Closed achrstl closed 5 years ago
Thanks for filing an issue.
Please attach the terraform plan
so we can see what it tried to create
Hello, Please find attached the terraform plan:
[33m
[1m[33mWarning: [0m[0m[1mmodule.jenkins.module.cicd.data.aws_region.default: "current": [DEPRECATED] Defaults to current provider region if no other filtering is enabled[0m
[0m[0m[0m
[33m
[1m[33mWarning: [0m[0m[1mmodule.jenkins.module.cicd.module.build.data.aws_region.default: "current": [DEPRECATED] Defaults to current provider region if no other filtering is enabled[0m
[0m[0m[0m
[33m
[1m[33mWarning: [0m[0m[1mmodule.jenkins.module.efs_backup.data.aws_region.default: "current": [DEPRECATED] Defaults to current provider region if no other filtering is enabled[0m
[0m[0m[0m
[33m
[1m[33mWarning: [0m[0m[1mmodule.jenkins.module.elastic_beanstalk_environment.data.aws_region.default: "current": [DEPRECATED] Defaults to current provider region if no other filtering is enabled[0m
[0m[0m[0m
[0m[1mRefreshing Terraform state in-memory prior to plan...[0m
The refreshed state will be used to calculate this plan, but will not be
persisted to local or remote state storage.
[0m
[0m[1mdata.aws_caller_identity.default: Refreshing state...[0m
[0m[1mdata.aws_iam_policy_document.default: Refreshing state...[0m
[0m[1mdata.aws_region.default: Refreshing state...[0m
[0m[1mdata.aws_iam_policy_document.resource_role: Refreshing state...[0m
[0m[1mdata.aws_iam_policy_document.role: Refreshing state...[0m
[0m[1mdata.aws_iam_policy_document.default: Refreshing state...[0m
[0m[1mdata.aws_region.default: Refreshing state...[0m
[0m[1mdata.aws_availability_zones.available: Refreshing state...[0m
[0m[1mdata.aws_caller_identity.default: Refreshing state...[0m
[0m[1mdata.aws_iam_policy_document.assume: Refreshing state...[0m
[0m[1mdata.aws_region.default: Refreshing state...[0m
[0m[1mdata.aws_ami.amazon_linux: Refreshing state...[0m
[0m[1mdata.aws_iam_policy_document.role: Refreshing state...[0m
[0m[1mdata.aws_availability_zones.available: Refreshing state...[0m
[0m[1mdata.aws_region.default: Refreshing state...[0m
[0m[1mdata.aws_iam_policy_document.assume_role: Refreshing state...[0m
[0m[1mdata.aws_elb_service_account.main: Refreshing state...[0m
[0m[1mdata.aws_iam_policy_document.permissions: Refreshing state...[0m
[0m[1mdata.aws_iam_policy_document.service: Refreshing state...[0m
[0m[1mdata.aws_iam_policy_document.ec2: Refreshing state...[0m
[0m[1mdata.aws_iam_policy_document.slaves: Refreshing state...[0m
------------------------------------------------------------------------
An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
[32m+[0m create
[33m~[0m update in-place
[36m<=[0m read (data resources)
[0m
Terraform will perform the following actions:
[32m [32m+[0m [32mmodule.jenkins.aws_iam_policy.slaves
[0m id: <computed>
arn: <computed>
description: "Policy for EC2 instance profile to allow launching Jenkins slaves"
name: "cp-prod-jenkins-slaves"
path: "/"
policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"AllowLaunchingEC2Instances\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"iam:PassRole\",\n \"ec2:TerminateInstances\",\n \"ec2:StopInstances\",\n \"ec2:StartInstances\",\n \"ec2:RunInstances\",\n \"ec2:RequestSpotInstances\",\n \"ec2:GetConsoleOutput\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeSpotInstanceRequests\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeKeyPairs\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeImages\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DeleteTags\",\n \"ec2:CreateTags\",\n \"ec2:CancelSpotInstanceRequests\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.aws_iam_role_policy_attachment.slaves
[0m id: <computed>
policy_arn: "${aws_iam_policy.slaves.arn}"
role: "cp-prod-jenkins-eb-env-ec2"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.aws_security_group.slaves
[0m id: <computed>
arn: <computed>
description: "Security Group for Jenkins EC2 slaves"
egress.#: "1"
egress.482069346.cidr_blocks.#: "1"
egress.482069346.cidr_blocks.0: "0.0.0.0/0"
egress.482069346.description: ""
egress.482069346.from_port: "0"
egress.482069346.ipv6_cidr_blocks.#: "0"
egress.482069346.prefix_list_ids.#: "0"
egress.482069346.protocol: "-1"
egress.482069346.security_groups.#: "0"
egress.482069346.self: "false"
egress.482069346.to_port: "0"
ingress.#: "2"
ingress.2281976595.cidr_blocks.#: "0"
ingress.2281976595.description: ""
ingress.2281976595.from_port: "0"
ingress.2281976595.ipv6_cidr_blocks.#: "0"
ingress.2281976595.protocol: "-1"
ingress.2281976595.security_groups.#: "0"
ingress.2281976595.self: "false"
ingress.2281976595.to_port: "0"
ingress.~3457728489.cidr_blocks.#: "0"
ingress.~3457728489.description: ""
ingress.~3457728489.from_port: "22"
ingress.~3457728489.ipv6_cidr_blocks.#: "0"
ingress.~3457728489.protocol: "tcp"
ingress.~3457728489.security_groups.#: <computed>
ingress.~3457728489.self: "false"
ingress.~3457728489.to_port: "22"
name: "cp-prod-jenkins-slaves"
owner_id: <computed>
revoke_rules_on_delete: "false"
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-slaves"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc_id: "${var.vpc_id}"
[0m
[0m[33m [33m~[0m [33mmodule.subnets.data.aws_vpc.default
[0m id: "" => "${var.vpc_id}"
cidr_block: "" => <computed>
default: "" => <computed>
dhcp_options_id: "" => <computed>
enable_dns_hostnames: "" => <computed>
enable_dns_support: "" => <computed>
instance_tenancy: "" => <computed>
ipv6_association_id: "" => <computed>
ipv6_cidr_block: "" => <computed>
state: "" => <computed>
tags.%: "" => <computed>
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_eip.default[0]
[0m id: <computed>
allocation_id: <computed>
association_id: <computed>
domain: <computed>
instance: <computed>
network_interface: <computed>
private_ip: <computed>
public_ip: <computed>
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-private"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc: "true"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_eip.default[1]
[0m id: <computed>
allocation_id: <computed>
association_id: <computed>
domain: <computed>
instance: <computed>
network_interface: <computed>
private_ip: <computed>
public_ip: <computed>
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-private"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc: "true"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_nat_gateway.default[0]
[0m id: <computed>
allocation_id: "${element(aws_eip.default.*.id, count.index)}"
network_interface_id: <computed>
private_ip: <computed>
public_ip: <computed>
subnet_id: "${element(aws_subnet.public.*.id, count.index)}"
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins"
tags.Namespace: "cp"
tags.Stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_nat_gateway.default[1]
[0m id: <computed>
allocation_id: "${element(aws_eip.default.*.id, count.index)}"
network_interface_id: <computed>
private_ip: <computed>
public_ip: <computed>
subnet_id: "${element(aws_subnet.public.*.id, count.index)}"
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins"
tags.Namespace: "cp"
tags.Stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_network_acl.private
[0m id: <computed>
egress.#: "1"
egress.1401401844.action: "allow"
egress.1401401844.cidr_block: "0.0.0.0/0"
egress.1401401844.from_port: "0"
egress.1401401844.icmp_code: ""
egress.1401401844.icmp_type: ""
egress.1401401844.ipv6_cidr_block: ""
egress.1401401844.protocol: "-1"
egress.1401401844.rule_no: "100"
egress.1401401844.to_port: "0"
ingress.#: "1"
ingress.1401401844.action: "allow"
ingress.1401401844.cidr_block: "0.0.0.0/0"
ingress.1401401844.from_port: "0"
ingress.1401401844.icmp_code: ""
ingress.1401401844.icmp_type: ""
ingress.1401401844.ipv6_cidr_block: ""
ingress.1401401844.protocol: "-1"
ingress.1401401844.rule_no: "100"
ingress.1401401844.to_port: "0"
subnet_ids.#: <computed>
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-private"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc_id: "${var.vpc_id}"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_network_acl.public
[0m id: <computed>
egress.#: "1"
egress.1401401844.action: "allow"
egress.1401401844.cidr_block: "0.0.0.0/0"
egress.1401401844.from_port: "0"
egress.1401401844.icmp_code: ""
egress.1401401844.icmp_type: ""
egress.1401401844.ipv6_cidr_block: ""
egress.1401401844.protocol: "-1"
egress.1401401844.rule_no: "100"
egress.1401401844.to_port: "0"
ingress.#: "1"
ingress.1401401844.action: "allow"
ingress.1401401844.cidr_block: "0.0.0.0/0"
ingress.1401401844.from_port: "0"
ingress.1401401844.icmp_code: ""
ingress.1401401844.icmp_type: ""
ingress.1401401844.ipv6_cidr_block: ""
ingress.1401401844.protocol: "-1"
ingress.1401401844.rule_no: "100"
ingress.1401401844.to_port: "0"
subnet_ids.#: <computed>
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-public"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc_id: "${var.vpc_id}"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_route.default[0]
[0m id: <computed>
destination_cidr_block: "0.0.0.0/0"
destination_prefix_list_id: <computed>
egress_only_gateway_id: <computed>
gateway_id: <computed>
instance_id: <computed>
instance_owner_id: <computed>
nat_gateway_id: "${element(aws_nat_gateway.default.*.id, count.index)}"
network_interface_id: <computed>
origin: <computed>
route_table_id: "${element(aws_route_table.private.*.id, count.index)}"
state: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_route.default[1]
[0m id: <computed>
destination_cidr_block: "0.0.0.0/0"
destination_prefix_list_id: <computed>
egress_only_gateway_id: <computed>
gateway_id: <computed>
instance_id: <computed>
instance_owner_id: <computed>
nat_gateway_id: "${element(aws_nat_gateway.default.*.id, count.index)}"
network_interface_id: <computed>
origin: <computed>
route_table_id: "${element(aws_route_table.private.*.id, count.index)}"
state: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_route_table.private[0]
[0m id: <computed>
propagating_vgws.#: <computed>
route.#: <computed>
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-private"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc_id: "${data.aws_vpc.default.id}"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_route_table.private[1]
[0m id: <computed>
propagating_vgws.#: <computed>
route.#: <computed>
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-private"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc_id: "${data.aws_vpc.default.id}"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_route_table.public
[0m id: <computed>
propagating_vgws.#: <computed>
route.#: "1"
route.~3478046702.cidr_block: "0.0.0.0/0"
route.~3478046702.egress_only_gateway_id: ""
route.~3478046702.gateway_id: "${var.igw_id}"
route.~3478046702.instance_id: ""
route.~3478046702.ipv6_cidr_block: ""
route.~3478046702.nat_gateway_id: ""
