diff --git a/.github/workflows/aws_ec2_golden.yml b/.github/workflows/aws_ec2_golden.yml index 6ef08ef..dfb047c 100644 --- a/.github/workflows/aws_ec2_golden.yml +++ b/.github/workflows/aws_ec2_golden.yml @@ -62,20 +62,25 @@ jobs: run: | terraform init # We are hardcoding the AMI as it's a moving target - terraform plan -var aws_ami="ami" -out=tfplan + terraform plan -var aws_ami="ami" -out=tfplan || true + - name: Convert Terraform plan to JSON + working-directory: aws/ec2/terraform + run: | # Use jq to "pretty print" the JSON output to allow comparison terraform show -json tfplan | jq > tfplan.json - name: Compare Terraform plan with golden file working-directory: aws/ec2/terraform run: | - delta <(jq .planned_values plan2.json) <(jq .planned_values plan3.json) + delta <(jq .planned_values ${{github.workspace}}/aws/ec2/test/golden/tfplan.json) <(jq .planned_values ${{github.workspace}}/aws/ec2/terraform/tfplan.json) exit $? - name: Post diff on PR - if: failure() && github.event_name == 'pull_request' - uses: int128/diff-action@v1 + if: always() && github.event_name == 'pull_request' + uses: int128/diff-action@3be570dc544fa95fcb45525611b05615778714ca # v1 with: base: ${{ github.workspace }}/aws/ec2/test/golden/tfplan.json head: ${{ github.workspace }}/aws/ec2/terraform/tfplan.json + comment-header: Terraform plan diff + comment-footer: Check the delta diff in the GH workflow for a detailed comparison. - name: Overwrite local golden files if: failure() && github.event_name == 'push' run: | diff --git a/.github/workflows/aws_ec2_tests.yml b/.github/workflows/aws_ec2_tests.yml index 10ab35c..af67e70 100644 --- a/.github/workflows/aws_ec2_tests.yml +++ b/.github/workflows/aws_ec2_tests.yml @@ -5,12 +5,12 @@ on: schedule: - cron: 0 4 * * 1-5 workflow_dispatch: - pull_request: - paths: - - .github/workflows/aws_ec2_tests.yml - - .tool-versions - - aws/ec2/** - - '!aws/ec2/test/golden/**' + # pull_request: + # paths: + # - .github/workflows/aws_ec2_tests.yml + # - .tool-versions + # - aws/ec2/** + # - '!aws/ec2/test/golden/**' # limit to a single execution per actor of this workflow concurrency: diff --git a/.github/workflows/scripts/tf_configure_remote_backend.sh b/.github/workflows/scripts/tf_configure_remote_backend.sh old mode 100644 new mode 100755 diff --git a/aws/ec2/test/golden/tfplan.json b/aws/ec2/test/golden/tfplan.json index 5e57118..7e30489 100644 --- a/aws/ec2/test/golden/tfplan.json +++ b/aws/ec2/test/golden/tfplan.json @@ -78,7 +78,7 @@ "aws_ami": { "sensitive": false, "type": "string", - "value": "ami-09e173854da66fbc9" + "value": "ami-0a95fb28afbb91fac" }, "aws_opensearch_domain": { "sensitive": false @@ -114,7 +114,7 @@ "provider_name": "registry.terraform.io/hashicorp/aws", "schema_version": 0, "values": { - "availability_zone": "eu-central-1a", + "availability_zone": "eu-west-2a", "encrypted": true, "final_snapshot": false, "multi_attach_enabled": null, @@ -144,7 +144,7 @@ "provider_name": "registry.terraform.io/hashicorp/aws", "schema_version": 0, "values": { - "availability_zone": "eu-central-1b", + "availability_zone": "eu-west-2b", "encrypted": true, "final_snapshot": false, "multi_attach_enabled": null, @@ -174,7 +174,7 @@ "provider_name": "registry.terraform.io/hashicorp/aws", "schema_version": 0, "values": { - "availability_zone": "eu-central-1c", + "availability_zone": "eu-west-2c", "encrypted": true, "final_snapshot": false, "multi_attach_enabled": null, @@ -1063,7 +1063,7 @@ "provider_name": "registry.terraform.io/hashicorp/aws", "schema_version": 