[root] module.vpc (close)" -> "[root] module.vpc.output.elasticache_route_table_association_ids (expand)" 699 | "[root] module.vpc (close)" -> "[root] module.vpc.output.elasticache_route_table_ids (expand)" 700 | "[root] module.vpc (close)" -> "[root] module.vpc.output.elasticache_subnet_arns (expand)" 701 | "[root] module.vpc (close)" -> "[root] module.vpc.output.elasticache_subnet_group (expand)" 702 | "[root] module.vpc (close)" -> "[root] module.vpc.output.elasticache_subnet_group_name (expand)" 703 | "[root] module.vpc (close)" -> "[root] module.vpc.output.elasticache_subnets (expand)" 704 | "[root] module.vpc (close)" -> "[root] module.vpc.output.elasticache_subnets_cidr_blocks (expand)" 705 | "[root] module.vpc (close)" -> "[root] module.vpc.output.elasticache_subnets_ipv6_cidr_blocks (expand)" 706 | "[root] module.vpc (close)" -> "[root] module.vpc.output.igw_arn (expand)" 707 | "[root] module.vpc (close)" -> "[root] module.vpc.output.igw_id (expand)" 708 | "[root] module.vpc (close)" -> "[root] module.vpc.output.intra_network_acl_arn (expand)" 709 | "[root] module.vpc (close)" -> "[root] module.vpc.output.intra_network_acl_id (expand)" 710 | "[root] module.vpc (close)" -> "[root] module.vpc.output.intra_route_table_association_ids (expand)" 711 | "[root] module.vpc (close)" -> "[root] module.vpc.output.intra_route_table_ids (expand)" 712 | "[root] module.vpc (close)" -> "[root] module.vpc.output.intra_subnet_arns (expand)" 713 | "[root] module.vpc (close)" -> "[root] module.vpc.output.intra_subnets (expand)" 714 | "[root] module.vpc (close)" -> "[root] module.vpc.output.intra_subnets_cidr_blocks (expand)" 715 | "[root] module.vpc (close)" -> "[root] module.vpc.output.intra_subnets_ipv6_cidr_blocks (expand)" 716 | "[root] module.vpc (close)" -> "[root] module.vpc.output.name (expand)" 717 | "[root] module.vpc (close)" -> "[root] module.vpc.output.nat_ids (expand)" 718 | "[root] module.vpc (close)" -> "[root] module.vpc.output.nat_public_ips (expand)" 719 | "[root] module.vpc (close)" -> "[root] module.vpc.output.natgw_ids (expand)" 720 | "[root] module.vpc (close)" -> "[root] module.vpc.output.outpost_network_acl_arn (expand)" 721 | "[root] module.vpc (close)" -> "[root] module.vpc.output.outpost_network_acl_id (expand)" 722 | "[root] module.vpc (close)" -> "[root] module.vpc.output.outpost_subnet_arns (expand)" 723 | "[root] module.vpc (close)" -> "[root] module.vpc.output.outpost_subnets (expand)" 724 | "[root] module.vpc (close)" -> "[root] module.vpc.output.outpost_subnets_cidr_blocks (expand)" 725 | "[root] module.vpc (close)" -> "[root] module.vpc.output.outpost_subnets_ipv6_cidr_blocks (expand)" 726 | "[root] module.vpc (close)" -> "[root] module.vpc.output.private_ipv6_egress_route_ids (expand)" 727 | "[root] module.vpc (close)" -> "[root] module.vpc.output.private_nat_gateway_route_ids (expand)" 728 | "[root] module.vpc (close)" -> "[root] module.vpc.output.private_network_acl_arn (expand)" 729 | "[root] module.vpc (close)" -> "[root] module.vpc.output.private_network_acl_id (expand)" 730 | "[root] module.vpc (close)" -> "[root] module.vpc.output.private_route_table_association_ids (expand)" 731 | "[root] module.vpc (close)" -> "[root] module.vpc.output.private_route_table_ids (expand)" 732 | "[root] module.vpc (close)" -> "[root] module.vpc.output.private_subnet_arns (expand)" 733 | "[root] module.vpc (close)" -> "[root] module.vpc.output.private_subnets (expand)" 734 | "[root] module.vpc (close)" -> "[root] module.vpc.output.private_subnets_cidr_blocks (expand)" 735 | "[root] module.vpc (close)" -> "[root] module.vpc.output.private_subnets_ipv6_cidr_blocks (expand)" 736 | "[root] module.vpc (close)" -> "[root] module.vpc.output.public_internet_gateway_ipv6_route_id (expand)" 737 | "[root] module.vpc (close)" -> "[root] module.vpc.output.public_internet_gateway_route_id (expand)" 738 | "[root] module.vpc (close)" -> "[root] module.vpc.output.public_network_acl_arn (expand)" 739 | "[root] module.vpc (close)" -> "[root] module.vpc.output.public_network_acl_id (expand)" 740 | "[root] module.vpc (close)" -> "[root] module.vpc.output.public_route_table_association_ids (expand)" 741 | "[root] module.vpc (close)" -> "[root] module.vpc.output.public_route_table_ids (expand)" 742 | "[root] module.vpc (close)" -> "[root] module.vpc.output.public_subnet_arns (expand)" 743 | "[root] module.vpc (close)" -> "[root] module.vpc.output.public_subnets (expand)" 744 | "[root] module.vpc (close)" -> "[root] module.vpc.output.public_subnets_cidr_blocks (expand)" 745 | "[root] module.vpc (close)" -> "[root] module.vpc.output.public_subnets_ipv6_cidr_blocks (expand)" 746 | "[root] module.vpc (close)" -> "[root] module.vpc.output.redshift_network_acl_arn (expand)" 747 | "[root] module.vpc (close)" -> "[root] module.vpc.output.redshift_network_acl_id (expand)" 748 | "[root] module.vpc (close)" -> "[root] module.vpc.output.redshift_public_route_table_association_ids (expand)" 749 | "[root] module.vpc (close)" -> "[root] module.vpc.output.redshift_route_table_association_ids (expand)" 750 | "[root] module.vpc (close)" -> "[root] module.vpc.output.redshift_route_table_ids (expand)" 751 | "[root] module.vpc (close)" -> "[root] module.vpc.output.redshift_subnet_arns (expand)" 752 | "[root] module.vpc (close)" -> "[root] module.vpc.output.redshift_subnet_group (expand)" 753 | "[root] module.vpc (close)" -> "[root] module.vpc.output.redshift_subnets (expand)" 754 | "[root] module.vpc (close)" -> "[root] module.vpc.output.redshift_subnets_cidr_blocks (expand)" 755 | "[root] module.vpc (close)" -> "[root] module.vpc.output.redshift_subnets_ipv6_cidr_blocks (expand)" 756 | "[root] module.vpc (close)" -> "[root] module.vpc.output.this_customer_gateway (expand)" 757 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vgw_arn (expand)" 758 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vgw_id (expand)" 759 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vpc_arn (expand)" 760 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vpc_cidr_block (expand)" 761 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vpc_enable_dns_hostnames (expand)" 762 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vpc_enable_dns_support (expand)" 763 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vpc_flow_log_cloudwatch_iam_role_arn (expand)" 764 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vpc_flow_log_destination_arn (expand)" 765 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vpc_flow_log_destination_type (expand)" 766 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vpc_flow_log_id (expand)" 767 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vpc_id (expand)" 768 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vpc_instance_tenancy (expand)" 769 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vpc_ipv6_association_id (expand)" 770 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vpc_ipv6_cidr_block (expand)" 771 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vpc_main_route_table_id (expand)" 772 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vpc_owner_id (expand)" 773 | "[root] module.vpc (close)" -> "[root] module.vpc.output.vpc_secondary_cidr_blocks (expand)" 774 | "[root] module.vpc.aws_cloudwatch_log_group.flow_log (expand)" -> "[root] module.vpc.local.create_flow_log_cloudwatch_log_group (expand)" 775 | "[root] module.vpc.aws_cloudwatch_log_group.flow_log (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 776 | "[root] module.vpc.aws_cloudwatch_log_group.flow_log (expand)" -> "[root] module.vpc.var.flow_log_cloudwatch_log_group_kms_key_id (expand)" 777 | "[root] module.vpc.aws_cloudwatch_log_group.flow_log (expand)" -> "[root] module.vpc.var.flow_log_cloudwatch_log_group_name_prefix (expand)" 778 | "[root] module.vpc.aws_cloudwatch_log_group.flow_log (expand)" -> "[root] module.vpc.var.flow_log_cloudwatch_log_group_retention_in_days (expand)" 779 | "[root] module.vpc.aws_cloudwatch_log_group.flow_log (expand)" -> "[root] module.vpc.var.vpc_flow_log_tags (expand)" 780 | "[root] module.vpc.aws_customer_gateway.this (expand)" -> "[root] module.vpc.var.customer_gateway_tags (expand)" 781 | "[root] module.vpc.aws_customer_gateway.this (expand)" -> "[root] module.vpc.var.customer_gateways (expand)" 782 | "[root] module.vpc.aws_customer_gateway.this (expand)" -> "[root] module.vpc.var.name (expand)" 783 | "[root] module.vpc.aws_customer_gateway.this (expand)" -> "[root] module.vpc.var.tags (expand)" 784 | "[root] module.vpc.aws_customer_gateway.this (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 785 | "[root] module.vpc.aws_db_subnet_group.database (expand)" -> "[root] module.vpc.aws_subnet.database (expand)" 786 | "[root] module.vpc.aws_db_subnet_group.database (expand)" -> "[root] module.vpc.var.create_database_subnet_group (expand)" 787 | "[root] module.vpc.aws_db_subnet_group.database (expand)" -> "[root] module.vpc.var.database_subnet_group_tags (expand)" 788 | "[root] module.vpc.aws_default_network_acl.this (expand)" -> "[root] module.vpc.aws_network_acl.database (expand)" 789 | "[root] module.vpc.aws_default_network_acl.this (expand)" -> "[root] module.vpc.aws_network_acl.elasticache (expand)" 790 | "[root] module.vpc.aws_default_network_acl.this (expand)" -> "[root] module.vpc.aws_network_acl.intra (expand)" 791 | "[root] module.vpc.aws_default_network_acl.this (expand)" -> "[root] module.vpc.aws_network_acl.outpost (expand)" 792 | "[root] module.vpc.aws_default_network_acl.this (expand)" -> "[root] module.vpc.aws_network_acl.private (expand)" 793 | "[root] module.vpc.aws_default_network_acl.this (expand)" -> "[root] module.vpc.aws_network_acl.public (expand)" 794 | "[root] module.vpc.aws_default_network_acl.this (expand)" -> "[root] module.vpc.aws_network_acl.redshift (expand)" 795 | "[root] module.vpc.aws_default_network_acl.this (expand)" -> "[root] module.vpc.var.default_network_acl_egress (expand)" 796 | "[root] module.vpc.aws_default_network_acl.this (expand)" -> "[root] module.vpc.var.default_network_acl_ingress (expand)" 797 | "[root] module.vpc.aws_default_network_acl.this (expand)" -> "[root] module.vpc.var.default_network_acl_name (expand)" 798 | "[root] module.vpc.aws_default_network_acl.this (expand)" -> "[root] module.vpc.var.default_network_acl_tags (expand)" 799 | "[root] module.vpc.aws_default_network_acl.this (expand)" -> "[root] module.vpc.var.manage_default_network_acl (expand)" 800 | "[root] module.vpc.aws_default_route_table.default (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 801 | "[root] module.vpc.aws_default_route_table.default (expand)" -> "[root] module.vpc.var.default_route_table_propagating_vgws (expand)" 802 | "[root] module.vpc.aws_default_route_table.default (expand)" -> "[root] module.vpc.var.default_route_table_routes (expand)" 803 | "[root] module.vpc.aws_default_route_table.default (expand)" -> "[root] module.vpc.var.default_route_table_tags (expand)" 804 | "[root] module.vpc.aws_default_route_table.default (expand)" -> "[root] module.vpc.var.manage_default_route_table (expand)" 805 | "[root] module.vpc.aws_default_security_group.this (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 806 | "[root] module.vpc.aws_default_security_group.this (expand)" -> "[root] module.vpc.var.default_security_group_egress (expand)" 807 | "[root] module.vpc.aws_default_security_group.this (expand)" -> "[root] module.vpc.var.default_security_group_ingress (expand)" 808 | "[root] module.vpc.aws_default_security_group.this (expand)" -> "[root] module.vpc.var.default_security_group_name (expand)" 809 | "[root] module.vpc.aws_default_security_group.this (expand)" -> "[root] module.vpc.var.default_security_group_tags (expand)" 810 | "[root] module.vpc.aws_default_security_group.this (expand)" -> "[root] module.vpc.var.manage_default_security_group (expand)" 811 | "[root] module.vpc.aws_default_vpc.this (expand)" -> "[root] module.vpc.var.default_vpc_enable_classiclink (expand)" 812 | "[root] module.vpc.aws_default_vpc.this (expand)" -> "[root] module.vpc.var.default_vpc_enable_dns_hostnames (expand)" 813 | "[root] module.vpc.aws_default_vpc.this (expand)" -> "[root] module.vpc.var.default_vpc_enable_dns_support (expand)" 814 | "[root] module.vpc.aws_default_vpc.this (expand)" -> "[root] module.vpc.var.default_vpc_name (expand)" 815 | "[root] module.vpc.aws_default_vpc.this (expand)" -> "[root] module.vpc.var.default_vpc_tags (expand)" 816 | "[root] module.vpc.aws_default_vpc.this (expand)" -> "[root] module.vpc.var.manage_default_vpc (expand)" 817 | "[root] module.vpc.aws_default_vpc.this (expand)" -> "[root] module.vpc.var.tags (expand)" 818 | "[root] module.vpc.aws_default_vpc.this (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 819 | "[root] module.vpc.aws_egress_only_internet_gateway.this (expand)" -> "[root] module.vpc.local.max_subnet_length (expand)" 820 | "[root] module.vpc.aws_egress_only_internet_gateway.this (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 821 | "[root] module.vpc.aws_egress_only_internet_gateway.this (expand)" -> "[root] module.vpc.var.create_egress_only_igw (expand)" 822 | "[root] module.vpc.aws_egress_only_internet_gateway.this (expand)" -> "[root] module.vpc.var.igw_tags (expand)" 823 | "[root] module.vpc.aws_eip.nat (expand)" -> "[root] module.vpc.local.nat_gateway_count (expand)" 824 | "[root] module.vpc.aws_eip.nat (expand)" -> "[root] module.vpc.var.create_vpc (expand)" 825 | "[root] module.vpc.aws_eip.nat (expand)" -> "[root] module.vpc.var.enable_nat_gateway (expand)" 826 | "[root] module.vpc.aws_eip.nat (expand)" -> "[root] module.vpc.var.name (expand)" 827 | "[root] module.vpc.aws_eip.nat (expand)" -> "[root] module.vpc.var.nat_eip_tags (expand)" 828 | "[root] module.vpc.aws_eip.nat (expand)" -> "[root] module.vpc.var.reuse_nat_ips (expand)" 829 | "[root] module.vpc.aws_eip.nat (expand)" -> "[root] module.vpc.var.tags (expand)" 830 | "[root] module.vpc.aws_elasticache_subnet_group.elasticache (expand)" -> "[root] module.vpc.aws_subnet.elasticache (expand)" 831 | "[root] module.vpc.aws_elasticache_subnet_group.elasticache (expand)" -> "[root] module.vpc.var.create_elasticache_subnet_group (expand)" 832 | "[root] module.vpc.aws_flow_log.this (expand)" -> "[root] module.vpc.local.flow_log_destination_arn (expand)" 833 | "[root] module.vpc.aws_flow_log.this (expand)" -> "[root] module.vpc.local.flow_log_iam_role_arn (expand)" 834 | "[root] module.vpc.aws_flow_log.this (expand)" -> "[root] module.vpc.var.flow_log_log_format (expand)" 835 | "[root] module.vpc.aws_flow_log.this (expand)" -> "[root] module.vpc.var.flow_log_max_aggregation_interval (expand)" 836 | "[root] module.vpc.aws_flow_log.this (expand)" -> "[root] module.vpc.var.flow_log_traffic_type (expand)" 837 | "[root] module.vpc.aws_iam_policy.vpc_flow_log_cloudwatch (expand)" -> "[root] module.vpc.data.aws_iam_policy_document.vpc_flow_log_cloudwatch (expand)" 838 | "[root] module.vpc.aws_iam_role.vpc_flow_log_cloudwatch (expand)" -> "[root] module.vpc.data.aws_iam_policy_document.flow_log_cloudwatch_assume_role (expand)" 839 | "[root] module.vpc.aws_iam_role.vpc_flow_log_cloudwatch (expand)" -> "[root] module.vpc.var.tags (expand)" 840 | "[root] module.vpc.aws_iam_role.vpc_flow_log_cloudwatch (expand)" -> "[root] module.vpc.var.vpc_flow_log_permissions_boundary (expand)" 841 | "[root] module.vpc.aws_iam_role.vpc_flow_log_cloudwatch (expand)" -> "[root] module.vpc.var.vpc_flow_log_tags (expand)" 842 | "[root] module.vpc.aws_iam_role_policy_attachment.vpc_flow_log_cloudwatch (expand)" -> "[root] module.vpc.aws_iam_policy.vpc_flow_log_cloudwatch (expand)" 843 | "[root] module.vpc.aws_iam_role_policy_attachment.vpc_flow_log_cloudwatch (expand)" -> "[root] module.vpc.aws_iam_role.vpc_flow_log_cloudwatch (expand)" 844 | "[root] module.vpc.aws_internet_gateway.this (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 845 | "[root] module.vpc.aws_internet_gateway.this (expand)" -> "[root] module.vpc.var.create_igw (expand)" 846 | "[root] module.vpc.aws_internet_gateway.this (expand)" -> "[root] module.vpc.var.igw_tags (expand)" 847 | "[root] module.vpc.aws_internet_gateway.this (expand)" -> "[root] module.vpc.var.public_subnets (expand)" 848 | "[root] module.vpc.aws_nat_gateway.this (expand)" -> "[root] module.vpc.aws_internet_gateway.this (expand)" 849 | "[root] module.vpc.aws_nat_gateway.this (expand)" -> "[root] module.vpc.aws_subnet.public (expand)" 850 | "[root] module.vpc.aws_nat_gateway.this (expand)" -> "[root] module.vpc.local.nat_gateway_ips (expand)" 851 | "[root] module.vpc.aws_nat_gateway.this (expand)" -> "[root] module.vpc.var.nat_gateway_tags (expand)" 852 | "[root] module.vpc.aws_network_acl.database (expand)" -> "[root] module.vpc.aws_subnet.database (expand)" 853 | "[root] module.vpc.aws_network_acl.database (expand)" -> "[root] module.vpc.var.database_acl_tags (expand)" 854 | "[root] module.vpc.aws_network_acl.database (expand)" -> "[root] module.vpc.var.database_dedicated_network_acl (expand)" 855 | "[root] module.vpc.aws_network_acl.elasticache (expand)" -> "[root] module.vpc.aws_subnet.elasticache (expand)" 856 | "[root] module.vpc.aws_network_acl.elasticache (expand)" -> "[root] module.vpc.var.elasticache_acl_tags (expand)" 857 | "[root] module.vpc.aws_network_acl.elasticache (expand)" -> "[root] module.vpc.var.elasticache_dedicated_network_acl (expand)" 858 | "[root] module.vpc.aws_network_acl.intra (expand)" -> "[root] module.vpc.aws_subnet.intra (expand)" 859 | "[root] module.vpc.aws_network_acl.intra (expand)" -> "[root] module.vpc.var.intra_acl_tags (expand)" 860 | "[root] module.vpc.aws_network_acl.intra (expand)" -> "[root] module.vpc.var.intra_dedicated_network_acl (expand)" 861 | "[root] module.vpc.aws_network_acl.outpost (expand)" -> "[root] module.vpc.aws_subnet.outpost (expand)" 862 | "[root] module.vpc.aws_network_acl.outpost (expand)" -> "[root] module.vpc.var.outpost_acl_tags (expand)" 863 | "[root] module.vpc.aws_network_acl.outpost (expand)" -> "[root] module.vpc.var.outpost_dedicated_network_acl (expand)" 864 | "[root] module.vpc.aws_network_acl.private (expand)" -> "[root] module.vpc.aws_subnet.private (expand)" 865 | "[root] module.vpc.aws_network_acl.private (expand)" -> "[root] module.vpc.var.private_acl_tags (expand)" 866 | "[root] module.vpc.aws_network_acl.private (expand)" -> "[root] module.vpc.var.private_dedicated_network_acl (expand)" 867 | "[root] module.vpc.aws_network_acl.public (expand)" -> "[root] module.vpc.aws_subnet.public (expand)" 868 | "[root] module.vpc.aws_network_acl.public (expand)" -> "[root] module.vpc.var.public_acl_tags (expand)" 869 | "[root] module.vpc.aws_network_acl.public (expand)" -> "[root] module.vpc.var.public_dedicated_network_acl (expand)" 870 | "[root] module.vpc.aws_network_acl.redshift (expand)" -> "[root] module.vpc.aws_subnet.redshift (expand)" 871 | "[root] module.vpc.aws_network_acl.redshift (expand)" -> "[root] module.vpc.var.redshift_acl_tags (expand)" 872 | "[root] module.vpc.aws_network_acl.redshift (expand)" -> "[root] module.vpc.var.redshift_dedicated_network_acl (expand)" 873 | "[root] module.vpc.aws_network_acl_rule.database_inbound (expand)" -> "[root] module.vpc.aws_network_acl.database (expand)" 874 | "[root] module.vpc.aws_network_acl_rule.database_inbound (expand)" -> "[root] module.vpc.var.database_inbound_acl_rules (expand)" 875 | "[root] module.vpc.aws_network_acl_rule.database_outbound (expand)" -> "[root] module.vpc.aws_network_acl.database (expand)" 876 | "[root] module.vpc.aws_network_acl_rule.database_outbound (expand)" -> "[root] module.vpc.var.database_outbound_acl_rules (expand)" 877 | "[root] module.vpc.aws_network_acl_rule.elasticache_inbound (expand)" -> "[root] module.vpc.aws_network_acl.elasticache (expand)" 878 | "[root] module.vpc.aws_network_acl_rule.elasticache_inbound (expand)" -> "[root] module.vpc.var.elasticache_inbound_acl_rules (expand)" 879 | "[root] module.vpc.aws_network_acl_rule.elasticache_outbound (expand)" -> "[root] module.vpc.aws_network_acl.elasticache (expand)" 880 | "[root] module.vpc.aws_network_acl_rule.elasticache_outbound (expand)" -> "[root] module.vpc.var.elasticache_outbound_acl_rules (expand)" 881 | "[root] module.vpc.aws_network_acl_rule.intra_inbound (expand)" -> "[root] module.vpc.aws_network_acl.intra (expand)" 882 | "[root] module.vpc.aws_network_acl_rule.intra_inbound (expand)" -> "[root] module.vpc.var.intra_inbound_acl_rules (expand)" 883 | "[root] module.vpc.aws_network_acl_rule.intra_outbound (expand)" -> "[root] module.vpc.aws_network_acl.intra (expand)" 884 | "[root] module.vpc.aws_network_acl_rule.intra_outbound (expand)" -> "[root] module.vpc.var.intra_outbound_acl_rules (expand)" 885 | "[root] module.vpc.aws_network_acl_rule.outpost_inbound (expand)" -> "[root] module.vpc.aws_network_acl.outpost (expand)" 886 | "[root] module.vpc.aws_network_acl_rule.outpost_inbound (expand)" -> "[root] module.vpc.var.outpost_inbound_acl_rules (expand)" 887 | "[root] module.vpc.aws_network_acl_rule.outpost_outbound (expand)" -> "[root] module.vpc.aws_network_acl.outpost (expand)" 888 | "[root] module.vpc.aws_network_acl_rule.outpost_outbound (expand)" -> "[root] module.vpc.var.outpost_outbound_acl_rules (expand)" 889 | "[root] module.vpc.aws_network_acl_rule.private_inbound (expand)" -> "[root] module.vpc.aws_network_acl.private (expand)" 890 | "[root] module.vpc.aws_network_acl_rule.private_inbound (expand)" -> "[root] module.vpc.var.private_inbound_acl_rules (expand)" 891 | "[root] module.vpc.aws_network_acl_rule.private_outbound (expand)" -> "[root] module.vpc.aws_network_acl.private (expand)" 892 | "[root] module.vpc.aws_network_acl_rule.private_outbound (expand)" -> "[root] module.vpc.var.private_outbound_acl_rules (expand)" 893 | "[root] module.vpc.aws_network_acl_rule.public_inbound (expand)" -> "[root] module.vpc.aws_network_acl.public (expand)" 894 | "[root] module.vpc.aws_network_acl_rule.public_inbound (expand)" -> "[root] module.vpc.var.public_inbound_acl_rules (expand)" 895 | "[root] module.vpc.aws_network_acl_rule.public_outbound (expand)" -> "[root] module.vpc.aws_network_acl.public (expand)" 896 | "[root] module.vpc.aws_network_acl_rule.public_outbound (expand)" -> "[root] module.vpc.var.public_outbound_acl_rules (expand)" 897 | "[root] module.vpc.aws_network_acl_rule.redshift_inbound (expand)" -> "[root] module.vpc.aws_network_acl.redshift (expand)" 898 | "[root] module.vpc.aws_network_acl_rule.redshift_inbound (expand)" -> "[root] module.vpc.var.redshift_inbound_acl_rules (expand)" 899 | "[root] module.vpc.aws_network_acl_rule.redshift_outbound (expand)" -> "[root] module.vpc.aws_network_acl.redshift (expand)" 900 | "[root] module.vpc.aws_network_acl_rule.redshift_outbound (expand)" -> "[root] module.vpc.var.redshift_outbound_acl_rules (expand)" 901 | "[root] module.vpc.aws_redshift_subnet_group.redshift (expand)" -> "[root] module.vpc.aws_subnet.redshift (expand)" 902 | "[root] module.vpc.aws_redshift_subnet_group.redshift (expand)" -> "[root] module.vpc.var.create_redshift_subnet_group (expand)" 903 | "[root] module.vpc.aws_redshift_subnet_group.redshift (expand)" -> "[root] module.vpc.var.redshift_subnet_group_tags (expand)" 904 | "[root] module.vpc.aws_route.database_internet_gateway (expand)" -> "[root] module.vpc.aws_internet_gateway.this (expand)" 905 | "[root] module.vpc.aws_route.database_internet_gateway (expand)" -> "[root] module.vpc.aws_route_table.database (expand)" 906 | "[root] module.vpc.aws_route.database_internet_gateway (expand)" -> "[root] module.vpc.var.create_database_nat_gateway_route (expand)" 907 | "[root] module.vpc.aws_route.database_ipv6_egress (expand)" -> "[root] module.vpc.aws_egress_only_internet_gateway.this (expand)" 908 | "[root] module.vpc.aws_route.database_ipv6_egress (expand)" -> "[root] module.vpc.aws_route_table.database (expand)" 909 | "[root] module.vpc.aws_route.database_nat_gateway (expand)" -> "[root] module.vpc.aws_nat_gateway.this (expand)" 910 | "[root] module.vpc.aws_route.database_nat_gateway (expand)" -> "[root] module.vpc.aws_route_table.database (expand)" 911 | "[root] module.vpc.aws_route.database_nat_gateway (expand)" -> "[root] module.vpc.var.create_database_nat_gateway_route (expand)" 912 | "[root] module.vpc.aws_route.private_ipv6_egress (expand)" -> "[root] module.vpc.aws_egress_only_internet_gateway.this (expand)" 913 | "[root] module.vpc.aws_route.private_ipv6_egress (expand)" -> "[root] module.vpc.aws_route_table.private (expand)" 914 | "[root] module.vpc.aws_route.private_nat_gateway (expand)" -> "[root] module.vpc.aws_nat_gateway.this (expand)" 915 | "[root] module.vpc.aws_route.private_nat_gateway (expand)" -> "[root] module.vpc.aws_route_table.private (expand)" 916 | "[root] module.vpc.aws_route.public_internet_gateway (expand)" -> "[root] module.vpc.aws_internet_gateway.this (expand)" 917 | "[root] module.vpc.aws_route.public_internet_gateway (expand)" -> "[root] module.vpc.aws_route_table.public (expand)" 918 | "[root] module.vpc.aws_route.public_internet_gateway_ipv6 (expand)" -> "[root] module.vpc.aws_internet_gateway.this (expand)" 919 | "[root] module.vpc.aws_route.public_internet_gateway_ipv6 (expand)" -> "[root] module.vpc.aws_route_table.public (expand)" 920 | "[root] module.vpc.aws_route_table.database (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 921 | "[root] module.vpc.aws_route_table.database (expand)" -> "[root] module.vpc.var.azs (expand)" 922 | "[root] module.vpc.aws_route_table.database (expand)" -> "[root] module.vpc.var.create_database_internet_gateway_route (expand)" 923 | "[root] module.vpc.aws_route_table.database (expand)" -> "[root] module.vpc.var.create_database_subnet_route_table (expand)" 924 | "[root] module.vpc.aws_route_table.database (expand)" -> "[root] module.vpc.var.database_route_table_tags (expand)" 925 | "[root] module.vpc.aws_route_table.database (expand)" -> "[root] module.vpc.var.database_subnet_suffix (expand)" 926 | "[root] module.vpc.aws_route_table.database (expand)" -> "[root] module.vpc.var.database_subnets (expand)" 927 | "[root] module.vpc.aws_route_table.database (expand)" -> "[root] module.vpc.var.single_nat_gateway (expand)" 928 | "[root] module.vpc.aws_route_table.elasticache (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 929 | "[root] module.vpc.aws_route_table.elasticache (expand)" -> "[root] module.vpc.var.create_elasticache_subnet_route_table (expand)" 930 | "[root] module.vpc.aws_route_table.elasticache (expand)" -> "[root] module.vpc.var.elasticache_route_table_tags (expand)" 931 | "[root] module.vpc.aws_route_table.elasticache (expand)" -> "[root] module.vpc.var.elasticache_subnet_suffix (expand)" 932 | "[root] module.vpc.aws_route_table.elasticache (expand)" -> "[root] module.vpc.var.elasticache_subnets (expand)" 933 | "[root] module.vpc.aws_route_table.intra (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 934 | "[root] module.vpc.aws_route_table.intra (expand)" -> "[root] module.vpc.var.intra_route_table_tags (expand)" 935 | "[root] module.vpc.aws_route_table.intra (expand)" -> "[root] module.vpc.var.intra_subnet_suffix (expand)" 936 | "[root] module.vpc.aws_route_table.intra (expand)" -> "[root] module.vpc.var.intra_subnets (expand)" 937 | "[root] module.vpc.aws_route_table.private (expand)" -> "[root] module.vpc.local.nat_gateway_count (expand)" 938 | "[root] module.vpc.aws_route_table.private (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 939 | "[root] module.vpc.aws_route_table.private (expand)" -> "[root] module.vpc.var.private_route_table_tags (expand)" 940 | "[root] module.vpc.aws_route_table.private (expand)" -> "[root] module.vpc.var.private_subnet_suffix (expand)" 941 | "[root] module.vpc.aws_route_table.public (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 942 | "[root] module.vpc.aws_route_table.public (expand)" -> "[root] module.vpc.var.public_route_table_tags (expand)" 943 | "[root] module.vpc.aws_route_table.public (expand)" -> "[root] module.vpc.var.public_subnet_suffix (expand)" 944 | "[root] module.vpc.aws_route_table.public (expand)" -> "[root] module.vpc.var.public_subnets (expand)" 945 | "[root] module.vpc.aws_route_table.redshift (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 946 | "[root] module.vpc.aws_route_table.redshift (expand)" -> "[root] module.vpc.var.create_redshift_subnet_route_table (expand)" 947 | "[root] module.vpc.aws_route_table.redshift (expand)" -> "[root] module.vpc.var.redshift_route_table_tags (expand)" 948 | "[root] module.vpc.aws_route_table.redshift (expand)" -> "[root] module.vpc.var.redshift_subnet_suffix (expand)" 949 | "[root] module.vpc.aws_route_table.redshift (expand)" -> "[root] module.vpc.var.redshift_subnets (expand)" 950 | "[root] module.vpc.aws_route_table_association.database (expand)" -> "[root] module.vpc.aws_route_table.database (expand)" 951 | "[root] module.vpc.aws_route_table_association.database (expand)" -> "[root] module.vpc.aws_route_table.private (expand)" 952 | "[root] module.vpc.aws_route_table_association.database (expand)" -> "[root] module.vpc.aws_subnet.database (expand)" 953 | "[root] module.vpc.aws_route_table_association.elasticache (expand)" -> "[root] module.vpc.aws_route_table.elasticache (expand)" 954 | "[root] module.vpc.aws_route_table_association.elasticache (expand)" -> "[root] module.vpc.aws_route_table.private (expand)" 955 | "[root] module.vpc.aws_route_table_association.elasticache (expand)" -> "[root] module.vpc.aws_subnet.elasticache (expand)" 956 | "[root] module.vpc.aws_route_table_association.intra (expand)" -> "[root] module.vpc.aws_route_table.intra (expand)" 957 | "[root] module.vpc.aws_route_table_association.intra (expand)" -> "[root] module.vpc.aws_subnet.intra (expand)" 958 | "[root] module.vpc.aws_route_table_association.outpost (expand)" -> "[root] module.vpc.aws_route_table.private (expand)" 959 | "[root] module.vpc.aws_route_table_association.outpost (expand)" -> "[root] module.vpc.aws_subnet.outpost (expand)" 960 | "[root] module.vpc.aws_route_table_association.private (expand)" -> "[root] module.vpc.aws_route_table.private (expand)" 961 | "[root] module.vpc.aws_route_table_association.private (expand)" -> "[root] module.vpc.aws_subnet.private (expand)" 962 | "[root] module.vpc.aws_route_table_association.public (expand)" -> "[root] module.vpc.aws_route_table.public (expand)" 963 | "[root] module.vpc.aws_route_table_association.public (expand)" -> "[root] module.vpc.aws_subnet.public (expand)" 964 | "[root] module.vpc.aws_route_table_association.redshift (expand)" -> "[root] module.vpc.aws_route_table.private (expand)" 965 | "[root] module.vpc.aws_route_table_association.redshift (expand)" -> "[root] module.vpc.aws_route_table.redshift (expand)" 966 | "[root] module.vpc.aws_route_table_association.redshift (expand)" -> "[root] module.vpc.aws_subnet.redshift (expand)" 967 | "[root] module.vpc.aws_route_table_association.redshift (expand)" -> "[root] module.vpc.var.enable_public_redshift (expand)" 968 | "[root] module.vpc.aws_route_table_association.redshift_public (expand)" -> "[root] module.vpc.aws_route_table.public (expand)" 969 | "[root] module.vpc.aws_route_table_association.redshift_public (expand)" -> "[root] module.vpc.aws_route_table.redshift (expand)" 970 | "[root] module.vpc.aws_route_table_association.redshift_public (expand)" -> "[root] module.vpc.aws_subnet.redshift (expand)" 971 | "[root] module.vpc.aws_route_table_association.redshift_public (expand)" -> "[root] module.vpc.var.enable_public_redshift (expand)" 972 | "[root] module.vpc.aws_route_table_association.redshift_public (expand)" -> "[root] module.vpc.var.single_nat_gateway (expand)" 973 | "[root] module.vpc.aws_subnet.database (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 974 | "[root] module.vpc.aws_subnet.database (expand)" -> "[root] module.vpc.var.assign_ipv6_address_on_creation (expand)" 975 | "[root] module.vpc.aws_subnet.database (expand)" -> "[root] module.vpc.var.azs (expand)" 976 | "[root] module.vpc.aws_subnet.database (expand)" -> "[root] module.vpc.var.database_subnet_assign_ipv6_address_on_creation (expand)" 977 | "[root] module.vpc.aws_subnet.database (expand)" -> "[root] module.vpc.var.database_subnet_ipv6_prefixes (expand)" 978 | "[root] module.vpc.aws_subnet.database (expand)" -> "[root] module.vpc.var.database_subnet_suffix (expand)" 979 | "[root] module.vpc.aws_subnet.database (expand)" -> "[root] module.vpc.var.database_subnet_tags (expand)" 980 | "[root] module.vpc.aws_subnet.database (expand)" -> "[root] module.vpc.var.database_subnets (expand)" 981 | "[root] module.vpc.aws_subnet.elasticache (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 982 | "[root] module.vpc.aws_subnet.elasticache (expand)" -> "[root] module.vpc.var.assign_ipv6_address_on_creation (expand)" 983 | "[root] module.vpc.aws_subnet.elasticache (expand)" -> "[root] module.vpc.var.azs (expand)" 984 | "[root] module.vpc.aws_subnet.elasticache (expand)" -> "[root] module.vpc.var.elasticache_subnet_assign_ipv6_address_on_creation (expand)" 985 | "[root] module.vpc.aws_subnet.elasticache (expand)" -> "[root] module.vpc.var.elasticache_subnet_ipv6_prefixes (expand)" 986 | "[root] module.vpc.aws_subnet.elasticache (expand)" -> "[root] module.vpc.var.elasticache_subnet_suffix (expand)" 987 | "[root] module.vpc.aws_subnet.elasticache (expand)" -> "[root] module.vpc.var.elasticache_subnet_tags (expand)" 988 | "[root] module.vpc.aws_subnet.elasticache (expand)" -> "[root] module.vpc.var.elasticache_subnets (expand)" 989 | "[root] module.vpc.aws_subnet.intra (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 990 | "[root] module.vpc.aws_subnet.intra (expand)" -> "[root] module.vpc.var.assign_ipv6_address_on_creation (expand)" 991 | "[root] module.vpc.aws_subnet.intra (expand)" -> "[root] module.vpc.var.azs (expand)" 992 | "[root] module.vpc.aws_subnet.intra (expand)" -> "[root] module.vpc.var.intra_subnet_assign_ipv6_address_on_creation (expand)" 993 | "[root] module.vpc.aws_subnet.intra (expand)" -> "[root] module.vpc.var.intra_subnet_ipv6_prefixes (expand)" 994 | "[root] module.vpc.aws_subnet.intra (expand)" -> "[root] module.vpc.var.intra_subnet_suffix (expand)" 995 | "[root] module.vpc.aws_subnet.intra (expand)" -> "[root] module.vpc.var.intra_subnet_tags (expand)" 996 | "[root] module.vpc.aws_subnet.intra (expand)" -> "[root] module.vpc.var.intra_subnets (expand)" 997 | "[root] module.vpc.aws_subnet.outpost (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 998 | "[root] module.vpc.aws_subnet.outpost (expand)" -> "[root] module.vpc.var.assign_ipv6_address_on_creation (expand)" 999 | "[root] module.vpc.aws_subnet.outpost (expand)" -> "[root] module.vpc.var.outpost_arn (expand)" 1000 | "[root] module.vpc.aws_subnet.outpost (expand)" -> "[root] module.vpc.var.outpost_az (expand)" 1001 | "[root] module.vpc.aws_subnet.outpost (expand)" -> "[root] module.vpc.var.outpost_subnet_assign_ipv6_address_on_creation (expand)" 1002 | "[root] module.vpc.aws_subnet.outpost (expand)" -> "[root] module.vpc.var.outpost_subnet_ipv6_prefixes (expand)" 1003 | "[root] module.vpc.aws_subnet.outpost (expand)" -> "[root] module.vpc.var.outpost_subnet_suffix (expand)" 1004 | "[root] module.vpc.aws_subnet.outpost (expand)" -> "[root] module.vpc.var.outpost_subnet_tags (expand)" 1005 | "[root] module.vpc.aws_subnet.outpost (expand)" -> "[root] module.vpc.var.outpost_subnets (expand)" 1006 | "[root] module.vpc.aws_subnet.private (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 1007 | "[root] module.vpc.aws_subnet.private (expand)" -> "[root] module.vpc.var.assign_ipv6_address_on_creation (expand)" 1008 | "[root] module.vpc.aws_subnet.private (expand)" -> "[root] module.vpc.var.azs (expand)" 1009 | "[root] module.vpc.aws_subnet.private (expand)" -> "[root] module.vpc.var.private_subnet_assign_ipv6_address_on_creation (expand)" 1010 | "[root] module.vpc.aws_subnet.private (expand)" -> "[root] module.vpc.var.private_subnet_ipv6_prefixes (expand)" 1011 | "[root] module.vpc.aws_subnet.private (expand)" -> "[root] module.vpc.var.private_subnet_suffix (expand)" 1012 | "[root] module.vpc.aws_subnet.private (expand)" -> "[root] module.vpc.var.private_subnet_tags (expand)" 1013 | "[root] module.vpc.aws_subnet.private (expand)" -> "[root] module.vpc.var.private_subnets (expand)" 1014 | "[root] module.vpc.aws_subnet.public (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 1015 | "[root] module.vpc.aws_subnet.public (expand)" -> "[root] module.vpc.var.assign_ipv6_address_on_creation (expand)" 1016 | "[root] module.vpc.aws_subnet.public (expand)" -> "[root] module.vpc.var.azs (expand)" 1017 | "[root] module.vpc.aws_subnet.public (expand)" -> "[root] module.vpc.var.map_public_ip_on_launch (expand)" 1018 | "[root] module.vpc.aws_subnet.public (expand)" -> "[root] module.vpc.var.one_nat_gateway_per_az (expand)" 1019 | "[root] module.vpc.aws_subnet.public (expand)" -> "[root] module.vpc.var.public_subnet_assign_ipv6_address_on_creation (expand)" 1020 | "[root] module.vpc.aws_subnet.public (expand)" -> "[root] module.vpc.var.public_subnet_ipv6_prefixes (expand)" 1021 | "[root] module.vpc.aws_subnet.public (expand)" -> "[root] module.vpc.var.public_subnet_suffix (expand)" 1022 | "[root] module.vpc.aws_subnet.public (expand)" -> "[root] module.vpc.var.public_subnet_tags (expand)" 1023 | "[root] module.vpc.aws_subnet.public (expand)" -> "[root] module.vpc.var.public_subnets (expand)" 1024 | "[root] module.vpc.aws_subnet.redshift (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 1025 | "[root] module.vpc.aws_subnet.redshift (expand)" -> "[root] module.vpc.var.assign_ipv6_address_on_creation (expand)" 1026 | "[root] module.vpc.aws_subnet.redshift (expand)" -> "[root] module.vpc.var.azs (expand)" 1027 | "[root] module.vpc.aws_subnet.redshift (expand)" -> "[root] module.vpc.var.redshift_subnet_assign_ipv6_address_on_creation (expand)" 1028 | "[root] module.vpc.aws_subnet.redshift (expand)" -> "[root] module.vpc.var.redshift_subnet_ipv6_prefixes (expand)" 1029 | "[root] module.vpc.aws_subnet.redshift (expand)" -> "[root] module.vpc.var.redshift_subnet_suffix (expand)" 1030 | "[root] module.vpc.aws_subnet.redshift (expand)" -> "[root] module.vpc.var.redshift_subnet_tags (expand)" 1031 | "[root] module.vpc.aws_subnet.redshift (expand)" -> "[root] module.vpc.var.redshift_subnets (expand)" 1032 | "[root] module.vpc.aws_vpc.this (expand)" -> "[root] module.vpc.var.cidr (expand)" 1033 | "[root] module.vpc.aws_vpc.this (expand)" -> "[root] module.vpc.var.create_vpc (expand)" 1034 | "[root] module.vpc.aws_vpc.this (expand)" -> "[root] module.vpc.var.enable_classiclink (expand)" 1035 | "[root] module.vpc.aws_vpc.this (expand)" -> "[root] module.vpc.var.enable_classiclink_dns_support (expand)" 1036 | "[root] module.vpc.aws_vpc.this (expand)" -> "[root] module.vpc.var.enable_dns_hostnames (expand)" 1037 | "[root] module.vpc.aws_vpc.this (expand)" -> "[root] module.vpc.var.enable_dns_support (expand)" 1038 | "[root] module.vpc.aws_vpc.this (expand)" -> "[root] module.vpc.var.enable_ipv6 (expand)" 1039 | "[root] module.vpc.aws_vpc.this (expand)" -> "[root] module.vpc.var.instance_tenancy (expand)" 1040 | "[root] module.vpc.aws_vpc.this (expand)" -> "[root] module.vpc.var.name (expand)" 1041 | "[root] module.vpc.aws_vpc.this (expand)" -> "[root] module.vpc.var.tags (expand)" 1042 | "[root] module.vpc.aws_vpc.this (expand)" -> "[root] module.vpc.var.vpc_tags (expand)" 1043 | "[root] module.vpc.aws_vpc.this (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 1044 | "[root] module.vpc.aws_vpc_dhcp_options.this (expand)" -> "[root] module.vpc.var.create_vpc (expand)" 1045 | "[root] module.vpc.aws_vpc_dhcp_options.this (expand)" -> "[root] module.vpc.var.dhcp_options_domain_name (expand)" 1046 | "[root] module.vpc.aws_vpc_dhcp_options.this (expand)" -> "[root] module.vpc.var.dhcp_options_domain_name_servers (expand)" 1047 | "[root] module.vpc.aws_vpc_dhcp_options.this (expand)" -> "[root] module.vpc.var.dhcp_options_netbios_name_servers (expand)" 1048 | "[root] module.vpc.aws_vpc_dhcp_options.this (expand)" -> "[root] module.vpc.var.dhcp_options_netbios_node_type (expand)" 1049 | "[root] module.vpc.aws_vpc_dhcp_options.this (expand)" -> "[root] module.vpc.var.dhcp_options_ntp_servers (expand)" 1050 | "[root] module.vpc.aws_vpc_dhcp_options.this (expand)" -> "[root] module.vpc.var.dhcp_options_tags (expand)" 1051 | "[root] module.vpc.aws_vpc_dhcp_options.this (expand)" -> "[root] module.vpc.var.enable_dhcp_options (expand)" 1052 | "[root] module.vpc.aws_vpc_dhcp_options.this (expand)" -> "[root] module.vpc.var.name (expand)" 1053 | "[root] module.vpc.aws_vpc_dhcp_options.this (expand)" -> "[root] module.vpc.var.tags (expand)" 1054 | "[root] module.vpc.aws_vpc_dhcp_options.this (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 1055 | "[root] module.vpc.aws_vpc_dhcp_options_association.this (expand)" -> "[root] module.vpc.aws_vpc_dhcp_options.this (expand)" 1056 | "[root] module.vpc.aws_vpc_dhcp_options_association.this (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 1057 | "[root] module.vpc.aws_vpc_ipv4_cidr_block_association.this (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 1058 | "[root] module.vpc.aws_vpc_ipv4_cidr_block_association.this (expand)" -> "[root] module.vpc.var.secondary_cidr_blocks (expand)" 1059 | "[root] module.vpc.aws_vpn_gateway.this (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 1060 | "[root] module.vpc.aws_vpn_gateway.this (expand)" -> "[root] module.vpc.var.amazon_side_asn (expand)" 1061 | "[root] module.vpc.aws_vpn_gateway.this (expand)" -> "[root] module.vpc.var.enable_vpn_gateway (expand)" 1062 | "[root] module.vpc.aws_vpn_gateway.this (expand)" -> "[root] module.vpc.var.vpn_gateway_az (expand)" 1063 | "[root] module.vpc.aws_vpn_gateway.this (expand)" -> "[root] module.vpc.var.vpn_gateway_tags (expand)" 1064 | "[root] module.vpc.aws_vpn_gateway_attachment.this (expand)" -> "[root] module.vpc.local.vpc_id (expand)" 1065 | "[root] module.vpc.aws_vpn_gateway_attachment.this (expand)" -> "[root] module.vpc.var.vpn_gateway_id (expand)" 1066 | "[root] module.vpc.aws_vpn_gateway_route_propagation.intra (expand)" -> "[root] module.vpc.aws_route_table.intra (expand)" 1067 | "[root] module.vpc.aws_vpn_gateway_route_propagation.intra (expand)" -> "[root] module.vpc.aws_vpn_gateway.this (expand)" 1068 | "[root] module.vpc.aws_vpn_gateway_route_propagation.intra (expand)" -> "[root] module.vpc.aws_vpn_gateway_attachment.this (expand)" 1069 | "[root] module.vpc.aws_vpn_gateway_route_propagation.intra (expand)" -> "[root] module.vpc.var.propagate_intra_route_tables_vgw (expand)" 1070 | "[root] module.vpc.aws_vpn_gateway_route_propagation.private (expand)" -> "[root] module.vpc.aws_route_table.private (expand)" 1071 | "[root] module.vpc.aws_vpn_gateway_route_propagation.private (expand)" -> "[root] module.vpc.aws_vpn_gateway.this (expand)" 1072 | "[root] module.vpc.aws_vpn_gateway_route_propagation.private (expand)" -> "[root] module.vpc.aws_vpn_gateway_attachment.this (expand)" 1073 | "[root] module.vpc.aws_vpn_gateway_route_propagation.private (expand)" -> "[root] module.vpc.var.propagate_private_route_tables_vgw (expand)" 1074 | "[root] module.vpc.aws_vpn_gateway_route_propagation.public (expand)" -> "[root] module.vpc.aws_route_table.public (expand)" 1075 | "[root] module.vpc.aws_vpn_gateway_route_propagation.public (expand)" -> "[root] module.vpc.aws_vpn_gateway.this (expand)" 1076 | "[root] module.vpc.aws_vpn_gateway_route_propagation.public (expand)" -> "[root] module.vpc.aws_vpn_gateway_attachment.this (expand)" 1077 | "[root] module.vpc.aws_vpn_gateway_route_propagation.public (expand)" -> "[root] module.vpc.var.propagate_public_route_tables_vgw (expand)" 1078 | "[root] module.vpc.data.aws_iam_policy_document.flow_log_cloudwatch_assume_role (expand)" -> "[root] module.vpc.local.create_flow_log_cloudwatch_iam_role (expand)" 1079 | "[root] module.vpc.data.aws_iam_policy_document.flow_log_cloudwatch_assume_role (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 1080 | "[root] module.vpc.data.aws_iam_policy_document.vpc_flow_log_cloudwatch (expand)" -> "[root] module.vpc.local.create_flow_log_cloudwatch_iam_role (expand)" 1081 | "[root] module.vpc.data.aws_iam_policy_document.vpc_flow_log_cloudwatch (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" 1082 | "[root] module.vpc.local.create_flow_log_cloudwatch_iam_role (expand)" -> "[root] module.vpc.local.enable_flow_log (expand)" 1083 | "[root] module.vpc.local.create_flow_log_cloudwatch_iam_role (expand)" -> "[root] module.vpc.var.create_flow_log_cloudwatch_iam_role (expand)" 1084 | "[root] module.vpc.local.create_flow_log_cloudwatch_iam_role (expand)" -> "[root] module.vpc.var.flow_log_destination_type (expand)" 1085 | "[root] module.vpc.local.create_flow_log_cloudwatch_log_group (expand)" -> "[root] module.vpc.local.enable_flow_log (expand)" 1086 | "[root] module.vpc.local.create_flow_log_cloudwatch_log_group (expand)" -> "[root] module.vpc.var.create_flow_log_cloudwatch_log_group (expand)" 1087 | "[root] module.vpc.local.create_flow_log_cloudwatch_log_group (expand)" -> "[root] module.vpc.var.flow_log_destination_type (expand)" 1088 | "[root] module.vpc.local.enable_flow_log (expand)" -> "[root] module.vpc.var.create_vpc (expand)" 1089 | "[root] module.vpc.local.enable_flow_log (expand)" -> "[root] module.vpc.var.enable_flow_log (expand)" 1090 | "[root] module.vpc.local.flow_log_destination_arn (expand)" -> "[root] module.vpc.aws_cloudwatch_log_group.flow_log (expand)" 1091 | "[root] module.vpc.local.flow_log_destination_arn (expand)" -> "[root] module.vpc.var.flow_log_destination_arn (expand)" 1092 | "[root] module.vpc.local.flow_log_iam_role_arn (expand)" -> "[root] module.vpc.aws_iam_role.vpc_flow_log_cloudwatch (expand)" 1093 | "[root] module.vpc.local.flow_log_iam_role_arn (expand)" -> "[root] module.vpc.var.flow_log_cloudwatch_iam_role_arn (expand)" 1094 | "[root] module.vpc.local.max_subnet_length (expand)" -> "[root] module.vpc.var.database_subnets (expand)" 1095 | "[root] module.vpc.local.max_subnet_length (expand)" -> "[root] module.vpc.var.elasticache_subnets (expand)" 1096 | "[root] module.vpc.local.max_subnet_length (expand)" -> "[root] module.vpc.var.private_subnets (expand)" 1097 | "[root] module.vpc.local.max_subnet_length (expand)" -> "[root] module.vpc.var.redshift_subnets (expand)" 1098 | "[root] module.vpc.local.nat_gateway_count (expand)" -> "[root] module.vpc.local.max_subnet_length (expand)" 1099 | "[root] module.vpc.local.nat_gateway_count (expand)" -> "[root] module.vpc.var.azs (expand)" 1100 | "[root] module.vpc.local.nat_gateway_count (expand)" -> "[root] module.vpc.var.one_nat_gateway_per_az (expand)" 1101 | "[root] module.vpc.local.nat_gateway_count (expand)" -> "[root] module.vpc.var.single_nat_gateway (expand)" 1102 | "[root] module.vpc.local.nat_gateway_ips (expand)" -> "[root] module.vpc.aws_eip.nat (expand)" 1103 | "[root] module.vpc.local.nat_gateway_ips (expand)" -> "[root] module.vpc.var.external_nat_ip_ids (expand)" 1104 | "[root] module.vpc.local.vpc_id (expand)" -> "[root] module.vpc.aws_vpc_ipv4_cidr_block_association.this (expand)" 1105 | "[root] module.vpc.output.azs (expand)" -> "[root] module.vpc.var.azs (expand)" 1106 | "[root] module.vpc.output.cgw_arns (expand)" -> "[root] module.vpc.aws_customer_gateway.this (expand)" 1107 | "[root] module.vpc.output.cgw_ids (expand)" -> "[root] module.vpc.aws_customer_gateway.this (expand)" 1108 | "[root] module.vpc.output.database_internet_gateway_route_id (expand)" -> "[root] module.vpc.aws_route.database_internet_gateway (expand)" 1109 | "[root] module.vpc.output.database_ipv6_egress_route_id (expand)" -> "[root] module.vpc.aws_route.database_ipv6_egress (expand)" 1110 | "[root] module.vpc.output.database_nat_gateway_route_ids (expand)" -> "[root] module.vpc.aws_route.database_nat_gateway (expand)" 1111 | "[root] module.vpc.output.database_network_acl_arn (expand)" -> "[root] module.vpc.aws_network_acl.database (expand)" 1112 | "[root] module.vpc.output.database_network_acl_id (expand)" -> "[root] module.vpc.aws_network_acl.database (expand)" 1113 | "[root] module.vpc.output.database_route_table_association_ids (expand)" -> "[root] module.vpc.aws_route_table_association.database (expand)" 1114 | "[root] module.vpc.output.database_route_table_ids (expand)" -> "[root] module.vpc.aws_route_table.database (expand)" 1115 | "[root] module.vpc.output.database_route_table_ids (expand)" -> "[root] module.vpc.aws_route_table.private (expand)" 1116 | "[root] module.vpc.output.database_subnet_arns (expand)" -> "[root] module.vpc.aws_subnet.database (expand)" 1117 | "[root] module.vpc.output.database_subnet_group (expand)" -> "[root] module.vpc.aws_db_subnet_group.database (expand)" 1118 | "[root] module.vpc.output.database_subnet_group_name (expand)" -> "[root] module.vpc.aws_db_subnet_group.database (expand)" 1119 | "[root] module.vpc.output.database_subnets (expand)" -> "[root] module.vpc.aws_subnet.database (expand)" 1120 | "[root] module.vpc.output.database_subnets_cidr_blocks (expand)" -> "[root] module.vpc.aws_subnet.database (expand)" 1121 | "[root] module.vpc.output.database_subnets_ipv6_cidr_blocks (expand)" -> "[root] module.vpc.aws_subnet.database (expand)" 1122 | "[root] module.vpc.output.default_network_acl_id (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 1123 | "[root] module.vpc.output.default_route_table_id (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 1124 | "[root] module.vpc.output.default_security_group_id (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 1125 | "[root] module.vpc.output.default_vpc_arn (expand)" -> "[root] module.vpc.aws_default_vpc.this (expand)" 1126 | "[root] module.vpc.output.default_vpc_cidr_block (expand)" -> "[root] module.vpc.aws_default_vpc.this (expand)" 1127 | "[root] module.vpc.output.default_vpc_default_network_acl_id (expand)" -> "[root] module.vpc.aws_default_vpc.this (expand)" 1128 | "[root] module.vpc.output.default_vpc_default_route_table_id (expand)" -> "[root] module.vpc.aws_default_vpc.this (expand)" 1129 | "[root] module.vpc.output.default_vpc_default_security_group_id (expand)" -> "[root] module.vpc.aws_default_vpc.this (expand)" 1130 | "[root] module.vpc.output.default_vpc_enable_dns_hostnames (expand)" -> "[root] module.vpc.aws_default_vpc.this (expand)" 1131 | "[root] module.vpc.output.default_vpc_enable_dns_support (expand)" -> "[root] module.vpc.aws_default_vpc.this (expand)" 1132 | "[root] module.vpc.output.default_vpc_id (expand)" -> "[root] module.vpc.aws_default_vpc.this (expand)" 1133 | "[root] module.vpc.output.default_vpc_instance_tenancy (expand)" -> "[root] module.vpc.aws_default_vpc.this (expand)" 1134 | "[root] module.vpc.output.default_vpc_main_route_table_id (expand)" -> "[root] module.vpc.aws_default_vpc.this (expand)" 1135 | "[root] module.vpc.output.egress_only_internet_gateway_id (expand)" -> "[root] module.vpc.aws_egress_only_internet_gateway.this (expand)" 1136 | "[root] module.vpc.output.elasticache_network_acl_arn (expand)" -> "[root] module.vpc.aws_network_acl.elasticache (expand)" 1137 | "[root] module.vpc.output.elasticache_network_acl_id (expand)" -> "[root] module.vpc.aws_network_acl.elasticache (expand)" 1138 | "[root] module.vpc.output.elasticache_route_table_association_ids (expand)" -> "[root] module.vpc.aws_route_table_association.elasticache (expand)" 1139 | "[root] module.vpc.output.elasticache_route_table_ids (expand)" -> "[root] module.vpc.aws_route_table.elasticache (expand)" 1140 | "[root] module.vpc.output.elasticache_route_table_ids (expand)" -> "[root] module.vpc.aws_route_table.private (expand)" 1141 | "[root] module.vpc.output.elasticache_subnet_arns (expand)" -> "[root] module.vpc.aws_subnet.elasticache (expand)" 1142 | "[root] module.vpc.output.elasticache_subnet_group (expand)" -> "[root] module.vpc.aws_elasticache_subnet_group.elasticache (expand)" 1143 | "[root] module.vpc.output.elasticache_subnet_group_name (expand)" -> "[root] module.vpc.aws_elasticache_subnet_group.elasticache (expand)" 1144 | "[root] module.vpc.output.elasticache_subnets (expand)" -> "[root] module.vpc.aws_subnet.elasticache (expand)" 1145 | "[root] module.vpc.output.elasticache_subnets_cidr_blocks (expand)" -> "[root] module.vpc.aws_subnet.elasticache (expand)" 1146 | "[root] module.vpc.output.elasticache_subnets_ipv6_cidr_blocks (expand)" -> "[root] module.vpc.aws_subnet.elasticache (expand)" 1147 | "[root] module.vpc.output.igw_arn (expand)" -> "[root] module.vpc.aws_internet_gateway.this (expand)" 1148 | "[root] module.vpc.output.igw_id (expand)" -> "[root] module.vpc.aws_internet_gateway.this (expand)" 1149 | "[root] module.vpc.output.intra_network_acl_arn (expand)" -> "[root] module.vpc.aws_network_acl.intra (expand)" 1150 | "[root] module.vpc.output.intra_network_acl_id (expand)" -> "[root] module.vpc.aws_network_acl.intra (expand)" 1151 | "[root] module.vpc.output.intra_route_table_association_ids (expand)" -> "[root] module.vpc.aws_route_table_association.intra (expand)" 1152 | "[root] module.vpc.output.intra_route_table_ids (expand)" -> "[root] module.vpc.aws_route_table.intra (expand)" 1153 | "[root] module.vpc.output.intra_subnet_arns (expand)" -> "[root] module.vpc.aws_subnet.intra (expand)" 1154 | "[root] module.vpc.output.intra_subnets (expand)" -> "[root] module.vpc.aws_subnet.intra (expand)" 1155 | "[root] module.vpc.output.intra_subnets_cidr_blocks (expand)" -> "[root] module.vpc.aws_subnet.intra (expand)" 1156 | "[root] module.vpc.output.intra_subnets_ipv6_cidr_blocks (expand)" -> "[root] module.vpc.aws_subnet.intra (expand)" 1157 | "[root] module.vpc.output.name (expand)" -> "[root] module.vpc.var.name (expand)" 1158 | "[root] module.vpc.output.nat_ids (expand)" -> "[root] module.vpc.aws_eip.nat (expand)" 1159 | "[root] module.vpc.output.nat_public_ips (expand)" -> "[root] module.vpc.aws_eip.nat (expand)" 1160 | "[root] module.vpc.output.nat_public_ips (expand)" -> "[root] module.vpc.var.external_nat_ips (expand)" 1161 | "[root] module.vpc.output.natgw_ids (expand)" -> "[root] module.vpc.aws_nat_gateway.this (expand)" 1162 | "[root] module.vpc.output.outpost_network_acl_arn (expand)" -> "[root] module.vpc.aws_network_acl.outpost (expand)" 1163 | "[root] module.vpc.output.outpost_network_acl_id (expand)" -> "[root] module.vpc.aws_network_acl.outpost (expand)" 1164 | "[root] module.vpc.output.outpost_subnet_arns (expand)" -> "[root] module.vpc.aws_subnet.outpost (expand)" 1165 | "[root] module.vpc.output.outpost_subnets (expand)" -> "[root] module.vpc.aws_subnet.outpost (expand)" 1166 | "[root] module.vpc.output.outpost_subnets_cidr_blocks (expand)" -> "[root] module.vpc.aws_subnet.outpost (expand)" 1167 | "[root] module.vpc.output.outpost_subnets_ipv6_cidr_blocks (expand)" -> "[root] module.vpc.aws_subnet.outpost (expand)" 1168 | "[root] module.vpc.output.private_ipv6_egress_route_ids (expand)" -> "[root] module.vpc.aws_route.private_ipv6_egress (expand)" 1169 | "[root] module.vpc.output.private_nat_gateway_route_ids (expand)" -> "[root] module.vpc.aws_route.private_nat_gateway (expand)" 1170 | "[root] module.vpc.output.private_network_acl_arn (expand)" -> "[root] module.vpc.aws_network_acl.private (expand)" 1171 | "[root] module.vpc.output.private_network_acl_id (expand)" -> "[root] module.vpc.aws_network_acl.private (expand)" 1172 | "[root] module.vpc.output.private_route_table_association_ids (expand)" -> "[root] module.vpc.aws_route_table_association.private (expand)" 1173 | "[root] module.vpc.output.private_route_table_ids (expand)" -> "[root] module.vpc.aws_route_table.private (expand)" 1174 | "[root] module.vpc.output.private_subnet_arns (expand)" -> "[root] module.vpc.aws_subnet.private (expand)" 1175 | "[root] module.vpc.output.private_subnets (expand)" -> "[root] module.vpc.aws_subnet.private (expand)" 1176 | "[root] module.vpc.output.private_subnets_cidr_blocks (expand)" -> "[root] module.vpc.aws_subnet.private (expand)" 1177 | "[root] module.vpc.output.private_subnets_ipv6_cidr_blocks (expand)" -> "[root] module.vpc.aws_subnet.private (expand)" 1178 | "[root] module.vpc.output.public_internet_gateway_ipv6_route_id (expand)" -> "[root] module.vpc.aws_route.public_internet_gateway_ipv6 (expand)" 1179 | "[root] module.vpc.output.public_internet_gateway_route_id (expand)" -> "[root] module.vpc.aws_route.public_internet_gateway (expand)" 1180 | "[root] module.vpc.output.public_network_acl_arn (expand)" -> "[root] module.vpc.aws_network_acl.public (expand)" 1181 | "[root] module.vpc.output.public_network_acl_id (expand)" -> "[root] module.vpc.aws_network_acl.public (expand)" 1182 | "[root] module.vpc.output.public_route_table_association_ids (expand)" -> "[root] module.vpc.aws_route_table_association.public (expand)" 1183 | "[root] module.vpc.output.public_route_table_ids (expand)" -> "[root] module.vpc.aws_route_table.public (expand)" 1184 | "[root] module.vpc.output.public_subnet_arns (expand)" -> "[root] module.vpc.aws_subnet.public (expand)" 1185 | "[root] module.vpc.output.public_subnets (expand)" -> "[root] module.vpc.aws_subnet.public (expand)" 1186 | "[root] module.vpc.output.public_subnets_cidr_blocks (expand)" -> "[root] module.vpc.aws_subnet.public (expand)" 1187 | "[root] module.vpc.output.public_subnets_ipv6_cidr_blocks (expand)" -> "[root] module.vpc.aws_subnet.public (expand)" 1188 | "[root] module.vpc.output.redshift_network_acl_arn (expand)" -> "[root] module.vpc.aws_network_acl.redshift (expand)" 1189 | "[root] module.vpc.output.redshift_network_acl_id (expand)" -> "[root] module.vpc.aws_network_acl.redshift (expand)" 1190 | "[root] module.vpc.output.redshift_public_route_table_association_ids (expand)" -> "[root] module.vpc.aws_route_table_association.redshift_public (expand)" 1191 | "[root] module.vpc.output.redshift_route_table_association_ids (expand)" -> "[root] module.vpc.aws_route_table_association.redshift (expand)" 1192 | "[root] module.vpc.output.redshift_route_table_ids (expand)" -> "[root] module.vpc.aws_route_table.private (expand)" 1193 | "[root] module.vpc.output.redshift_route_table_ids (expand)" -> "[root] module.vpc.aws_route_table.redshift (expand)" 1194 | "[root] module.vpc.output.redshift_subnet_arns (expand)" -> "[root] module.vpc.aws_subnet.redshift (expand)" 1195 | "[root] module.vpc.output.redshift_subnet_group (expand)" -> "[root] module.vpc.aws_redshift_subnet_group.redshift (expand)" 1196 | "[root] module.vpc.output.redshift_subnets (expand)" -> "[root] module.vpc.aws_subnet.redshift (expand)" 1197 | "[root] module.vpc.output.redshift_subnets_cidr_blocks (expand)" -> "[root] module.vpc.aws_subnet.redshift (expand)" 1198 | "[root] module.vpc.output.redshift_subnets_ipv6_cidr_blocks (expand)" -> "[root] module.vpc.aws_subnet.redshift (expand)" 1199 | "[root] module.vpc.output.this_customer_gateway (expand)" -> "[root] module.vpc.aws_customer_gateway.this (expand)" 1200 | "[root] module.vpc.output.vgw_arn (expand)" -> "[root] module.vpc.aws_vpn_gateway.this (expand)" 1201 | "[root] module.vpc.output.vgw_id (expand)" -> "[root] module.vpc.aws_vpn_gateway.this (expand)" 1202 | "[root] module.vpc.output.vgw_id (expand)" -> "[root] module.vpc.aws_vpn_gateway_attachment.this (expand)" 1203 | "[root] module.vpc.output.vpc_arn (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 1204 | "[root] module.vpc.output.vpc_cidr_block (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 1205 | "[root] module.vpc.output.vpc_enable_dns_hostnames (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 1206 | "[root] module.vpc.output.vpc_enable_dns_support (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 1207 | "[root] module.vpc.output.vpc_flow_log_cloudwatch_iam_role_arn (expand)" -> "[root] module.vpc.local.flow_log_iam_role_arn (expand)" 1208 | "[root] module.vpc.output.vpc_flow_log_destination_arn (expand)" -> "[root] module.vpc.local.flow_log_destination_arn (expand)" 1209 | "[root] module.vpc.output.vpc_flow_log_destination_type (expand)" -> "[root] module.vpc.var.flow_log_destination_type (expand)" 1210 | "[root] module.vpc.output.vpc_flow_log_id (expand)" -> "[root] module.vpc.aws_flow_log.this (expand)" 1211 | "[root] module.vpc.output.vpc_id (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 1212 | "[root] module.vpc.output.vpc_instance_tenancy (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 1213 | "[root] module.vpc.output.vpc_ipv6_association_id (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 1214 | "[root] module.vpc.output.vpc_ipv6_cidr_block (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 1215 | "[root] module.vpc.output.vpc_main_route_table_id (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 1216 | "[root] module.vpc.output.vpc_owner_id (expand)" -> "[root] module.vpc.aws_vpc.this (expand)" 1217 | "[root] module.vpc.output.vpc_secondary_cidr_blocks (expand)" -> "[root] module.vpc.aws_vpc_ipv4_cidr_block_association.this (expand)" 1218 | "[root] module.vpc.var.amazon_side_asn (expand)" -> "[root] module.vpc (expand)" 1219 | "[root] module.vpc.var.assign_ipv6_address_on_creation (expand)" -> "[root] module.vpc (expand)" 1220 | "[root] module.vpc.var.azs (expand)" -> "[root] data.aws_availability_zones.available (expand)" 1221 | "[root] module.vpc.var.azs (expand)" -> "[root] module.vpc (expand)" 1222 | "[root] module.vpc.var.cidr (expand)" -> "[root] module.vpc (expand)" 1223 | "[root] module.vpc.var.create_database_internet_gateway_route (expand)" -> "[root] module.vpc (expand)" 1224 | "[root] module.vpc.var.create_database_nat_gateway_route (expand)" -> "[root] module.vpc (expand)" 1225 | "[root] module.vpc.var.create_database_subnet_group (expand)" -> "[root] module.vpc (expand)" 1226 | "[root] module.vpc.var.create_database_subnet_route_table (expand)" -> "[root] module.vpc (expand)" 1227 | "[root] module.vpc.var.create_egress_only_igw (expand)" -> "[root] module.vpc (expand)" 1228 | "[root] module.vpc.var.create_elasticache_subnet_group (expand)" -> "[root] module.vpc (expand)" 1229 | "[root] module.vpc.var.create_elasticache_subnet_route_table (expand)" -> "[root] module.vpc (expand)" 1230 | "[root] module.vpc.var.create_flow_log_cloudwatch_iam_role (expand)" -> "[root] module.vpc (expand)" 1231 | "[root] module.vpc.var.create_flow_log_cloudwatch_log_group (expand)" -> "[root] module.vpc (expand)" 1232 | "[root] module.vpc.var.create_igw (expand)" -> "[root] module.vpc (expand)" 1233 | "[root] module.vpc.var.create_redshift_subnet_group (expand)" -> "[root] module.vpc (expand)" 1234 | "[root] module.vpc.var.create_redshift_subnet_route_table (expand)" -> "[root] module.vpc (expand)" 1235 | "[root] module.vpc.var.create_vpc (expand)" -> "[root] module.vpc (expand)" 1236 | "[root] module.vpc.var.customer_gateway_tags (expand)" -> "[root] module.vpc (expand)" 1237 | "[root] module.vpc.var.customer_gateways (expand)" -> "[root] module.vpc (expand)" 1238 | "[root] module.vpc.var.database_acl_tags (expand)" -> "[root] module.vpc (expand)" 1239 | "[root] module.vpc.var.database_dedicated_network_acl (expand)" -> "[root] module.vpc (expand)" 1240 | "[root] module.vpc.var.database_inbound_acl_rules (expand)" -> "[root] module.vpc (expand)" 1241 | "[root] module.vpc.var.database_outbound_acl_rules (expand)" -> "[root] module.vpc (expand)" 1242 | "[root] module.vpc.var.database_route_table_tags (expand)" -> "[root] module.vpc (expand)" 1243 | "[root] module.vpc.var.database_subnet_assign_ipv6_address_on_creation (expand)" -> "[root] module.vpc (expand)" 1244 | "[root] module.vpc.var.database_subnet_group_tags (expand)" -> "[root] module.vpc (expand)" 1245 | "[root] module.vpc.var.database_subnet_ipv6_prefixes (expand)" -> "[root] module.vpc (expand)" 1246 | "[root] module.vpc.var.database_subnet_suffix (expand)" -> "[root] module.vpc (expand)" 1247 | "[root] module.vpc.var.database_subnet_tags (expand)" -> "[root] module.vpc (expand)" 1248 | "[root] module.vpc.var.database_subnets (expand)" -> "[root] module.vpc (expand)" 1249 | "[root] module.vpc.var.default_network_acl_egress (expand)" -> "[root] module.vpc (expand)" 1250 | "[root] module.vpc.var.default_network_acl_ingress (expand)" -> "[root] module.vpc (expand)" 1251 | "[root] module.vpc.var.default_network_acl_name (expand)" -> "[root] module.vpc (expand)" 1252 | "[root] module.vpc.var.default_network_acl_tags (expand)" -> "[root] module.vpc (expand)" 1253 | "[root] module.vpc.var.default_route_table_propagating_vgws (expand)" -> "[root] module.vpc (expand)" 1254 | "[root] module.vpc.var.default_route_table_routes (expand)" -> "[root] module.vpc (expand)" 1255 | "[root] module.vpc.var.default_route_table_tags (expand)" -> "[root] module.vpc (expand)" 1256 | "[root] module.vpc.var.default_security_group_egress (expand)" -> "[root] module.vpc (expand)" 1257 | "[root] module.vpc.var.default_security_group_ingress (expand)" -> "[root] module.vpc (expand)" 1258 | "[root] module.vpc.var.default_security_group_name (expand)" -> "[root] module.vpc (expand)" 1259 | "[root] module.vpc.var.default_security_group_tags (expand)" -> "[root] module.vpc (expand)" 1260 | "[root] module.vpc.var.default_vpc_enable_classiclink (expand)" -> "[root] module.vpc (expand)" 1261 | "[root] module.vpc.var.default_vpc_enable_dns_hostnames (expand)" -> "[root] module.vpc (expand)" 1262 | "[root] module.vpc.var.default_vpc_enable_dns_support (expand)" -> "[root] module.vpc (expand)" 1263 | "[root] module.vpc.var.default_vpc_name (expand)" -> "[root] module.vpc (expand)" 1264 | "[root] module.vpc.var.default_vpc_tags (expand)" -> "[root] module.vpc (expand)" 1265 | "[root] module.vpc.var.dhcp_options_domain_name (expand)" -> "[root] module.vpc (expand)" 1266 | "[root] module.vpc.var.dhcp_options_domain_name_servers (expand)" -> "[root] module.vpc (expand)" 1267 | "[root] module.vpc.var.dhcp_options_netbios_name_servers (expand)" -> "[root] module.vpc (expand)" 1268 | "[root] module.vpc.var.dhcp_options_netbios_node_type (expand)" -> "[root] module.vpc (expand)" 1269 | "[root] module.vpc.var.dhcp_options_ntp_servers (expand)" -> "[root] module.vpc (expand)" 1270 | "[root] module.vpc.var.dhcp_options_tags (expand)" -> "[root] module.vpc (expand)" 1271 | "[root] module.vpc.var.elasticache_acl_tags (expand)" -> "[root] module.vpc (expand)" 1272 | "[root] module.vpc.var.elasticache_dedicated_network_acl (expand)" -> "[root] module.vpc (expand)" 1273 | "[root] module.vpc.var.elasticache_inbound_acl_rules (expand)" -> "[root] module.vpc (expand)" 1274 | "[root] module.vpc.var.elasticache_outbound_acl_rules (expand)" -> "[root] module.vpc (expand)" 1275 | "[root] module.vpc.var.elasticache_route_table_tags (expand)" -> "[root] module.vpc (expand)" 1276 | "[root] module.vpc.var.elasticache_subnet_assign_ipv6_address_on_creation (expand)" -> "[root] module.vpc (expand)" 1277 | "[root] module.vpc.var.elasticache_subnet_ipv6_prefixes (expand)" -> "[root] module.vpc (expand)" 1278 | "[root] module.vpc.var.elasticache_subnet_suffix (expand)" -> "[root] module.vpc (expand)" 1279 | "[root] module.vpc.var.elasticache_subnet_tags (expand)" -> "[root] module.vpc (expand)" 1280 | "[root] module.vpc.var.elasticache_subnets (expand)" -> "[root] module.vpc (expand)" 1281 | "[root] module.vpc.var.enable_classiclink (expand)" -> "[root] module.vpc (expand)" 1282 | "[root] module.vpc.var.enable_classiclink_dns_support (expand)" -> "[root] module.vpc (expand)" 1283 | "[root] module.vpc.var.enable_dhcp_options (expand)" -> "[root] module.vpc (expand)" 1284 | "[root] module.vpc.var.enable_dns_hostnames (expand)" -> "[root] module.vpc (expand)" 1285 | "[root] module.vpc.var.enable_dns_support (expand)" -> "[root] module.vpc (expand)" 1286 | "[root] module.vpc.var.enable_flow_log (expand)" -> "[root] module.vpc (expand)" 1287 | "[root] module.vpc.var.enable_ipv6 (expand)" -> "[root] module.vpc (expand)" 1288 | "[root] module.vpc.var.enable_nat_gateway (expand)" -> "[root] module.vpc (expand)" 1289 | "[root] module.vpc.var.enable_public_redshift (expand)" -> "[root] module.vpc (expand)" 1290 | "[root] module.vpc.var.enable_vpn_gateway (expand)" -> "[root] module.vpc (expand)" 1291 | "[root] module.vpc.var.external_nat_ip_ids (expand)" -> "[root] module.vpc (expand)" 1292 | "[root] module.vpc.var.external_nat_ips (expand)" -> "[root] module.vpc (expand)" 1293 | "[root] module.vpc.var.flow_log_cloudwatch_iam_role_arn (expand)" -> "[root] module.vpc (expand)" 1294 | "[root] module.vpc.var.flow_log_cloudwatch_log_group_kms_key_id (expand)" -> "[root] module.vpc (expand)" 1295 | "[root] module.vpc.var.flow_log_cloudwatch_log_group_name_prefix (expand)" -> "[root] module.vpc (expand)" 1296 | "[root] module.vpc.var.flow_log_cloudwatch_log_group_retention_in_days (expand)" -> "[root] module.vpc (expand)" 1297 | "[root] module.vpc.var.flow_log_destination_arn (expand)" -> "[root] module.vpc (expand)" 1298 | "[root] module.vpc.var.flow_log_destination_type (expand)" -> "[root] module.vpc (expand)" 1299 | "[root] module.vpc.var.flow_log_log_format (expand)" -> "[root] module.vpc (expand)" 1300 | "[root] module.vpc.var.flow_log_max_aggregation_interval (expand)" -> "[root] module.vpc (expand)" 1301 | "[root] module.vpc.var.flow_log_traffic_type (expand)" -> "[root] module.vpc (expand)" 1302 | "[root] module.vpc.var.igw_tags (expand)" -> "[root] module.vpc (expand)" 1303 | "[root] module.vpc.var.instance_tenancy (expand)" -> "[root] module.vpc (expand)" 1304 | "[root] module.vpc.var.intra_acl_tags (expand)" -> "[root] module.vpc (expand)" 1305 | "[root] module.vpc.var.intra_dedicated_network_acl (expand)" -> "[root] module.vpc (expand)" 1306 | "[root] module.vpc.var.intra_inbound_acl_rules (expand)" -> "[root] module.vpc (expand)" 1307 | "[root] module.vpc.var.intra_outbound_acl_rules (expand)" -> "[root] module.vpc (expand)" 1308 | "[root] module.vpc.var.intra_route_table_tags (expand)" -> "[root] module.vpc (expand)" 1309 | "[root] module.vpc.var.intra_subnet_assign_ipv6_address_on_creation (expand)" -> "[root] module.vpc (expand)" 1310 | "[root] module.vpc.var.intra_subnet_ipv6_prefixes (expand)" -> "[root] module.vpc (expand)" 1311 | "[root] module.vpc.var.intra_subnet_suffix (expand)" -> "[root] module.vpc (expand)" 1312 | "[root] module.vpc.var.intra_subnet_tags (expand)" -> "[root] module.vpc (expand)" 1313 | "[root] module.vpc.var.intra_subnets (expand)" -> "[root] module.vpc (expand)" 1314 | "[root] module.vpc.var.manage_default_network_acl (expand)" -> "[root] module.vpc (expand)" 1315 | "[root] module.vpc.var.manage_default_route_table (expand)" -> "[root] module.vpc (expand)" 1316 | "[root] module.vpc.var.manage_default_security_group (expand)" -> "[root] module.vpc (expand)" 1317 | "[root] module.vpc.var.manage_default_vpc (expand)" -> "[root] module.vpc (expand)" 1318 | "[root] module.vpc.var.map_public_ip_on_launch (expand)" -> "[root] module.vpc (expand)" 1319 | "[root] module.vpc.var.name (expand)" -> "[root] module.vpc (expand)" 1320 | "[root] module.vpc.var.nat_eip_tags (expand)" -> "[root] module.vpc (expand)" 1321 | "[root] module.vpc.var.nat_gateway_tags (expand)" -> "[root] module.vpc (expand)" 1322 | "[root] module.vpc.var.one_nat_gateway_per_az (expand)" -> "[root] module.vpc (expand)" 1323 | "[root] module.vpc.var.outpost_acl_tags (expand)" -> "[root] module.vpc (expand)" 1324 | "[root] module.vpc.var.outpost_arn (expand)" -> "[root] module.vpc (expand)" 1325 | "[root] module.vpc.var.outpost_az (expand)" -> "[root] module.vpc (expand)" 1326 | "[root] module.vpc.var.outpost_dedicated_network_acl (expand)" -> "[root] module.vpc (expand)" 1327 | "[root] module.vpc.var.outpost_inbound_acl_rules (expand)" -> "[root] module.vpc (expand)" 1328 | "[root] module.vpc.var.outpost_outbound_acl_rules (expand)" -> "[root] module.vpc (expand)" 1329 | "[root] module.vpc.var.outpost_subnet_assign_ipv6_address_on_creation (expand)" -> "[root] module.vpc (expand)" 1330 | "[root] module.vpc.var.outpost_subnet_ipv6_prefixes (expand)" -> "[root] module.vpc (expand)" 1331 | "[root] module.vpc.var.outpost_subnet_suffix (expand)" -> "[root] module.vpc (expand)" 1332 | "[root] module.vpc.var.outpost_subnet_tags (expand)" -> "[root] module.vpc (expand)" 1333 | "[root] module.vpc.var.outpost_subnets (expand)" -> "[root] module.vpc (expand)" 1334 | "[root] module.vpc.var.private_acl_tags (expand)" -> "[root] module.vpc (expand)" 1335 | "[root] module.vpc.var.private_dedicated_network_acl (expand)" -> "[root] module.vpc (expand)" 1336 | "[root] module.vpc.var.private_inbound_acl_rules (expand)" -> "[root] module.vpc (expand)" 1337 | "[root] module.vpc.var.private_outbound_acl_rules (expand)" -> "[root] module.vpc (expand)" 1338 | "[root] module.vpc.var.private_route_table_tags (expand)" -> "[root] module.vpc (expand)" 1339 | "[root] module.vpc.var.private_subnet_assign_ipv6_address_on_creation (expand)" -> "[root] module.vpc (expand)" 1340 | "[root] module.vpc.var.private_subnet_ipv6_prefixes (expand)" -> "[root] module.vpc (expand)" 1341 | "[root] module.vpc.var.private_subnet_suffix (expand)" -> "[root] module.vpc (expand)" 1342 | "[root] module.vpc.var.private_subnet_tags (expand)" -> "[root] local.cluster_name (expand)" 1343 | "[root] module.vpc.var.private_subnet_tags (expand)" -> "[root] module.vpc (expand)" 1344 | "[root] module.vpc.var.private_subnets (expand)" -> "[root] module.vpc (expand)" 1345 | "[root] module.vpc.var.propagate_intra_route_tables_vgw (expand)" -> "[root] module.vpc (expand)" 1346 | "[root] module.vpc.var.propagate_private_route_tables_vgw (expand)" -> "[root] module.vpc (expand)" 1347 | "[root] module.vpc.var.propagate_public_route_tables_vgw (expand)" -> "[root] module.vpc (expand)" 1348 | "[root] module.vpc.var.public_acl_tags (expand)" -> "[root] module.vpc (expand)" 1349 | "[root] module.vpc.var.public_dedicated_network_acl (expand)" -> "[root] module.vpc (expand)" 1350 | "[root] module.vpc.var.public_inbound_acl_rules (expand)" -> "[root] module.vpc (expand)" 1351 | "[root] module.vpc.var.public_outbound_acl_rules (expand)" -> "[root] module.vpc (expand)" 1352 | "[root] module.vpc.var.public_route_table_tags (expand)" -> "[root] module.vpc (expand)" 1353 | "[root] module.vpc.var.public_subnet_assign_ipv6_address_on_creation (expand)" -> "[root] module.vpc (expand)" 1354 | "[root] module.vpc.var.public_subnet_ipv6_prefixes (expand)" -> "[root] module.vpc (expand)" 1355 | "[root] module.vpc.var.public_subnet_suffix (expand)" -> "[root] module.vpc (expand)" 1356 | "[root] module.vpc.var.public_subnet_tags (expand)" -> "[root] local.cluster_name (expand)" 1357 | "[root] module.vpc.var.public_subnet_tags (expand)" -> "[root] module.vpc (expand)" 1358 | "[root] module.vpc.var.public_subnets (expand)" -> "[root] module.vpc (expand)" 1359 | "[root] module.vpc.var.redshift_acl_tags (expand)" -> "[root] module.vpc (expand)" 1360 | "[root] module.vpc.var.redshift_dedicated_network_acl (expand)" -> "[root] module.vpc (expand)" 1361 | "[root] module.vpc.var.redshift_inbound_acl_rules (expand)" -> "[root] module.vpc (expand)" 1362 | "[root] module.vpc.var.redshift_outbound_acl_rules (expand)" -> "[root] module.vpc (expand)" 1363 | "[root] module.vpc.var.redshift_route_table_tags (expand)" -> "[root] module.vpc (expand)" 1364 | "[root] module.vpc.var.redshift_subnet_assign_ipv6_address_on_creation (expand)" -> "[root] module.vpc (expand)" 1365 | "[root] module.vpc.var.redshift_subnet_group_tags (expand)" -> "[root] module.vpc (expand)" 1366 | "[root] module.vpc.var.redshift_subnet_ipv6_prefixes (expand)" -> "[root] module.vpc (expand)" 1367 | "[root] module.vpc.var.redshift_subnet_suffix (expand)" -> "[root] module.vpc (expand)" 1368 | "[root] module.vpc.var.redshift_subnet_tags (expand)" -> "[root] module.vpc (expand)" 1369 | "[root] module.vpc.var.redshift_subnets (expand)" -> "[root] module.vpc (expand)" 1370 | "[root] module.vpc.var.reuse_nat_ips (expand)" -> "[root] module.vpc (expand)" 1371 | "[root] module.vpc.var.secondary_cidr_blocks (expand)" -> "[root] module.vpc (expand)" 1372 | "[root] module.vpc.var.single_nat_gateway (expand)" -> "[root] module.vpc (expand)" 1373 | "[root] module.vpc.var.tags (expand)" -> "[root] module.vpc (expand)" 1374 | "[root] module.vpc.var.vpc_flow_log_permissions_boundary (expand)" -> "[root] module.vpc (expand)" 1375 | "[root] module.vpc.var.vpc_flow_log_tags (expand)" -> "[root] module.vpc (expand)" 1376 | "[root] module.vpc.var.vpc_tags (expand)" -> "[root] module.vpc (expand)" 1377 | "[root] module.vpc.var.vpn_gateway_az (expand)" -> "[root] module.vpc (expand)" 1378 | "[root] module.vpc.var.vpn_gateway_id (expand)" -> "[root] module.vpc (expand)" 1379 | "[root] module.vpc.var.vpn_gateway_tags (expand)" -> "[root] module.vpc (expand)" 1380 | "[root] output.eks_cluster_iam_role_arn" -> "[root] module.eks.output.cluster_iam_role_arn (expand)" 1381 | "[root] output.eks_cluster_iam_role_name" -> "[root] module.eks.output.cluster_iam_role_name (expand)" 1382 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_iam_group_policy_attachment.attach_EksAllAccess_to_group (expand)" 1383 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_iam_group_policy_attachment.attach_IamFullKF_to_group (expand)" 1384 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_iam_group_policy_attachment.attach_IamLimited_to_group (expand)" 1385 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.eks.aws_autoscaling_group.workers (expand)" 1386 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.eks.aws_autoscaling_group.workers_launch_template (expand)" 1387 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.eks.aws_iam_openid_connect_provider.oidc_provider (expand)" 1388 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.eks.aws_iam_role_policy_attachment.cluster_elb_sl_role_creation (expand)" 1389 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.eks.module.fargate.aws_eks_fargate_profile.this (expand)" 1390 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.eks.module.fargate.aws_iam_role_policy_attachment.eks_fargate_pod (expand)" 1391 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.eks.module.node_groups.aws_eks_node_group.workers (expand)" 1392 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_customer_gateway.this (expand)" 1393 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_db_subnet_group.database (expand)" 1394 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_default_network_acl.this (expand)" 1395 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_default_route_table.default (expand)" 1396 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_default_security_group.this (expand)" 1397 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_default_vpc.this (expand)" 1398 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_elasticache_subnet_group.elasticache (expand)" 1399 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_flow_log.this (expand)" 1400 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_iam_role_policy_attachment.vpc_flow_log_cloudwatch (expand)" 1401 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_network_acl_rule.database_inbound (expand)" 1402 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_network_acl_rule.database_outbound (expand)" 1403 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_network_acl_rule.elasticache_inbound (expand)" 1404 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_network_acl_rule.elasticache_outbound (expand)" 1405 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_network_acl_rule.intra_inbound (expand)" 1406 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_network_acl_rule.intra_outbound (expand)" 1407 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_network_acl_rule.outpost_inbound (expand)" 1408 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_network_acl_rule.outpost_outbound (expand)" 1409 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_network_acl_rule.private_inbound (expand)" 1410 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_network_acl_rule.private_outbound (expand)" 1411 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_network_acl_rule.public_inbound (expand)" 1412 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_network_acl_rule.public_outbound (expand)" 1413 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_network_acl_rule.redshift_inbound (expand)" 1414 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_network_acl_rule.redshift_outbound (expand)" 1415 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_redshift_subnet_group.redshift (expand)" 1416 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_route.database_internet_gateway (expand)" 1417 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_route.database_ipv6_egress (expand)" 1418 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_route.database_nat_gateway (expand)" 1419 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_route.private_ipv6_egress (expand)" 1420 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_route.private_nat_gateway (expand)" 1421 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_route.public_internet_gateway (expand)" 1422 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_route.public_internet_gateway_ipv6 (expand)" 1423 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_route_table_association.database (expand)" 1424 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_route_table_association.elasticache (expand)" 1425 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_route_table_association.intra (expand)" 1426 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_route_table_association.outpost (expand)" 1427 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_route_table_association.private (expand)" 1428 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_route_table_association.public (expand)" 1429 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_route_table_association.redshift (expand)" 1430 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_route_table_association.redshift_public (expand)" 1431 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_vpc_dhcp_options_association.this (expand)" 1432 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_vpn_gateway_route_propagation.intra (expand)" 1433 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_vpn_gateway_route_propagation.private (expand)" 1434 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] module.vpc.aws_vpn_gateway_route_propagation.public (expand)" 1435 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" -> "[root] var.aws_profile" 1436 | "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" -> "[root] var.aws_region" 1437 | "[root] provider[\"registry.terraform.io/hashicorp/kubernetes\"] (close)" -> "[root] module.eks.kubernetes_config_map.aws_auth (expand)" 1438 | "[root] provider[\"registry.terraform.io/hashicorp/kubernetes\"]" -> "[root] data.aws_eks_cluster.cluster (expand)" 1439 | "[root] provider[\"registry.terraform.io/hashicorp/kubernetes\"]" -> "[root] data.aws_eks_cluster_auth.cluster (expand)" 1440 | "[root] provider[\"registry.terraform.io/hashicorp/local\"] (close)" -> "[root] module.eks.local_file.kubeconfig (expand)" 1441 | "[root] provider[\"registry.terraform.io/hashicorp/null\"] (close)" -> "[root] module.eks.null_resource.wait_for_cluster (expand)" 1442 | "[root] provider[\"registry.terraform.io/hashicorp/random\"] (close)" -> "[root] module.eks.module.node_groups.random_pet.node_groups (expand)" 1443 | "[root] provider[\"registry.terraform.io/hashicorp/random\"] (close)" -> "[root] module.eks.random_pet.workers (expand)" 1444 | "[root] provider[\"registry.terraform.io/hashicorp/random\"] (close)" -> "[root] module.eks.random_pet.workers_launch_template (expand)" 1445 | "[root] provider[\"registry.terraform.io/hashicorp/template\"] (close)" -> "[root] module.eks.data.template_file.launch_template_userdata (expand)" 1446 | "[root] provider[\"registry.terraform.io/hashicorp/template\"] (close)" -> "[root] module.eks.data.template_file.userdata (expand)" 1447 | "[root] root" -> "[root] meta.count-boundary (EachMode fixup)" 1448 | "[root] root" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" 1449 | "[root] root" -> "[root] provider[\"registry.terraform.io/hashicorp/kubernetes\"] (close)" 1450 | "[root] root" -> "[root] provider[\"registry.terraform.io/hashicorp/local\"] (close)" 1451 | "[root] root" -> "[root] provider[\"registry.terraform.io/hashicorp/null\"] (close)" 1452 | "[root] root" -> "[root] provider[\"registry.terraform.io/hashicorp/random\"] (close)" 1453 | "[root] root" -> "[root] provider[\"registry.terraform.io/hashicorp/template\"] (close)" 1454 | } 1455 | } 1456 | 1457 | --------------------------------------------------------------------------------