route.~3478046702.network_interface_id: ""
route.~3478046702.vpc_peering_connection_id: ""
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-public"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc_id: "${data.aws_vpc.default.id}"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_route_table_association.private[0]
[0m id: <computed>
route_table_id: "${element(aws_route_table.private.*.id, count.index)}"
subnet_id: "${element(aws_subnet.private.*.id, count.index)}"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_route_table_association.private[1]
[0m id: <computed>
route_table_id: "${element(aws_route_table.private.*.id, count.index)}"
subnet_id: "${element(aws_subnet.private.*.id, count.index)}"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_route_table_association.public[0]
[0m id: <computed>
route_table_id: "${aws_route_table.public.id}"
subnet_id: "${element(aws_subnet.public.*.id, count.index)}"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_route_table_association.public[1]
[0m id: <computed>
route_table_id: "${aws_route_table.public.id}"
subnet_id: "${element(aws_subnet.public.*.id, count.index)}"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_subnet.private[0]
[0m id: <computed>
assign_ipv6_address_on_creation: "false"
availability_zone: "eu-west-1a"
cidr_block: "${cidrsubnet(signum(length(var.cidr_block)) == 1 ? var.cidr_block : data.aws_vpc.default.cidr_block, ceil(log(local.private_subnet_count * 2, 2)), count.index)}"
ipv6_cidr_block: <computed>
ipv6_cidr_block_association_id: <computed>
map_public_ip_on_launch: "false"
tags.%: "3"
tags.Name: "cp-prod-subnet-private-eu-west-1a"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc_id: "${data.aws_vpc.default.id}"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_subnet.private[1]
[0m id: <computed>
assign_ipv6_address_on_creation: "false"
availability_zone: "eu-west-1b"
cidr_block: "${cidrsubnet(signum(length(var.cidr_block)) == 1 ? var.cidr_block : data.aws_vpc.default.cidr_block, ceil(log(local.private_subnet_count * 2, 2)), count.index)}"
ipv6_cidr_block: <computed>
ipv6_cidr_block_association_id: <computed>
map_public_ip_on_launch: "false"
tags.%: "3"
tags.Name: "cp-prod-subnet-private-eu-west-1b"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc_id: "${data.aws_vpc.default.id}"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_subnet.public[0]
[0m id: <computed>
assign_ipv6_address_on_creation: "false"
availability_zone: "eu-west-1a"
cidr_block: "${cidrsubnet(signum(length(var.cidr_block)) == 1 ? var.cidr_block : data.aws_vpc.default.cidr_block, ceil(log(local.public_subnet_count * 2, 2)), local.public_subnet_count + count.index)}"
ipv6_cidr_block: <computed>
ipv6_cidr_block_association_id: <computed>
map_public_ip_on_launch: "false"
tags.%: "3"
tags.Name: "cp-prod-jenkins-public-eu-west-1a"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc_id: "${data.aws_vpc.default.id}"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.aws_subnet.public[1]
[0m id: <computed>
assign_ipv6_address_on_creation: "false"
availability_zone: "eu-west-1b"
cidr_block: "${cidrsubnet(signum(length(var.cidr_block)) == 1 ? var.cidr_block : data.aws_vpc.default.cidr_block, ceil(log(local.public_subnet_count * 2, 2)), local.public_subnet_count + count.index)}"
ipv6_cidr_block: <computed>
ipv6_cidr_block_association_id: <computed>
map_public_ip_on_launch: "false"
tags.%: "3"
tags.Name: "cp-prod-jenkins-public-eu-west-1b"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc_id: "${data.aws_vpc.default.id}"
[0m
[0m[32m [32m+[0m [32mmodule.vpc.aws_internet_gateway.default
[0m id: <computed>
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc_id: "${aws_vpc.default.id}"
[0m
[0m[32m [32m+[0m [32mmodule.vpc.aws_vpc.default
[0m id: <computed>
assign_generated_ipv6_cidr_block: "true"
cidr_block: "10.0.0.0/16"
default_network_acl_id: <computed>
default_route_table_id: <computed>
default_security_group_id: <computed>
dhcp_options_id: <computed>
enable_classiclink: "false"
enable_classiclink_dns_support: "false"
enable_dns_hostnames: "true"
enable_dns_support: "true"
instance_tenancy: "default"
ipv6_association_id: <computed>
ipv6_cidr_block: <computed>
main_route_table_id: <computed>
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins"
tags.Namespace: "cp"
tags.Stage: "prod"
[0m
[0m[36m [36m<=[0m [36mmodule.jenkins.module.cicd.data.aws_iam_policy_document.codebuild
[0m id: <computed>
json: <computed>
statement.#: "1"
statement.0.actions.#: "1"
statement.0.actions.900907778: "codebuild:*"
statement.0.effect: "Allow"
statement.0.resources.#: <computed>
[0m
[0m[36m [36m<=[0m [36mmodule.jenkins.module.cicd.data.aws_iam_policy_document.s3
[0m id: <computed>
json: <computed>
statement.#: "1"
statement.0.actions.#: "4"
statement.0.actions.2071725391: "s3:GetObject"
statement.0.actions.315547055: "s3:PutObject"
statement.0.actions.3372930952: "s3:GetBucketVersioning"
statement.0.actions.3671464554: "s3:GetObjectVersion"
statement.0.effect: "Allow"
statement.0.resources.#: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.aws_codepipeline.source_build_deploy
[0m id: <computed>
arn: <computed>
artifact_store.#: "1"
artifact_store.0.location: "cp-prod-jenkins-cicd"
artifact_store.0.type: "S3"
name: "cp-prod-jenkins-cicd"
role_arn: "${aws_iam_role.default.arn}"
stage.#: "3"
stage.0.action.#: "1"
stage.0.action.0.category: "Source"
stage.0.action.0.configuration.%: "5"
stage.0.action.0.configuration.Branch: "master"
stage.0.action.0.configuration.OAuthToken: ""
stage.0.action.0.configuration.Owner: "cloudposse"
stage.0.action.0.configuration.PollForSourceChanges: "true"
stage.0.action.0.configuration.Repo: "jenkins"
stage.0.action.0.name: "Source"
stage.0.action.0.output_artifacts.#: "1"
stage.0.action.0.output_artifacts.0: "code"
stage.0.action.0.owner: "ThirdParty"
stage.0.action.0.provider: "GitHub"
stage.0.action.0.run_order: <computed>
stage.0.action.0.version: "1"
stage.0.name: "Source"
stage.1.action.#: "1"
stage.1.action.0.category: "Build"
stage.1.action.0.configuration.%: "1"
stage.1.action.0.configuration.ProjectName: "cp-prod-jenkins-cicd-build"
stage.1.action.0.input_artifacts.#: "1"
stage.1.action.0.input_artifacts.0: "code"
stage.1.action.0.name: "Build"
stage.1.action.0.output_artifacts.#: "1"
stage.1.action.0.output_artifacts.0: "package"
stage.1.action.0.owner: "AWS"
stage.1.action.0.provider: "CodeBuild"
stage.1.action.0.run_order: <computed>
stage.1.action.0.version: "1"
stage.1.name: "Build"
stage.2.action.#: "1"
stage.2.action.0.category: "Deploy"
stage.2.action.0.configuration.%: "2"
stage.2.action.0.configuration.ApplicationName: "cp-prod-jenkins-eb-app"
stage.2.action.0.configuration.EnvironmentName: "cp-prod-jenkins-eb-env"
stage.2.action.0.input_artifacts.#: "1"
stage.2.action.0.input_artifacts.0: "package"
stage.2.action.0.name: "Deploy"
stage.2.action.0.owner: "AWS"
stage.2.action.0.provider: "ElasticBeanstalk"
stage.2.action.0.run_order: <computed>
stage.2.action.0.version: "1"
stage.2.name: "Deploy"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.aws_iam_policy.codebuild
[0m id: <computed>
arn: <computed>
name: "cp-prod-jenkins-cicd-codebuild"
path: "/"
policy: "${data.aws_iam_policy_document.codebuild.json}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.aws_iam_policy.default
[0m id: <computed>
arn: <computed>
name: "cp-prod-jenkins-cicd"
path: "/"
policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"sqs:*\",\n \"sns:*\",\n \"s3:*\",\n \"rds:*\",\n \"iam:PassRole\",\n \"elasticloadbalancing:*\",\n \"elasticbeanstalk:*\",\n \"ecs:*\",\n \"ec2:*\",\n \"cloudwatch:*\",\n \"cloudformation:*\",\n \"autoscaling:*\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.aws_iam_policy.s3
[0m id: <computed>
arn: <computed>
name: "cp-prod-jenkins-cicd-s3"
path: "/"
policy: "${data.aws_iam_policy_document.s3.json}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.aws_iam_role.default
[0m id: <computed>
arn: <computed>
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"codepipeline.amazonaws.com\"\n }\n }\n ]\n}"
create_date: <computed>
force_detach_policies: "false"
max_session_duration: "3600"
name: "cp-prod-jenkins-cicd"
path: "/"
unique_id: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.aws_iam_role_policy_attachment.codebuild
[0m id: <computed>
policy_arn: "${aws_iam_policy.codebuild.arn}"
role: "${aws_iam_role.default.id}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.aws_iam_role_policy_attachment.codebuild_s3
[0m id: <computed>
policy_arn: "${aws_iam_policy.s3.arn}"
role: "${module.build.role_arn}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.aws_iam_role_policy_attachment.default
[0m id: <computed>
policy_arn: "${aws_iam_policy.default.arn}"
role: "${aws_iam_role.default.id}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.aws_iam_role_policy_attachment.s3
[0m id: <computed>
policy_arn: "${aws_iam_policy.s3.arn}"
role: "${aws_iam_role.default.id}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.aws_s3_bucket.default
[0m id: <computed>
acceleration_status: <computed>
acl: "private"
arn: <computed>
bucket: "cp-prod-jenkins-cicd"
bucket_domain_name: <computed>
bucket_regional_domain_name: <computed>
force_destroy: "false"
hosted_zone_id: <computed>
region: <computed>
request_payer: <computed>
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-cicd"
tags.Namespace: "cp"
tags.Stage: "prod"
versioning.#: <computed>
website_domain: <computed>
website_endpoint: <computed>
[0m
[0m[36m [36m<=[0m [36mmodule.jenkins.module.ecr.data.aws_iam_policy_document.default_ecr
[0m id: <computed>
json: <computed>
statement.#: "1"
statement.0.actions.#: "11"
statement.0.actions.1035341934: "ecr:DescribeRepositories"
statement.0.actions.1813900036: "ecr:BatchCheckLayerAvailability"
statement.0.actions.2578429660: "ecr:UploadLayerPart"
statement.0.actions.2610373158: "ecr:GetDownloadUrlForLayer"
statement.0.actions.356957045: "ecr:InitiateLayerUpload"
statement.0.actions.3658911630: "ecr:DescribeImages"
statement.0.actions.3752287614: "ecr:GetAuthorizationToken"
statement.0.actions.4234869000: "ecr:BatchGetImage"
statement.0.actions.4272682636: "ecr:ListImages"
statement.0.actions.490001327: "ecr:CompleteLayerUpload"
statement.0.actions.977834259: "ecr:PutImage"
statement.0.effect: "Allow"
statement.0.principals.#: "1"
statement.0.principals.~3303760437.identifiers.#: <computed>
statement.0.principals.~3303760437.type: "AWS"
statement.0.sid: "ecr"
[0m
[0m[36m [36m<=[0m [36mmodule.jenkins.module.ecr.data.aws_iam_policy_document.token
[0m id: <computed>
json: <computed>
statement.#: "1"
statement.0.actions.#: "1"
statement.0.actions.3752287614: "ecr:GetAuthorizationToken"
statement.0.effect: "Allow"
statement.0.resources.#: <computed>
statement.0.sid: "ECRGetAuthorizationToken"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.ecr.aws_ecr_lifecycle_policy.default
[0m id: <computed>
policy: "{\n \"rules\": [{\n \"rulePriority\": 1,\n \"description\": \"Rotate images when reach 7 images stored\",\n \"selection\": {\n \"tagStatus\": \"tagged\",\n \"tagPrefixList\": [\"prod\"],\n \"countType\": \"imageCountMoreThan\",\n \"countNumber\": 7\n },\n \"action\": {\n \"type\": \"expire\"\n }\n }]\n}\n"
registry_id: <computed>
repository: "cp-prod-jenkins-ecr"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.ecr.aws_ecr_repository.default
[0m id: <computed>
arn: <computed>
name: "cp-prod-jenkins-ecr"
registry_id: <computed>
repository_url: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.ecr.aws_ecr_repository_policy.default_ecr
[0m id: <computed>
policy: "${data.aws_iam_policy_document.default_ecr.json}"
registry_id: <computed>
repository: "cp-prod-jenkins-ecr"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.ecr.aws_iam_instance_profile.default
[0m id: <computed>
arn: <computed>
create_date: <computed>
name: "cp-prod-jenkins-ecr"
path: "/"
role: "cp-prod-jenkins-ecr"
roles.#: <computed>
unique_id: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.ecr.aws_iam_policy.default
[0m id: <computed>
arn: <computed>
description: "Allow IAM Users to call ecr:GetAuthorizationToken"
name: "cp-prod-jenkins-ecr"
path: "/"
policy: "${data.aws_iam_policy_document.token.json}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.ecr.aws_iam_role.default
[0m id: <computed>
arn: <computed>
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EC2AssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n }\n }\n ]\n}"
create_date: <computed>
force_detach_policies: "false"
max_session_duration: "3600"
name: "cp-prod-jenkins-ecr"
path: "/"
unique_id: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.ecr.aws_iam_role_policy_attachment.default_ecr
[0m id: <computed>
policy_arn: "${aws_iam_policy.default.arn}"
role: "cp-prod-jenkins-ecr"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs.aws_efs_file_system.default
[0m id: <computed>
creation_token: <computed>
dns_name: <computed>
encrypted: <computed>
kms_key_id: <computed>
performance_mode: <computed>
reference_name: <computed>
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-efs"
tags.Namespace: "cp"
tags.Stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs.aws_efs_mount_target.default[0]
[0m id: <computed>
dns_name: <computed>
file_system_id: "${aws_efs_file_system.default.id}"
ip_address: <computed>
network_interface_id: <computed>
security_groups.#: <computed>
subnet_id: "${element(var.subnets, count.index)}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs.aws_efs_mount_target.default[1]
[0m id: <computed>
dns_name: <computed>
file_system_id: "${aws_efs_file_system.default.id}"
ip_address: <computed>
network_interface_id: <computed>
security_groups.#: <computed>
subnet_id: "${element(var.subnets, count.index)}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs.aws_security_group.default
[0m id: <computed>
arn: <computed>
description: "EFS"
egress.#: "1"
egress.482069346.cidr_blocks.#: "1"
egress.482069346.cidr_blocks.0: "0.0.0.0/0"
egress.482069346.description: ""
egress.482069346.from_port: "0"
egress.482069346.ipv6_cidr_blocks.#: "0"
egress.482069346.prefix_list_ids.#: "0"
egress.482069346.protocol: "-1"
egress.482069346.security_groups.#: "0"
egress.482069346.self: "false"
egress.482069346.to_port: "0"
ingress.#: "1"
ingress.~1623186873.cidr_blocks.#: "0"
ingress.~1623186873.description: ""
ingress.~1623186873.from_port: "2049"
ingress.~1623186873.ipv6_cidr_blocks.#: "0"
ingress.~1623186873.protocol: "tcp"
ingress.~1623186873.security_groups.#: <computed>
ingress.~1623186873.self: "false"
ingress.~1623186873.to_port: "2049"
name: "cp-prod-jenkins-efs"
owner_id: <computed>
revoke_rules_on_delete: "false"
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-efs"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc_id: "${var.vpc_id}"
[0m
[0m[36m [36m<=[0m [36mmodule.jenkins.module.efs_backup.data.aws_efs_mount_target.default
[0m id: <computed>
dns_name: <computed>
file_system_id: <computed>
ip_address: <computed>
mount_target_id: "${var.efs_mount_target_id}"
network_interface_id: <computed>
security_groups.#: <computed>
subnet_id: <computed>
[0m
[0m[36m [36m<=[0m [36mmodule.jenkins.module.efs_backup.data.aws_subnet_ids.default
[0m id: <computed>
ids.#: <computed>
tags.%: <computed>
vpc_id: "${data.aws_vpc.default.id}"
[0m
[0m[33m [33m~[0m [33mmodule.jenkins.module.efs_backup.data.aws_vpc.default
[0m id: "" => "${var.vpc_id}"
cidr_block: "" => <computed>
default: "" => <computed>
dhcp_options_id: "" => <computed>
enable_dns_hostnames: "" => <computed>
enable_dns_support: "" => <computed>
instance_tenancy: "" => <computed>
ipv6_association_id: "" => <computed>
ipv6_cidr_block: "" => <computed>
state: "" => <computed>
tags.%: "" => <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.aws_cloudformation_stack.datapipeline
[0m id: <computed>
name: "cp-prod-jenkins-efs-backup-datapipeline"
outputs.%: <computed>
parameters.%: <computed>
policy_body: <computed>
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-efs-backup-datapipeline"
tags.Namespace: "cp"
tags.Stage: "prod"
template_body: "---\nAWSTemplateFormatVersion: 2010-09-09\nDescription: DataPipeline EFS Backup DataPipeline Template\n\nParameters:\n myS3BackupsBucket:\n Type: String\n mySecurityGroupId:\n Type: AWS::EC2::SecurityGroup::Id\n mySubnetId:\n Type: AWS::EC2::Subnet::Id\n myInstanceType:\n Type: String\n myEFSHost:\n Type: String\n myRegion:\n Type: String\n myImageId:\n Type: AWS::EC2::Image::Id\n myTopicArn:\n Type: String\n myS3LogBucket:\n Type: String\n myDataPipelineResourceRole:\n Type: String\n myDataPipelineRole:\n Type: String\n myKeyPair:\n Type: AWS::EC2::KeyPair::KeyName\n Tag:\n Type: String\n myPeriod:\n Type: String\n myExecutionTimeout:\n Type: String\n\n\nResources:\n DataPipelineEFSBackup:\n Type: AWS::DataPipeline::Pipeline\n Properties:\n Name: DataPipelineEFSBackup\n Description: DataPipeline EFS Backup\n PipelineTags:\n - Key: Name\n Value: !Ref Tag\n PipelineObjects:\n - Id: Default\n Name: Default\n Fields:\n - Key: type\n StringValue: Default\n - Key: scheduleType\n StringValue: cron\n - Key: failureAndRerunMode\n StringValue: CASCADE\n - Key: schedule\n RefValue: DefaultSchedule\n - Key: role\n StringValue: \"#{myDataPipelineRole}\"\n - Key: resourceRole\n StringValue: \"#{myDataPipelineResourceRole}\"\n - Key: pipelineLogUri\n StringValue: \"#{myS3LogBucket}\"\n - Id: EC2ResourceObj\n Name: EC2ResourceObj\n Fields:\n - Key: type\n StringValue: Ec2Resource\n - Key: terminateAfter\n StringValue: \"#{myExecutionTimeout}\"\n - Key: instanceType\n StringValue: \"#{myInstanceType}\"\n - Key: securityGroupIds\n StringValue: \"#{mySecurityGroupId}\"\n - Key: subnetId\n StringValue: \"#{mySubnetId}\"\n - Key: associatePublicIpAddress\n StringValue: \"true\"\n - Key: imageId\n StringValue: \"#{myImageId}\"\n - Key: keyPair\n StringValue: \"#{myKeyPair}\"\n - Id: DefaultSchedule\n Name: DefaultSchedule\n Fields:\n - Key: type\n StringValue: Schedule\n - Key: startAt\n StringValue: FIRST_ACTIVATION_DATE_TIME\n - Key: period\n StringValue: \"#{myPeriod}\"\n - Id: ShellCommandActivityObj\n Name: ShellCommandActivityObj\n Fields:\n - Key: type\n StringValue: ShellCommandActivity\n - Key: runsOn\n RefValue: EC2ResourceObj\n - Key: command\n StringValue: |\n source=\"$1\"\n region=\"$2\"\n destination=\"$3\"\n sudo yum -y install nfs-utils\n [[ -d /backup ]] || sudo mkdir /backup\n if ! mount -l -t nfs4 | grep -qF $source; then\n sudo mount -t nfs -o nfsvers=4.1 -o rsize=1048576 -o wsize=1048576 -o timeo=600 -o retrans=2 -o hard \"$source\":/ /backup\n fi\n sudo aws s3 sync --delete --exact-timestamps /backup/ s3://$destination/\n backup_status=\"$?\"\n # Return code 2 means that the following were skipped:\n # files/symlinks that do not exist, files that are character special devices, block special device, FIFO's, or sockets, and files that the user cannot read from\n # We need to return 0 in this case for the pipeline to succeed because all normal files were synched successfully\n # http://docs.aws.amazon.com/cli/latest/topic/return-codes.html\n # https://github.com/aws/aws-cli/issues/1125\n if [ \"$backup_status\" -eq \"2\" ]; then\n backup_status=\"0\"\n fi\n exit \"$backup_status\"\n - Key: scriptArgument\n StringValue: \"#{myEFSHost}\"\n - Key: scriptArgument\n StringValue: \"#{myRegion}\"\n - Key: scriptArgument\n StringValue: \"#{myS3BackupsBucket}\"\n - Key: onSuccess\n RefValue: SuccessNotify\n - Key: onFail\n RefValue: FailureNotify\n - Id: SuccessNotify\n Name: SuccessNotify\n Fields:\n - Key: type\n StringValue: SnsAlarm\n - Key: topicArn\n StringValue: \"#{myTopicArn}\"\n - Key: subject\n StringValue: \"[Info] EFS Backup Succeeded\"\n - Key: message\n StringValue: |\n scheduledStartTime: \"#{node.@scheduledStartTime}\"\n actualStartTime: \"#{node.@actualStartTime}\"\n actualEndTime: \"#{node.@actualEndTime}\"\n hostname: \"#{node.hostname}\"\n - Id: FailureNotify\n Name: FailureNotify\n Fields:\n - Key: type\n StringValue: SnsAlarm\n - Key: topicArn\n StringValue: \"#{myTopicArn}\"\n - Key: subject\n StringValue: \"[Alert] EFS Backup Failed\"\n - Key: message\n StringValue: |\n scheduledStartTime: \"#{node.@scheduledStartTime}\"\n actualStartTime: \"#{node.@actualStartTime}\"\n actualEndTime: \"#{node.@actualEndTime}\"\n hostname: \"#{node.hostname}\"\n ParameterObjects:\n - Id: myInstanceType\n Attributes:\n - Key: description\n StringValue: Instance type for performing the restore.\n - Key: type\n StringValue: String\n - Key: default\n StringValue: t2.micro\n - Id: myExecutionTimeout\n Attributes:\n - Key: type\n StringValue: String\n - Key: default\n StringValue: \"360 Minutes\"\n - Key: description\n StringValue: Terminate the resource after this period.\n - Id: mySubnetId\n Attributes:\n - Key: type\n StringValue: String\n - Key: default\n StringValue: subnet-1234abcd\n - Key: description\n StringValue: VPC subnet for your restoration EC2 instance (ideally the same subnet used for the backup EFS mount point).\n - Id: mySecurityGroupId\n Attributes:\n - Key: type\n StringValue: String\n - Key: default\n StringValue: sg-1111111b\n - Key: description\n StringValue: Security group that can connect to the Production/Backup EFS mount point.\n - Id: myEFSHost\n Attributes:\n - Key: type\n StringValue: String\n - Key: default\n StringValue: backup-fs-12345678\n - Key: description\n StringValue: Name for the directory that already contains your backups.\n - Id: myRegion\n Attributes:\n - Key: type\n StringValue: String\n - Key: default\n StringValue: GMT\n - Key: description\n StringValue: TimeZone\n - Id: myS3BackupsBucket\n Attributes:\n - Key: type\n StringValue: String\n - Key: default\n StringValue: s3://efs-backups\n - Key: description\n StringValue: S3 Backup Bucket\n - Id: myImageId\n Attributes:\n - Key: type\n StringValue: String\n - Key: default\n StringValue: ami-12345678\n - Key: description\n StringValue: AMI ID for the EC2 instance.\n - Id: myS3LogBucket\n Attributes:\n - Key: type\n StringValue: String\n - Key: default\n StringValue: s3://my-s3-log-bucket\n - Key: description\n StringValue: S3 Log Bucket\n - Id: myDataPipelineResourceRole\n Attributes:\n - Key: type\n StringValue: String\n - Key: default\n StringValue: DataPipelineDefaultResourceRole\n - Key: description\n StringValue: DataPipeline Resource Role\n - Id: myDataPipelineRole\n Attributes:\n - Key: type\n StringValue: String\n - Key: default\n StringValue: DataPipelineDefaultRole\n - Key: description\n StringValue: DataPipeline Role\n - Id: myTopicArn\n Attributes:\n - Key: type\n StringValue: String\n - Key: default\n StringValue: arn:aws:sns:hoge\n - Key: description\n StringValue: Topic ARN\n - Id: myKeyPair\n Attributes:\n - Key: type\n StringValue: String\n - Key: default\n StringValue: my-key\n - Key: description\n StringValue: Key Pair\n - Id: myPeriod\n Attributes:\n - Key: type\n StringValue: String\n - Key: default\n StringValue: \"1 hours\"\n - Key: description\n StringValue: How often the pipeline should run\n ParameterValues:\n - Id: myInstanceType\n StringValue: !Ref myInstanceType\n - Id: myExecutionTimeout\n StringValue: !Ref myExecutionTimeout\n - Id: mySubnetId\n StringValue: !Ref mySubnetId\n - Id: mySecurityGroupId\n StringValue: !Ref mySecurityGroupId\n - Id: myEFSHost\n StringValue: !Ref myEFSHost\n - Id: myRegion\n StringValue: !Ref myRegion\n - Id: myS3BackupsBucket\n StringValue: !Ref myS3BackupsBucket\n - Id: myImageId\n StringValue: !Ref myImageId\n - Id: myS3LogBucket\n StringValue: !Sub s3://${myS3LogBucket}\n - Id: myDataPipelineResourceRole\n StringValue: !Ref myDataPipelineResourceRole\n - Id: myDataPipelineRole\n StringValue: !Ref myDataPipelineRole\n - Id: myTopicArn\n StringValue: !Ref myTopicArn\n - Id: myKeyPair\n StringValue: !Ref myKeyPair\n - Id: myPeriod\n StringValue: !Ref myPeriod\n\nOutputs:\n DataPipelineId:\n Value: !Ref DataPipelineEFSBackup\n"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.aws_cloudformation_stack.sns
[0m id: <computed>
name: "cp-prod-jenkins-efs-backup-sns"
outputs.%: <computed>
parameters.%: "1"
parameters.Email: "me@mycompany.com"
policy_body: <computed>
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-efs-backup-sns"
tags.Namespace: "cp"
tags.Stage: "prod"
template_body: "---\nAWSTemplateFormatVersion: 2010-09-09\nDescription: DataPipeline EFS Backup SNS Template\n\nParameters:\n Email:\n Type: String\n\nResources:\n Topic:\n Type: AWS::SNS::Topic\n Properties:\n Subscription:\n - Protocol: email\n Endpoint: !Ref Email\n\nOutputs:\n TopicArn:\n Value: !Ref Topic\n"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.aws_iam_instance_profile.resource_role
[0m id: <computed>
arn: <computed>
create_date: <computed>
name: "cp-prod-jenkins-efs-backup-resource-role"
path: "/"
role: "cp-prod-jenkins-efs-backup-resource-role"
roles.#: <computed>
unique_id: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.aws_iam_role.resource_role
[0m id: <computed>
arn: <computed>
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EC2AssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n }\n }\n ]\n}"
create_date: <computed>
force_detach_policies: "false"
max_session_duration: "3600"
name: "cp-prod-jenkins-efs-backup-resource-role"
path: "/"
unique_id: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.aws_iam_role.role
[0m id: <computed>
arn: <computed>
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"AssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": [\n \"elasticmapreduce.amazonaws.com\",\n \"datapipeline.amazonaws.com\"\n ]\n }\n }\n ]\n}"
create_date: <computed>
force_detach_policies: "false"
max_session_duration: "3600"
name: "cp-prod-jenkins-efs-backup-role"
path: "/"
unique_id: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.aws_iam_role_policy_attachment.resource_role
[0m id: <computed>
policy_arn: "arn:aws:iam::aws:policy/service-role/AmazonEC2RoleforDataPipelineRole"
role: "cp-prod-jenkins-efs-backup-resource-role"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.aws_iam_role_policy_attachment.role
[0m id: <computed>
policy_arn: "arn:aws:iam::aws:policy/service-role/AWSDataPipelineRole"
role: "cp-prod-jenkins-efs-backup-role"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.aws_s3_bucket.backups
[0m id: <computed>
acceleration_status: <computed>
acl: "private"
arn: <computed>
bucket: "cp-prod-jenkins-efs-backup-backups"
bucket_domain_name: <computed>
bucket_regional_domain_name: <computed>
force_destroy: "false"
hosted_zone_id: <computed>
lifecycle_rule.#: "1"
lifecycle_rule.0.enabled: "true"
lifecycle_rule.0.id: <computed>
lifecycle_rule.0.noncurrent_version_expiration.#: "1"
lifecycle_rule.0.noncurrent_version_expiration.1048714264.days: "35"
lifecycle_rule.0.prefix: "efs"
region: <computed>
request_payer: <computed>
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-efs-backup-backups"
tags.Namespace: "cp"
tags.Stage: "prod"
versioning.#: "1"
versioning.0.enabled: "true"
versioning.0.mfa_delete: "false"
website_domain: <computed>
website_endpoint: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.aws_s3_bucket.logs
[0m id: <computed>
acceleration_status: <computed>
acl: "private"
arn: <computed>
bucket: "cp-prod-jenkins-efs-backup-logs"
bucket_domain_name: <computed>
bucket_regional_domain_name: <computed>
force_destroy: "true"
hosted_zone_id: <computed>
region: <computed>
request_payer: <computed>
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-efs-backup-logs"
tags.Namespace: "cp"
tags.Stage: "prod"
versioning.#: <computed>
website_domain: <computed>
website_endpoint: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.aws_security_group.datapipeline
[0m id: <computed>
arn: <computed>
description: "cp-prod-jenkins-efs-backup"
egress.#: "1"
egress.482069346.cidr_blocks.#: "1"
egress.482069346.cidr_blocks.0: "0.0.0.0/0"
egress.482069346.description: ""
egress.482069346.from_port: "0"
egress.482069346.ipv6_cidr_blocks.#: "0"
egress.482069346.prefix_list_ids.#: "0"
egress.482069346.protocol: "-1"
egress.482069346.security_groups.#: "0"
egress.482069346.self: "false"
egress.482069346.to_port: "0"
ingress.#: "1"
ingress.2541437006.cidr_blocks.#: "1"
ingress.2541437006.cidr_blocks.0: "0.0.0.0/0"
ingress.2541437006.description: ""
ingress.2541437006.from_port: "22"
ingress.2541437006.ipv6_cidr_blocks.#: "0"
ingress.2541437006.protocol: "tcp"
ingress.2541437006.security_groups.#: "0"
ingress.2541437006.self: "false"
ingress.2541437006.to_port: "22"
name: "cp-prod-jenkins-efs-backup"
owner_id: <computed>
revoke_rules_on_delete: "false"
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-efs-backup"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc_id: "${data.aws_vpc.default.id}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_application.aws_elastic_beanstalk_application.default
[0m id: <computed>
description: "Jenkins server as Docker container running on Elastic Beanstalk"
name: "cp-prod-jenkins-eb-app"
[0m
[0m[36m [36m<=[0m [36mmodule.jenkins.module.elastic_beanstalk_environment.data.aws_iam_policy_document.elb_logs
[0m id: <computed>
json: <computed>
statement.#: "1"
statement.0.actions.#: "1"
statement.0.actions.315547055: "s3:PutObject"
statement.0.effect: "Allow"
statement.0.principals.#: "1"
statement.0.principals.510013887.identifiers.#: "1"
statement.0.principals.510013887.identifiers.3630475160: "arn:aws:iam::156460612806:root"
statement.0.principals.510013887.type: "AWS"
statement.0.resources.#: "1"
statement.0.resources.2802392244: "arn:aws:s3:::cp-prod-jenkins-eb-env-logs/*"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.aws_elastic_beanstalk_environment.default
[0m id: <computed>
all_settings.#: <computed>
application: "cp-prod-jenkins-eb-app"
arn: <computed>
autoscaling_groups.#: <computed>
cname: <computed>
cname_prefix: <computed>
instances.#: <computed>
launch_configurations.#: <computed>
load_balancers.#: <computed>
name: "cp-prod-jenkins-eb-env"
queues.#: <computed>
setting.#: "109"
setting.1039973377.name: "InstancePort"
setting.1039973377.namespace: "aws:elb:listener:22"
setting.1039973377.resource: ""
setting.1039973377.value: "22"
setting.1311926541.name: "RollingUpdateEnabled"
setting.1311926541.namespace: "aws:autoscaling:updatepolicy:rollingupdate"
setting.1311926541.resource: ""
setting.1311926541.value: "true"
setting.1429395430.name: "AssociatePublicIpAddress"
setting.1429395430.namespace: "aws:ec2:vpc"
setting.1429395430.resource: ""
setting.1429395430.value: "false"
setting.1489838287.name: "AccessLogsS3Enabled"
setting.1489838287.namespace: "aws:elbv2:loadbalancer"
setting.1489838287.resource: ""
setting.1489838287.value: "true"
setting.1496496068.name: "MaxSize"
setting.1496496068.namespace: "aws:autoscaling:asg"
setting.1496496068.resource: ""
setting.1496496068.value: "1"
setting.1497664210.name: "CrossZone"
setting.1497664210.namespace: "aws:elb:loadbalancer"
setting.1497664210.resource: ""
setting.1497664210.value: "true"
setting.1610162273.name: "BatchSizeType"
setting.1610162273.namespace: "aws:elasticbeanstalk:command"
setting.1610162273.resource: ""
setting.1610162273.value: "Fixed"
setting.1753983171.name: "Port"
setting.1753983171.namespace: "aws:elasticbeanstalk:environment:process:default"
setting.1753983171.resource: ""
setting.1753983171.value: "80"
setting.1824390401.name: "Notification Topic ARN"
setting.1824390401.namespace: "aws:elasticbeanstalk:sns:topics"
setting.1824390401.resource: ""
setting.1824390401.value: ""
setting.1853127076.name: "Notification Endpoint"
setting.1853127076.namespace: "aws:elasticbeanstalk:sns:topics"
setting.1853127076.resource: ""
setting.1853127076.value: ""
setting.1907228178.name: "ListenerEnabled"
setting.1907228178.namespace: "aws:elb:listener:22"
setting.1907228178.resource: ""
setting.1907228178.value: "false"
setting.2175068570.name: "BatchSize"
setting.2175068570.namespace: "aws:elasticbeanstalk:command"
setting.2175068570.resource: ""
setting.2175068570.value: "1"
setting.2196505321.name: "IamInstanceProfile"
setting.2196505321.namespace: "aws:autoscaling:launchconfiguration"
setting.2196505321.resource: ""
setting.2196505321.value: "cp-prod-jenkins-eb-env-ec2"
setting.2262995125.name: "Availability Zones"
setting.2262995125.namespace: "aws:autoscaling:asg"
setting.2262995125.resource: ""
setting.2262995125.value: "Any 2"
setting.2276893638.name: "RollingUpdateType"
setting.2276893638.namespace: "aws:autoscaling:updatepolicy:rollingupdate"
setting.2276893638.resource: ""
setting.2276893638.value: "Health"
setting.228594711.name: "InstancePort"
setting.228594711.namespace: "aws:elb:listener:443"
setting.228594711.resource: ""
setting.228594711.value: "80"
setting.2322805565.name: "ListenerEnabled"
setting.2322805565.namespace: "aws:elbv2:listener:default"
setting.2322805565.resource: ""
setting.2322805565.value: "false"
setting.2339427870.name: "ListenerEnabled"
setting.2339427870.namespace: "aws:elbv2:listener:443"
setting.2339427870.resource: ""
setting.2339427870.value: "true"
setting.2396587397.name: "MinSize"
setting.2396587397.namespace: "aws:autoscaling:asg"
setting.2396587397.resource: ""
setting.2396587397.value: "1"
setting.2397211163.name: "LowerThreshold"
setting.2397211163.namespace: "aws:autoscaling:trigger"
setting.2397211163.resource: ""
setting.2397211163.value: "20"
setting.2420299722.name: "SystemType"
setting.2420299722.namespace: "aws:elasticbeanstalk:healthreporting:system"
setting.2420299722.resource: ""
setting.2420299722.value: "enhanced"
setting.2558992023.name: "ManagedActionsEnabled"
setting.2558992023.namespace: "aws:elasticbeanstalk:managedactions"
setting.2558992023.resource: ""
setting.2558992023.value: "true"
setting.2695109639.name: "CONFIG_SOURCE"
setting.2695109639.namespace: "aws:elasticbeanstalk:application:environment"
setting.2695109639.resource: ""
setting.2695109639.value: ""
setting.2740395520.name: "Unit"
setting.2740395520.namespace: "aws:autoscaling:trigger"
setting.2740395520.resource: ""
setting.2740395520.value: "Percent"
setting.2827474164.name: "ConnectionSettingIdleTimeout"
setting.2827474164.namespace: "aws:elb:policies"
setting.2827474164.resource: ""
setting.2827474164.value: "60"
setting.2873106828.name: "EC2KeyName"
setting.2873106828.namespace: "aws:autoscaling:launchconfiguration"
setting.2873106828.resource: ""
setting.2873106828.value: "pub_key"
setting.2895264217.name: "ListenerEnabled"
setting.2895264217.namespace: "aws:elb:listener:443"
setting.2895264217.resource: ""
setting.2895264217.value: "true"
setting.2936233364.name: "Protocol"
setting.2936233364.namespace: "aws:elbv2:listener:443"
setting.2936233364.resource: ""
setting.2936233364.value: "HTTPS"
setting.2983186660.name: "UpdateLevel"
setting.2983186660.namespace: "aws:elasticbeanstalk:managedactions:platformupdate"
setting.2983186660.resource: ""
setting.2983186660.value: "minor"
setting.3283718636.name: "ServiceRole"
setting.3283718636.namespace: "aws:elasticbeanstalk:environment"
setting.3283718636.resource: ""
setting.3283718636.value: "cp-prod-jenkins-eb-env-service"
setting.3320286333.name: "InstanceRefreshEnabled"
setting.3320286333.namespace: "aws:elasticbeanstalk:managedactions:platformupdate"
setting.3320286333.resource: ""
setting.3320286333.value: "true"
setting.3341012745.name: "MeasureName"
setting.3341012745.namespace: "aws:autoscaling:trigger"
setting.3341012745.resource: ""
setting.3341012745.value: "CPUUtilization"
setting.3402994671.name: "Statistic"
setting.3402994671.namespace: "aws:autoscaling:trigger"
setting.3402994671.resource: ""
setting.3402994671.value: "Average"
setting.3405464736.name: "Protocol"
setting.3405464736.namespace: "aws:elasticbeanstalk:environment:process:default"
setting.3405464736.resource: ""
setting.3405464736.value: "HTTP"
setting.3553402416.name: "DeploymentPolicy"
setting.3553402416.namespace: "aws:elasticbeanstalk:command"
setting.3553402416.resource: ""
setting.3553402416.value: "Rolling"
setting.3558272587.name: "InstanceType"
setting.3558272587.namespace: "aws:autoscaling:launchconfiguration"
setting.3558272587.resource: ""
setting.3558272587.value: "t2.medium"
setting.3584475532.name: "Notification Topic Name"
setting.3584475532.namespace: "aws:elasticbeanstalk:sns:topics"
setting.3584475532.resource: ""
setting.3584475532.value: ""
setting.3676636476.name: "ListenerProtocol"
setting.3676636476.namespace: "aws:elb:listener:443"
setting.3676636476.resource: ""
setting.3676636476.value: "HTTPS"
setting.3705073300.name: "Notification Protocol"
setting.3705073300.namespace: "aws:elasticbeanstalk:sns:topics"
setting.3705073300.resource: ""
setting.3705073300.value: "email"
setting.3805834681.name: "ListenerEnabled"
setting.3805834681.namespace: "aws:elb:listener"
setting.3805834681.resource: ""
setting.3805834681.value: "false"
setting.3949205359.name: "SSLCertificateId"
setting.3949205359.namespace: "aws:elb:listener:443"
setting.3949205359.resource: ""
setting.3949205359.value: "arn:aws:acm:eu-west-1:890589058905:certificate/4dccef1f-278c-44f9-89c3-9542a9542aba"
setting.3999919625.name: "ListenerProtocol"
setting.3999919625.namespace: "aws:elb:listener:22"
setting.3999919625.resource: ""
setting.3999919625.value: "TCP"
setting.4005575467.name: "Application Healthcheck URL"
setting.4005575467.namespace: "aws:elasticbeanstalk:application"
setting.4005575467.resource: ""
setting.4005575467.value: "HTTP:80/login"
setting.4045810063.name: "UpperThreshold"
setting.4045810063.namespace: "aws:autoscaling:trigger"
setting.4045810063.resource: ""
setting.4045810063.value: "80"
setting.4065641051.name: "ConnectionDrainingEnabled"
setting.4065641051.namespace: "aws:elb:policies"
setting.4065641051.resource: ""
setting.4065641051.value: "true"
setting.4103464800.name: "MinInstancesInService"
setting.4103464800.namespace: "aws:autoscaling:updatepolicy:rollingupdate"
setting.4103464800.resource: ""
setting.4103464800.value: "0"
setting.4123875078.name: "InstancePort"
setting.4123875078.namespace: "aws:elb:listener"
setting.4123875078.resource: ""
setting.4123875078.value: "80"
setting.4174782116.name: "HealthCheckPath"
setting.4174782116.namespace: "aws:elasticbeanstalk:environment:process:default"
setting.4174782116.resource: ""
setting.4174782116.value: "/login"
setting.4278593597.name: "LoadBalancerType"
setting.4278593597.namespace: "aws:elasticbeanstalk:environment"
setting.4278593597.resource: ""
setting.4278593597.value: "application"
setting.493815232.name: "MaxBatchSize"
setting.493815232.namespace: "aws:autoscaling:updatepolicy:rollingupdate"
setting.493815232.resource: ""
setting.493815232.value: "1"
setting.674385265.name: "SSLCertificateArns"
setting.674385265.namespace: "aws:elbv2:listener:443"
setting.674385265.resource: ""
setting.674385265.value: "arn:aws:acm:eu-west-1:890589058905:certificate/4dccef1f-278c-44f9-89c3-9542a9542aba"
setting.747278465.name: "BASE_HOST"
setting.747278465.namespace: "aws:elasticbeanstalk:application:environment"
setting.747278465.resource: ""
setting.747278465.value: "jenkins"
setting.805407726.name: "PreferredStartTime"
setting.805407726.namespace: "aws:elasticbeanstalk:managedactions"
setting.805407726.resource: ""
setting.805407726.value: "Sun:10:00"
setting.887383118.name: "ListenerProtocol"
setting.887383118.namespace: "aws:elb:listener"
setting.887383118.resource: ""
setting.887383118.value: "HTTP"
setting.~1084671315.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 38))), 38)}"
setting.~1084671315.namespace: "aws:elasticbeanstalk:application:environment"
setting.~1084671315.resource: ""
setting.~1084671315.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 38))), 38), var.env_default_value)}"
setting.~1115199838.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 22))), 22)}"
setting.~1115199838.namespace: "aws:elasticbeanstalk:application:environment"
setting.~1115199838.resource: ""
setting.~1115199838.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 22))), 22), var.env_default_value)}"
setting.~1156565094.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 29))), 29)}"
setting.~1156565094.namespace: "aws:elasticbeanstalk:application:environment"
setting.~1156565094.resource: ""
setting.~1156565094.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 29))), 29), var.env_default_value)}"
setting.~1177654379.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 33))), 33)}"
setting.~1177654379.namespace: "aws:elasticbeanstalk:application:environment"
setting.~1177654379.resource: ""
setting.~1177654379.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 33))), 33), var.env_default_value)}"
setting.~1319341569.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 11))), 11)}"
setting.~1319341569.namespace: "aws:elasticbeanstalk:application:environment"
setting.~1319341569.resource: ""
setting.~1319341569.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 11))), 11), var.env_default_value)}"
setting.~1336904559.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 6))), 6)}"
setting.~1336904559.namespace: "aws:elasticbeanstalk:application:environment"
setting.~1336904559.resource: ""
setting.~1336904559.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 6))), 6), var.env_default_value)}"
setting.~148479335.name: "Subnets"
setting.~148479335.namespace: "aws:ec2:vpc"
setting.~148479335.resource: ""
setting.~148479335.value: "${join(\",\", var.private_subnets)}"
setting.~1540274144.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 44))), 44)}"
setting.~1540274144.namespace: "aws:elasticbeanstalk:application:environment"
setting.~1540274144.resource: ""
setting.~1540274144.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 44))), 44), var.env_default_value)}"
setting.~1541984391.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 7))), 7)}"
setting.~1541984391.namespace: "aws:elasticbeanstalk:application:environment"
setting.~1541984391.resource: ""
setting.~1541984391.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 7))), 7), var.env_default_value)}"
setting.~168379329.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 43))), 43)}"
setting.~168379329.namespace: "aws:elasticbeanstalk:application:environment"
setting.~168379329.resource: ""
setting.~168379329.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 43))), 43), var.env_default_value)}"
setting.~1730231487.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 4))), 4)}"
setting.~1730231487.namespace: "aws:elasticbeanstalk:application:environment"
setting.~1730231487.resource: ""
setting.~1730231487.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 4))), 4), var.env_default_value)}"
setting.~1761684247.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 40))), 40)}"
setting.~1761684247.namespace: "aws:elasticbeanstalk:application:environment"
setting.~1761684247.resource: ""
setting.~1761684247.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 40))), 40), var.env_default_value)}"
setting.~183877415.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 3))), 3)}"
setting.~183877415.namespace: "aws:elasticbeanstalk:application:environment"
setting.~183877415.resource: ""
setting.~183877415.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 3))), 3), var.env_default_value)}"
setting.~1891042729.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 26))), 26)}"
setting.~1891042729.namespace: "aws:elasticbeanstalk:application:environment"
setting.~1891042729.resource: ""
setting.~1891042729.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 26))), 26), var.env_default_value)}"
setting.~1936090967.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 5))), 5)}"
setting.~1936090967.namespace: "aws:elasticbeanstalk:application:environment"
setting.~1936090967.resource: ""
setting.~1936090967.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 5))), 5), var.env_default_value)}"
setting.~1962805404.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 37))), 37)}"
setting.~1962805404.namespace: "aws:elasticbeanstalk:application:environment"
setting.~1962805404.resource: ""
setting.~1962805404.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 37))), 37), var.env_default_value)}"
setting.~2087457526.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 15))), 15)}"
setting.~2087457526.namespace: "aws:elasticbeanstalk:application:environment"
setting.~2087457526.resource: ""
setting.~2087457526.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 15))), 15), var.env_default_value)}"
setting.~211686137.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 48))), 48)}"
setting.~211686137.namespace: "aws:elasticbeanstalk:application:environment"
setting.~211686137.resource: ""
setting.~211686137.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 48))), 48), var.env_default_value)}"
setting.~2149664199.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 35))), 35)}"
setting.~2149664199.namespace: "aws:elasticbeanstalk:application:environment"
setting.~2149664199.resource: ""
setting.~2149664199.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 35))), 35), var.env_default_value)}"
setting.~2151798711.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 9))), 9)}"
setting.~2151798711.namespace: "aws:elasticbeanstalk:application:environment"
setting.~2151798711.resource: ""
setting.~2151798711.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 9))), 9), var.env_default_value)}"
setting.~2221426930.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 24))), 24)}"
setting.~2221426930.namespace: "aws:elasticbeanstalk:application:environment"
setting.~2221426930.resource: ""
setting.~2221426930.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 24))), 24), var.env_default_value)}"
setting.~2293456813.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 17))), 17)}"
setting.~2293456813.namespace: "aws:elasticbeanstalk:application:environment"
setting.~2293456813.resource: ""
setting.~2293456813.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 17))), 17), var.env_default_value)}"
setting.~2483457119.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 8))), 8)}"
setting.~2483457119.namespace: "aws:elasticbeanstalk:application:environment"
setting.~2483457119.resource: ""
setting.~2483457119.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 8))), 8), var.env_default_value)}"
setting.~2551093239.name: "AccessLogsS3Bucket"
setting.~2551093239.namespace: "aws:elbv2:loadbalancer"
setting.~2551093239.resource: ""
setting.~2551093239.value: "${aws_s3_bucket.elb_logs.id}"
setting.~2605266804.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 49))), 49)}"
setting.~2605266804.namespace: "aws:elasticbeanstalk:application:environment"
setting.~2605266804.resource: ""
setting.~2605266804.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 49))), 49), var.env_default_value)}"
setting.~2648598092.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 42))), 42)}"
setting.~2648598092.namespace: "aws:elasticbeanstalk:application:environment"
setting.~2648598092.resource: ""
setting.~2648598092.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 42))), 42), var.env_default_value)}"
setting.~2937191099.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 46))), 46)}"
setting.~2937191099.namespace: "aws:elasticbeanstalk:application:environment"
setting.~2937191099.resource: ""
setting.~2937191099.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 46))), 46), var.env_default_value)}"
setting.~3001997616.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 31))), 31)}"
setting.~3001997616.namespace: "aws:elasticbeanstalk:application:environment"
setting.~3001997616.resource: ""
setting.~3001997616.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 31))), 31), var.env_default_value)}"
setting.~3064452101.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 20))), 20)}"
setting.~3064452101.namespace: "aws:elasticbeanstalk:application:environment"
setting.~3064452101.resource: ""
setting.~3064452101.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 20))), 20), var.env_default_value)}"
setting.~3128738650.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 13))), 13)}"
setting.~3128738650.namespace: "aws:elasticbeanstalk:application:environment"
setting.~3128738650.resource: ""
setting.~3128738650.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 13))), 13), var.env_default_value)}"
setting.~3169555042.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 18))), 18)}"
setting.~3169555042.namespace: "aws:elasticbeanstalk:application:environment"
setting.~3169555042.resource: ""
setting.~3169555042.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 18))), 18), var.env_default_value)}"
setting.~331312511.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 25))), 25)}"
setting.~331312511.namespace: "aws:elasticbeanstalk:application:environment"
setting.~331312511.resource: ""
setting.~331312511.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 25))), 25), var.env_default_value)}"
setting.~3424227949.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 45))), 45)}"
setting.~3424227949.namespace: "aws:elasticbeanstalk:application:environment"
setting.~3424227949.resource: ""
setting.~3424227949.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 45))), 45), var.env_default_value)}"
setting.~3521556966.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 32))), 32)}"
setting.~3521556966.namespace: "aws:elasticbeanstalk:application:environment"
setting.~3521556966.resource: ""
setting.~3521556966.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 32))), 32), var.env_default_value)}"
setting.~3543723499.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 28))), 28)}"
setting.~3543723499.namespace: "aws:elasticbeanstalk:application:environment"
setting.~3543723499.resource: ""
setting.~3543723499.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 28))), 28), var.env_default_value)}"
setting.~3585064147.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 23))), 23)}"
setting.~3585064147.namespace: "aws:elasticbeanstalk:application:environment"
setting.~3585064147.resource: ""
setting.~3585064147.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 23))), 23), var.env_default_value)}"
setting.~3614564574.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 39))), 39)}"
setting.~3614564574.namespace: "aws:elasticbeanstalk:application:environment"
setting.~3614564574.resource: ""
setting.~3614564574.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 39))), 39), var.env_default_value)}"
setting.~3648301964.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 10))), 10)}"
setting.~3648301964.namespace: "aws:elasticbeanstalk:application:environment"
setting.~3648301964.resource: ""
setting.~3648301964.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 10))), 10), var.env_default_value)}"
setting.~3811126545.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 36))), 36)}"
setting.~3811126545.namespace: "aws:elasticbeanstalk:application:environment"
setting.~3811126545.resource: ""
setting.~3811126545.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 36))), 36), var.env_default_value)}"
setting.~3881836580.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 27))), 27)}"
setting.~3881836580.namespace: "aws:elasticbeanstalk:application:environment"
setting.~3881836580.resource: ""
setting.~3881836580.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 27))), 27), var.env_default_value)}"
setting.~3954915195.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 14))), 14)}"
setting.~3954915195.namespace: "aws:elasticbeanstalk:application:environment"
setting.~3954915195.resource: ""
setting.~3954915195.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 14))), 14), var.env_default_value)}"
setting.~402022474.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 34))), 34)}"
setting.~402022474.namespace: "aws:elasticbeanstalk:application:environment"
setting.~402022474.resource: ""
setting.~402022474.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 34))), 34), var.env_default_value)}"
setting.~4238282514.name: "ELBSubnets"
setting.~4238282514.namespace: "aws:ec2:vpc"
setting.~4238282514.resource: ""
setting.~4238282514.value: "${join(\",\", var.public_subnets)}"
setting.~4275441306.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 41))), 41)}"
setting.~4275441306.namespace: "aws:elasticbeanstalk:application:environment"
setting.~4275441306.resource: ""
setting.~4275441306.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 41))), 41), var.env_default_value)}"
setting.~4294188605.name: "VPCId"
setting.~4294188605.namespace: "aws:ec2:vpc"
setting.~4294188605.resource: ""
setting.~4294188605.value: "${var.vpc_id}"
setting.~515040463.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 2))), 2)}"
setting.~515040463.namespace: "aws:elasticbeanstalk:application:environment"
setting.~515040463.resource: ""
setting.~515040463.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 2))), 2), var.env_default_value)}"
setting.~526678560.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 16))), 16)}"
setting.~526678560.namespace: "aws:elasticbeanstalk:application:environment"
setting.~526678560.resource: ""
setting.~526678560.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 16))), 16), var.env_default_value)}"
setting.~561049992.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 21))), 21)}"
setting.~561049992.namespace: "aws:elasticbeanstalk:application:environment"
setting.~561049992.resource: ""
setting.~561049992.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 21))), 21), var.env_default_value)}"
setting.~577689680.name: "SecurityGroups"
setting.~577689680.namespace: "aws:autoscaling:launchconfiguration"
setting.~577689680.resource: ""
setting.~577689680.value: "${aws_security_group.default.id}"
setting.~578488567.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 1))), 1)}"
setting.~578488567.namespace: "aws:elasticbeanstalk:application:environment"
setting.~578488567.resource: ""
setting.~578488567.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 1))), 1), var.env_default_value)}"
setting.~624557245.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 30))), 30)}"
setting.~624557245.namespace: "aws:elasticbeanstalk:application:environment"
setting.~624557245.resource: ""
setting.~624557245.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 30))), 30), var.env_default_value)}"
setting.~725399535.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 19))), 19)}"
setting.~725399535.namespace: "aws:elasticbeanstalk:application:environment"
setting.~725399535.resource: ""
setting.~725399535.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 19))), 19), var.env_default_value)}"
setting.~766240471.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 12))), 12)}"
setting.~766240471.namespace: "aws:elasticbeanstalk:application:environment"
setting.~766240471.resource: ""
setting.~766240471.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 12))), 12), var.env_default_value)}"
setting.~909923103.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 0))), 0)}"
setting.~909923103.namespace: "aws:elasticbeanstalk:application:environment"
setting.~909923103.resource: ""
setting.~909923103.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 0))), 0), var.env_default_value)}"
setting.~952557366.name: "${element(concat(keys(var.env_vars), list(format(var.env_default_key, 47))), 47)}"
setting.~952557366.namespace: "aws:elasticbeanstalk:application:environment"
setting.~952557366.resource: ""
setting.~952557366.value: "${lookup(var.env_vars, element(concat(keys(var.env_vars), list(format(var.env_default_key, 47))), 47), var.env_default_value)}"
solution_stack_name: "64bit Amazon Linux 2017.09 v2.8.4 running Docker 17.09.1-ce"
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-eb-env"
tags.Namespace: "cp"
tags.Stage: "prod"
tier: "WebServer"
triggers.#: <computed>
version_label: <computed>
wait_for_ready_timeout: "20m"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.aws_iam_instance_profile.ec2
[0m id: <computed>
arn: <computed>
create_date: <computed>
name: "cp-prod-jenkins-eb-env-ec2"
path: "/"
role: "cp-prod-jenkins-eb-env-ec2"
roles.#: <computed>
unique_id: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.aws_iam_role.ec2
[0m id: <computed>
arn: <computed>
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n }\n },\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ssm.amazonaws.com\"\n }\n }\n ]\n}"
create_date: <computed>
force_detach_policies: "false"
max_session_duration: "3600"
name: "cp-prod-jenkins-eb-env-ec2"
path: "/"
unique_id: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.aws_iam_role.service
[0m id: <computed>
arn: <computed>
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"elasticbeanstalk.amazonaws.com\"\n }\n }\n ]\n}"
create_date: <computed>
force_detach_policies: "false"
max_session_duration: "3600"
name: "cp-prod-jenkins-eb-env-service"
path: "/"
unique_id: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.aws_iam_role_policy.default
[0m id: <computed>
name: "cp-prod-jenkins-eb-env-default"
policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"sqs:GetQueueUrl\",\n \"sqs:GetQueueAttributes\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeInstanceHealth\",\n \"ec2:GetConsoleOutput\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInstanceStatus\",\n \"ec2:DescribeAddresses\",\n \"ec2:AssociateAddress\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeNotificationConfigurations\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeAutoScalingGroups\"\n ],\n \"Resource\": \"*\"\n },\n {\n \"Sid\": \"AllowOperations\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"sqs:GetQueueUrl\",\n \"sqs:GetQueueAttributes\",\n \"sns:Subscribe\",\n \"sns:ListSubscriptionsByTopic\",\n \"sns:GetTopicAttributes\",\n \"sns:CreateTopic\",\n \"s3:listBuckets\",\n \"s3:ListObjects\",\n \"s3:ListBucket\",\n \"s3:GetObjectMetadata\",\n \"s3:GetObjectAcl\",\n \"s3:GetObject\",\n \"s3:CopyObject\",\n \"rds:DescribeOrderableDBInstanceOptions\",\n \"rds:DescribeDBInstances\",\n \"rds:DescribeDBEngineVersions\",\n \"logs:PutRetentionPolicy\",\n \"logs:CreateLogGroup\",\n \"iam:PassRole\",\n \"iam:ListRoles\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeInstanceHealth\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticbeanstalk:*\",\n \"ecs:RegisterTaskDefinition\",\n \"ecs:DescribeClusters\",\n \"ecs:DeleteCluster\",\n \"ecs:CreateCluster\",\n \"ec2:TerminateInstances\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"ec2:RevokeSecurityGroupEgress\",\n \"ec2:ReleaseAddress\",\n \"ec2:DisassociateAddress\",\n \"ec2:DescribeVpcs\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeSnapshots\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeKeyPairs\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeImages\",\n \"ec2:DescribeAddresses\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:CreateSecurityGroup\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:AuthorizeSecurityGroupEgress\",\n \"ec2:AssociateAddress\",\n \"ec2:AllocateAddress\",\n \"codebuild:StartBuild\",\n \"codebuild:DeleteProject\",\n \"codebuild:CreateProject\",\n \"codebuild:BatchGetBuilds\",\n \"cloudwatch:PutMetricAlarm\",\n \"autoscaling:UpdateAutoScalingGroup\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"autoscaling:SuspendProcesses\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:ResumeProcesses\",\n \"autoscaling:PutScheduledUpdateGroupAction\",\n \"autoscaling:DetachInstances\",\n \"autoscaling:DescribeScheduledActions\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeNotificationConfigurations\",\n \"autoscaling:DescribeLoadBalancers\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAccountLimits\",\n \"autoscaling:DeleteScheduledAction\",\n \"autoscaling:DeleteLaunchConfiguration\",\n \"autoscaling:DeleteAutoScalingGroup\",\n \"autoscaling:CreateLaunchConfiguration\",\n \"autoscaling:CreateAutoScalingGroup\",\n \"autoscaling:AttachInstances\"\n ],\n \"Resource\": \"*\"\n },\n {\n \"Sid\": \"AllowS3OperationsOnElasticBeanstalkBuckets\",\n \"Effect\": \"Allow\",\n \"Action\": \"s3:*\",\n \"Resource\": \"arn:aws:s3:::*\"\n },\n {\n \"Sid\": \"AllowDeleteCloudwatchLogGroups\",\n \"Effect\": \"Allow\",\n \"Action\": \"logs:DeleteLogGroup\",\n \"Resource\": \"arn:aws:logs:*:*:log-group:/aws/elasticbeanstalk*\"\n },\n {\n \"Sid\": \"AllowCloudformationOperationsOnElasticBeanstalkStacks\",\n \"Effect\": \"Allow\",\n \"Action\": \"cloudformation:*\",\n \"Resource\": [\n \"arn:aws:cloudformation:*:*:stack/eb-*\",\n \"arn:aws:cloudformation:*:*:stack/awseb-*\"\n ]\n }\n ]\n}"
role: "${aws_iam_role.ec2.id}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.aws_iam_role_policy_attachment.ecr-readonly
[0m id: <computed>
policy_arn: "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
role: "cp-prod-jenkins-eb-env-ec2"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.aws_iam_role_policy_attachment.enhanced-health
[0m id: <computed>
policy_arn: "arn:aws:iam::aws:policy/service-role/AWSElasticBeanstalkEnhancedHealth"
role: "cp-prod-jenkins-eb-env-service"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.aws_iam_role_policy_attachment.service
[0m id: <computed>
policy_arn: "arn:aws:iam::aws:policy/service-role/AWSElasticBeanstalkService"
role: "cp-prod-jenkins-eb-env-service"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.aws_iam_role_policy_attachment.ssm-automation
[0m id: <computed>
policy_arn: "arn:aws:iam::aws:policy/service-role/AmazonSSMAutomationRole"
role: "cp-prod-jenkins-eb-env-ec2"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.aws_iam_role_policy_attachment.ssm-ec2
[0m id: <computed>
policy_arn: "arn:aws:iam::aws:policy/service-role/AmazonEC2RoleforSSM"
role: "cp-prod-jenkins-eb-env-ec2"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.aws_iam_role_policy_attachment.web-tier
[0m id: <computed>
policy_arn: "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"
role: "cp-prod-jenkins-eb-env-ec2"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.aws_iam_role_policy_attachment.worker-tier
[0m id: <computed>
policy_arn: "arn:aws:iam::aws:policy/AWSElasticBeanstalkWorkerTier"
role: "cp-prod-jenkins-eb-env-ec2"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.aws_s3_bucket.elb_logs
[0m id: <computed>
acceleration_status: <computed>
acl: "private"
arn: <computed>
bucket: "cp-prod-jenkins-eb-env-logs"
bucket_domain_name: <computed>
bucket_regional_domain_name: <computed>
force_destroy: "false"
hosted_zone_id: <computed>
policy: "${data.aws_iam_policy_document.elb_logs.json}"
region: <computed>
request_payer: <computed>
versioning.#: <computed>
website_domain: <computed>
website_endpoint: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.aws_security_group.default
[0m id: <computed>
arn: <computed>
description: "Allow inbound traffic from provided Security Groups"
egress.#: "1"
egress.482069346.cidr_blocks.#: "1"
egress.482069346.cidr_blocks.0: "0.0.0.0/0"
egress.482069346.description: ""
egress.482069346.from_port: "0"
egress.482069346.ipv6_cidr_blocks.#: "0"
egress.482069346.prefix_list_ids.#: "0"
egress.482069346.protocol: "-1"
egress.482069346.security_groups.#: "0"
egress.482069346.self: "false"
egress.482069346.to_port: "0"
ingress.#: "1"
ingress.2281976595.cidr_blocks.#: "0"
ingress.2281976595.description: ""
ingress.2281976595.from_port: "0"
ingress.2281976595.ipv6_cidr_blocks.#: "0"
ingress.2281976595.protocol: "-1"
ingress.2281976595.security_groups.#: "0"
ingress.2281976595.self: "false"
ingress.2281976595.to_port: "0"
name: "cp-prod-jenkins-eb-env"
owner_id: <computed>
revoke_rules_on_delete: "false"
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-eb-env"
tags.Namespace: "cp"
tags.Stage: "prod"
vpc_id: "${var.vpc_id}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.aws_ssm_activation.ec2
[0m id: <computed>
activation_code: <computed>
expired: <computed>
iam_role: "${aws_iam_role.ec2.id}"
name: "cp-prod-jenkins-eb-env"
registration_count: <computed>
registration_limit: "1"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.label_slaves.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "slaves"
triggers.id: "cp-prod-jenkins-slaves"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.module.nat_label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: ""
triggers.id: "cp-prod-jenkins"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.module.private_label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "private"
triggers.id: "cp-prod-jenkins-private"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.module.private_subnet_label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "private"
triggers.id: "cp-prod-subnet-private"
triggers.name: "subnet"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.module.public_label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "public"
triggers.id: "cp-prod-jenkins-public"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.subnets.module.public_subnet_label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "public"
triggers.id: "cp-prod-jenkins-public"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.vpc.module.label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: ""
triggers.id: "cp-prod-jenkins"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.module.build.aws_codebuild_project.default
[0m id: <computed>
artifacts.#: "1"
artifacts.2731293239.location: ""
artifacts.2731293239.name: ""
artifacts.2731293239.namespace_type: ""
artifacts.2731293239.packaging: ""
artifacts.2731293239.path: ""
artifacts.2731293239.type: "CODEPIPELINE"
badge_enabled: "false"
badge_url: <computed>
build_timeout: "60"
description: <computed>
encryption_key: <computed>
environment.#: "1"
environment.710173236.compute_type: "BUILD_GENERAL1_SMALL"
environment.710173236.environment_variable.#: "6"
environment.710173236.environment_variable.0.name: "AWS_REGION"
environment.710173236.environment_variable.0.type: "PLAINTEXT"
environment.710173236.environment_variable.0.value: "eu-west-1"
environment.710173236.environment_variable.1.name: "AWS_ACCOUNT_ID"
environment.710173236.environment_variable.1.type: "PLAINTEXT"
environment.710173236.environment_variable.1.value: "890589058905"
environment.710173236.environment_variable.2.name: "IMAGE_REPO_NAME"
environment.710173236.environment_variable.2.type: "PLAINTEXT"
environment.710173236.environment_variable.2.value: "cp-prod-jenkins-ecr"
environment.710173236.environment_variable.3.name: "IMAGE_TAG"
environment.710173236.environment_variable.3.type: "PLAINTEXT"
environment.710173236.environment_variable.3.value: "latest"
environment.710173236.environment_variable.4.name: "STAGE"
environment.710173236.environment_variable.4.type: "PLAINTEXT"
environment.710173236.environment_variable.4.value: "prod"
environment.710173236.environment_variable.5.name: "GITHUB_TOKEN"
environment.710173236.environment_variable.5.type: "PLAINTEXT"
environment.710173236.environment_variable.5.value: ""
environment.710173236.image: "aws/codebuild/docker:1.12.1"
environment.710173236.privileged_mode: "true"
environment.710173236.type: "LINUX_CONTAINER"
name: "cp-prod-jenkins-cicd-build"
service_role: "${aws_iam_role.default.arn}"
source.#: "1"
source.3452969582.auth.#: "0"
source.3452969582.buildspec: ""
source.3452969582.git_clone_depth: ""
source.3452969582.insecure_ssl: ""
source.3452969582.location: ""
source.3452969582.type: "CODEPIPELINE"
tags.%: "5"
tags.BusinessUnit: "ABC"
tags.Department: "XYZ"
tags.Name: "cp-prod-jenkins-cicd-build"
tags.Namespace: "cp"
tags.Stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.module.build.aws_iam_policy.default
[0m id: <computed>
arn: <computed>
name: "cp-prod-jenkins-cicd-build"
path: "/service-role/"
policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"logs:PutLogEvents\",\n \"logs:CreateLogStream\",\n \"logs:CreateLogGroup\",\n \"ecr:UploadLayerPart\",\n \"ecr:PutImage\",\n \"ecr:InitiateLayerUpload\",\n \"ecr:GetAuthorizationToken\",\n \"ecr:CompleteLayerUpload\",\n \"ecr:BatchCheckLayerAvailability\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.module.build.aws_iam_role.default
[0m id: <computed>
arn: <computed>
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"codebuild.amazonaws.com\"\n }\n }\n ]\n}"
create_date: <computed>
force_detach_policies: "false"
max_session_duration: "3600"
name: "cp-prod-jenkins-cicd-build"
path: "/"
unique_id: <computed>
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.module.build.aws_iam_role_policy_attachment.default
[0m id: <computed>
policy_arn: "${aws_iam_policy.default.arn}"
role: "${aws_iam_role.default.id}"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.module.label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "cicd"
triggers.id: "cp-prod-jenkins-cicd"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.ecr.module.label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "ecr"
triggers.id: "cp-prod-jenkins-ecr"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs.module.dns.aws_route53_record.default
[0m id: <computed>
allow_overwrite: "true"
fqdn: <computed>
name: "cp-prod-jenkins-efs"
records.#: <computed>
ttl: "60"
type: "CNAME"
zone_id: "ZYAN1ZYAN1ZYA"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs.module.label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "efs"
triggers.id: "cp-prod-jenkins-efs"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.module.backups_label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "efs-backup-backups"
triggers.id: "cp-prod-jenkins-efs-backup-backups"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.module.datapipeline_label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "efs-backup-datapipeline"
triggers.id: "cp-prod-jenkins-efs-backup-datapipeline"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.module.label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "efs-backup"
triggers.id: "cp-prod-jenkins-efs-backup"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.module.logs_label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "efs-backup-logs"
triggers.id: "cp-prod-jenkins-efs-backup-logs"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.module.resource_role_label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "efs-backup-resource-role"
triggers.id: "cp-prod-jenkins-efs-backup-resource-role"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.module.role_label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "efs-backup-role"
triggers.id: "cp-prod-jenkins-efs-backup-role"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.efs_backup.module.sns_label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "efs-backup-sns"
triggers.id: "cp-prod-jenkins-efs-backup-sns"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_application.module.label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "eb-app"
triggers.id: "cp-prod-jenkins-eb-app"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.module.label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "eb-env"
triggers.id: "cp-prod-jenkins-eb-env"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.elastic_beanstalk_environment.module.tld.aws_route53_record.default
[0m id: <computed>
allow_overwrite: "true"
fqdn: <computed>
name: "jenkins"
records.#: <computed>
ttl: "300"
type: "CNAME"
zone_id: "ZYAN1ZYAN1ZYA"
[0m
[0m[32m [32m+[0m [32mmodule.jenkins.module.cicd.module.build.module.label.null_resource.default
[0m id: <computed>
triggers.%: "5"
triggers.attributes: "cicd-build"
triggers.id: "cp-prod-jenkins-cicd-build"
triggers.name: "jenkins"
triggers.namespace: "cp"
triggers.stage: "prod"
[0m
[0m
[0m[1mPlan:[0m 97 to add, 2 to change, 0 to destroy.[0m
------------------------------------------------------------------------
Note: You didn't specify an "-out" parameter to save this plan, so Terraform
can't guarantee that exactly these actions will be performed if
"terraform apply" is subsequently run.
Thanks! That's helpful.
So the problem is if you use the example verbatim, you're namespace will collide with ours (e.g. cp
) or anyone else who decided to provision the module with defaults =)
S3 bucket names are globally unique in AWS.
Chang the namespace
parameter to something unique to your organization.
Thank you, indeed, with a custom namespace it works much better :) Now i'm stuck with this error:
Error: Error applying plan:
1 error(s) occurred:
* module.jenkins.module.cicd.module.build.aws_codebuild_project.default: 1 error(s) occurred:
* aws_codebuild_project.default: [ERROR] Error creating CodeBuild project: InvalidParameter: 1 validation error(s) found.
- missing required field, CreateProjectInput.Environment.EnvironmentVariables[5].Value.
@aknysh will be back next week and can help you take a look at it. It's probably just some missing input =)
I have a question concerning working flow of this repo:
example/new_vpc_new_subnets
and modify main.tf
terraform init
, terrfaform apply
? Thats all ? Is it the correct way ?
@achrstl yes that's all the steps required, and we tested them many times. I'll look into the issues. For now, take a look at this thread and make sure all the resources are created without errors as described here https://github.com/cloudposse/terraform-aws-jenkins/issues/27
Make sure the CloudFormation stacks are OK and deployed w/o errors (if any of them failed, please manually destroy it before terraform plan/apply).
@aknysh i just run a new test, still same error:
1 error(s) occurred:
* module.jenkins.module.cicd.module.build.aws_codebuild_project.default: 1 error(s) occurred:
* aws_codebuild_project.default: [ERROR] Error creating CodeBuild project: InvalidParameter: 1 validation error(s) found.
- missing required field, CreateProjectInput.Environment.EnvironmentVariables[5].Value.
Elastic Beanstalk seems ok
But when i go to https://jenkins.mydomain.xy i get:
In cloud formation everything is CREATE_COMPLETE without errors.
In ECR my repository is created but empty, there is no images here.
Hello, Did u find something about this issue ?
Thanks
@achrstl sorry for the delay, we were busy with customer projects. i'll take a look at this. thanks for testing!
@achrstl did you get it working? we improved the module in the last few releases, please try the examples. destroy all prev resources before applying again let us know if any issues.
I have the same issue
* module.jenkins.module.cicd.module.build.aws_codebuild_project.default: 1 error(s) occurred:
* aws_codebuild_project.default: Error creating CodeBuild project: InvalidParameter: 1 validation error(s) found.
- missing required field, CreateProjectInput.Environment.EnvironmentVariables[5].Value.
There's those warnings at the beginning also
Warning: module.jenkins.module.cicd.data.aws_region.default: "current": [DEPRECATED] Defaults to current provider region if no other filtering is enabled
Warning: module.jenkins.module.cicd.module.build.data.aws_region.default: "current": [DEPRECATED] Defaults to current provider region if no other filtering is enabled
Warning: module.jenkins.module.efs_backup.data.aws_region.default: "current": [DEPRECATED] Defaults to current provider region if no other filtering is enabled
Warning: module.jenkins.module.elastic_beanstalk_environment.data.aws_region.default: "current": [DEPRECATED] Defaults to current provider region if no other filtering is enabled
@sapher did you try any of these examples? https://github.com/cloudposse/terraform-aws-jenkins/tree/master/examples
@sapher @achrstl do you still see any issues with the module? a lot of issues were addressed in https://github.com/cloudposse/terraform-aws-jenkins/releases/tag/0.5.0 will close for now, please reopen if you still having problems
Hello ! I got this error, i don't know how to fix it I use the new vpc and subnet example.