0, "values": { - "access_policies": "{\"Statement\":[{\"Action\":\"es:*\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"*\"},\"Resource\":\"arn:aws:es:eu-central-1:444804106854:domain/camunda-os-cluster/*\"}],\"Version\":\"2012-10-17\"}", + "access_policies": "{\"Statement\":[{\"Action\":\"es:*\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"*\"},\"Resource\":\"arn:aws:es:eu-west-2:444804106854:domain/camunda-os-cluster/*\"}],\"Version\":\"2012-10-17\"}", "advanced_options": { "rest.action.multi.allow_explicit_index": "true" }, @@ -1114,17 +1114,17 @@ "engine_version": "OpenSearch_2.15", "log_publishing_options": [ { - "cloudwatch_log_group_arn": "arn:aws:logs:eu-central-1:444804106854:log-group:doesnotexistbutrequired", + "cloudwatch_log_group_arn": "arn:aws:logs:eu-west-2:444804106854:log-group:doesnotexistbutrequired", "enabled": false, "log_type": "ES_APPLICATION_LOGS" }, { - "cloudwatch_log_group_arn": "arn:aws:logs:eu-central-1:444804106854:log-group:doesnotexistbutrequired", + "cloudwatch_log_group_arn": "arn:aws:logs:eu-west-2:444804106854:log-group:doesnotexistbutrequired", "enabled": false, "log_type": "INDEX_SLOW_LOGS" }, { - "cloudwatch_log_group_arn": "arn:aws:logs:eu-central-1:444804106854:log-group:doesnotexistbutrequired", + "cloudwatch_log_group_arn": "arn:aws:logs:eu-west-2:444804106854:log-group:doesnotexistbutrequired", "enabled": false, "log_type": "SEARCH_SLOW_LOGS" } @@ -2078,11 +2078,11 @@ "domain": "vpc", "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-eu-central-1a" + "Name": "camunda-vpc-eu-west-2a" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-eu-central-1a", + "Name": "camunda-vpc-eu-west-2a", "managed_by": "Terraform" }, "timeouts": null @@ -2130,11 +2130,11 @@ "secondary_allocation_ids": null, "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-eu-central-1a" + "Name": "camunda-vpc-eu-west-2a" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-eu-central-1a", + "Name": "camunda-vpc-eu-west-2a", "managed_by": "Terraform" }, "timeouts": null @@ -2353,7 +2353,7 @@ "schema_version": 1, "values": { "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-central-1a", + "availability_zone": "eu-west-2a", "cidr_block": "10.200.0.0/20", "customer_owned_ipv4_pool": null, "enable_dns64": false, @@ -2367,11 +2367,11 @@ "outpost_arn": null, "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-private-eu-central-1a" + "Name": "camunda-vpc-private-eu-west-2a" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-private-eu-central-1a", + "Name": "camunda-vpc-private-eu-west-2a", "managed_by": "Terraform" }, "timeouts": null @@ -2391,7 +2391,7 @@ "schema_version": 1, "values": { "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-central-1b", + "availability_zone": "eu-west-2b", "cidr_block": "10.200.16.0/20", "customer_owned_ipv4_pool": null, "enable_dns64": false, @@ -2405,11 +2405,11 @@ "outpost_arn": null, "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-private-eu-central-1b" + "Name": "camunda-vpc-private-eu-west-2b" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-private-eu-central-1b", + "Name": "camunda-vpc-private-eu-west-2b", "managed_by": "Terraform" }, "timeouts": null @@ -2429,7 +2429,7 @@ "schema_version": 1, "values": { "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-central-1c", + "availability_zone": "eu-west-2c", "cidr_block": "10.200.32.0/20", "customer_owned_ipv4_pool": null, "enable_dns64": false, @@ -2443,11 +2443,11 @@ "outpost_arn": null, "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-private-eu-central-1c" + "Name": "camunda-vpc-private-eu-west-2c" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-private-eu-central-1c", + "Name": "camunda-vpc-private-eu-west-2c", "managed_by": "Terraform" }, "timeouts": null @@ -2467,7 +2467,7 @@ "schema_version": 1, "values": { "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-central-1a", + "availability_zone": "eu-west-2a", "cidr_block": "10.200.64.0/20", "customer_owned_ipv4_pool": null, "enable_dns64": false, @@ -2481,11 +2481,11 @@ "outpost_arn": null, "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-public-eu-central-1a" + "Name": "camunda-vpc-public-eu-west-2a" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-public-eu-central-1a", + "Name": "camunda-vpc-public-eu-west-2a", "managed_by": "Terraform" }, "timeouts": null @@ -2505,7 +2505,7 @@ "schema_version": 1, "values": { "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-central-1b", + "availability_zone": "eu-west-2b", "cidr_block": "10.200.80.0/20", "customer_owned_ipv4_pool": null, "enable_dns64": false, @@ -2519,11 +2519,11 @@ "outpost_arn": null, "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-public-eu-central-1b" + "Name": "camunda-vpc-public-eu-west-2b" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-public-eu-central-1b", + "Name": "camunda-vpc-public-eu-west-2b", "managed_by": "Terraform" }, "timeouts": null @@ -2543,7 +2543,7 @@ "schema_version": 1, "values": { "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-central-1c", + "availability_zone": "eu-west-2c", "cidr_block": "10.200.96.0/20", "customer_owned_ipv4_pool": null, "enable_dns64": false, @@ -2557,11 +2557,11 @@ "outpost_arn": null, "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-public-eu-central-1c" + "Name": "camunda-vpc-public-eu-west-2c" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-public-eu-central-1c", + "Name": "camunda-vpc-public-eu-west-2c", "managed_by": "Terraform" }, "timeouts": null @@ -2624,7 +2624,7 @@ ], "before": null, "after": { - "availability_zone": "eu-central-1a", + "availability_zone": "eu-west-2a", "encrypted": true, "final_snapshot": false, "multi_attach_enabled": null, @@ -2670,7 +2670,7 @@ ], "before": null, "after": { - "availability_zone": "eu-central-1b", + "availability_zone": "eu-west-2b", "encrypted": true, "final_snapshot": false, "multi_attach_enabled": null, @@ -2716,7 +2716,7 @@ ], "before": null, "after": { - "availability_zone": "eu-central-1c", + "availability_zone": "eu-west-2c", "encrypted": true, "final_snapshot": false, "multi_attach_enabled": null, @@ -4270,7 +4270,7 @@ ], "before": null, "after": { - "access_policies": "{\"Statement\":[{\"Action\":\"es:*\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"*\"},\"Resource\":\"arn:aws:es:eu-central-1:444804106854:domain/camunda-os-cluster/*\"}],\"Version\":\"2012-10-17\"}", + "access_policies": "{\"Statement\":[{\"Action\":\"es:*\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"*\"},\"Resource\":\"arn:aws:es:eu-west-2:444804106854:domain/camunda-os-cluster/*\"}],\"Version\":\"2012-10-17\"}", "advanced_options": { "rest.action.multi.allow_explicit_index": "true" }, @@ -4321,17 +4321,17 @@ "engine_version": "OpenSearch_2.15", "log_publishing_options": [ { - "cloudwatch_log_group_arn": "arn:aws:logs:eu-central-1:444804106854:log-group:doesnotexistbutrequired", + "cloudwatch_log_group_arn": "arn:aws:logs:eu-west-2:444804106854:log-group:doesnotexistbutrequired", "enabled": false, "log_type": "ES_APPLICATION_LOGS" }, { - "cloudwatch_log_group_arn": "arn:aws:logs:eu-central-1:444804106854:log-group:doesnotexistbutrequired", + "cloudwatch_log_group_arn": "arn:aws:logs:eu-west-2:444804106854:log-group:doesnotexistbutrequired", "enabled": false, "log_type": "INDEX_SLOW_LOGS" }, { - "cloudwatch_log_group_arn": "arn:aws:logs:eu-central-1:444804106854:log-group:doesnotexistbutrequired", + "cloudwatch_log_group_arn": "arn:aws:logs:eu-west-2:444804106854:log-group:doesnotexistbutrequired", "enabled": false, "log_type": "SEARCH_SLOW_LOGS" } @@ -5731,11 +5731,11 @@ "domain": "vpc", "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-eu-central-1a" + "Name": "camunda-vpc-eu-west-2a" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-eu-central-1a", + "Name": "camunda-vpc-eu-west-2a", "managed_by": "Terraform" }, "timeouts": null @@ -5826,11 +5826,11 @@ "secondary_allocation_ids": null, "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-eu-central-1a" + "Name": "camunda-vpc-eu-west-2a" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-eu-central-1a", + "Name": "camunda-vpc-eu-west-2a", "managed_by": "Terraform" }, "timeouts": null @@ -6211,7 +6211,7 @@ "before": null, "after": { "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-central-1a", + "availability_zone": "eu-west-2a", "cidr_block": "10.200.0.0/20", "customer_owned_ipv4_pool": null, "enable_dns64": false, @@ -6225,11 +6225,11 @@ "outpost_arn": null, "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-private-eu-central-1a" + "Name": "camunda-vpc-private-eu-west-2a" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-private-eu-central-1a", + "Name": "camunda-vpc-private-eu-west-2a", "managed_by": "Terraform" }, "timeouts": null @@ -6267,7 +6267,7 @@ "before": null, "after": { "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-central-1b", + "availability_zone": "eu-west-2b", "cidr_block": "10.200.16.0/20", "customer_owned_ipv4_pool": null, "enable_dns64": false, @@ -6281,11 +6281,11 @@ "outpost_arn": null, "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-private-eu-central-1b" + "Name": "camunda-vpc-private-eu-west-2b" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-private-eu-central-1b", + "Name": "camunda-vpc-private-eu-west-2b", "managed_by": "Terraform" }, "timeouts": null @@ -6323,7 +6323,7 @@ "before": null, "after": { "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-central-1c", + "availability_zone": "eu-west-2c", "cidr_block": "10.200.32.0/20", "customer_owned_ipv4_pool": null, "enable_dns64": false, @@ -6337,11 +6337,11 @@ "outpost_arn": null, "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-private-eu-central-1c" + "Name": "camunda-vpc-private-eu-west-2c" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-private-eu-central-1c", + "Name": "camunda-vpc-private-eu-west-2c", "managed_by": "Terraform" }, "timeouts": null @@ -6379,7 +6379,7 @@ "before": null, "after": { "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-central-1a", + "availability_zone": "eu-west-2a", "cidr_block": "10.200.64.0/20", "customer_owned_ipv4_pool": null, "enable_dns64": false, @@ -6393,11 +6393,11 @@ "outpost_arn": null, "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-public-eu-central-1a" + "Name": "camunda-vpc-public-eu-west-2a" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-public-eu-central-1a", + "Name": "camunda-vpc-public-eu-west-2a", "managed_by": "Terraform" }, "timeouts": null @@ -6435,7 +6435,7 @@ "before": null, "after": { "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-central-1b", + "availability_zone": "eu-west-2b", "cidr_block": "10.200.80.0/20", "customer_owned_ipv4_pool": null, "enable_dns64": false, @@ -6449,11 +6449,11 @@ "outpost_arn": null, "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-public-eu-central-1b" + "Name": "camunda-vpc-public-eu-west-2b" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-public-eu-central-1b", + "Name": "camunda-vpc-public-eu-west-2b", "managed_by": "Terraform" }, "timeouts": null @@ -6491,7 +6491,7 @@ "before": null, "after": { "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-central-1c", + "availability_zone": "eu-west-2c", "cidr_block": "10.200.96.0/20", "customer_owned_ipv4_pool": null, "enable_dns64": false, @@ -6505,11 +6505,11 @@ "outpost_arn": null, "tags": { "Example": "camunda-vpc", - "Name": "camunda-vpc-public-eu-central-1c" + "Name": "camunda-vpc-public-eu-west-2c" }, "tags_all": { "Example": "camunda-vpc", - "Name": "camunda-vpc-public-eu-central-1c", + "Name": "camunda-vpc-public-eu-west-2c", "managed_by": "Terraform" }, "timeouts": null @@ -6604,7 +6604,7 @@ "create" ], "before": null, - "after": "ami-09e173854da66fbc9", + "after": "ami-0a95fb28afbb91fac", "after_unknown": false, "before_sensitive": false, "after_sensitive": false @@ -6682,7 +6682,7 @@ "outputs": { "aws_ami": { "sensitive": false, - "value": "ami-09e173854da66fbc9", + "value": "ami-0a95fb28afbb91fac", "type": "string" }, "private_key": { @@ -6707,7 +6707,7 @@ "schema_version": 0, "values": { "architecture": "x86_64", - "arn": "arn:aws:ec2:eu-central-1::image/ami-09e173854da66fbc9", + "arn": "arn:aws:ec2:eu-west-2::image/ami-0a95fb28afbb91fac", "block_device_mappings": [ { "device_name": "/dev/xvda", @@ -6715,7 +6715,7 @@ "delete_on_termination": "true", "encrypted": "false", "iops": "3000", - "snapshot_id": "snap-098d402c72822abab", + "snapshot_id": "snap-0fcc2487cacb6a6f3", "throughput": "125", "volume_size": "8", "volume_type": "gp3" @@ -6725,8 +6725,8 @@ } ], "boot_mode": "", - "creation_date": "2024-10-04T14:21:57.000Z", - "deprecation_time": "2026-10-04T14:21:57.000Z", + "creation_date": "2024-10-04T14:21:18.000Z", + "deprecation_time": "2026-10-04T14:21:18.000Z", "description": "Debian 12 (20241004-1890)", "ena_support": true, "executable_users": null, @@ -6745,8 +6745,8 @@ } ], "hypervisor": "xen", - "id": "ami-09e173854da66fbc9", - "image_id": "ami-09e173854da66fbc9", + "id": "ami-0a95fb28afbb91fac", + "image_id": "ami-0a95fb28afbb91fac", "image_location": "amazon/debian-12-amd64-20241004-1890", "image_owner_alias": "amazon", "image_type": "machine", @@ -6767,7 +6767,7 @@ "ramdisk_id": "", "root_device_name": "/dev/xvda", "root_device_type": "ebs", - "root_snapshot_id": "snap-098d402c72822abab", + "root_snapshot_id": "snap-0fcc2487cacb6a6f3", "sriov_net_support": "simple", "state": "available", "state_reason": { @@ -6819,20 +6819,20 @@ "exclude_zone_ids": null, "filter": null, "group_names": [ - "eu-central-1" + "eu-west-2" ], - "id": "eu-central-1", + "id": "eu-west-2", "names": [ - "eu-central-1a", - "eu-central-1b", - "eu-central-1c" + "eu-west-2a", + "eu-west-2b", + "eu-west-2c" ], "state": null, "timeouts": null, "zone_ids": [ - "euc1-az2", - "euc1-az3", - "euc1-az1" + "euw2-az2", + "euw2-az3", + "euw2-az1" ] }, "sensitive_values": { @@ -6874,10 +6874,10 @@ "provider_name": "registry.terraform.io/hashicorp/aws", "schema_version": 0, "values": { - "description": "Europe (Frankfurt)", - "endpoint": "ec2.eu-central-1.amazonaws.com", - "id": "eu-central-1", - "name": "eu-central-1" + "description": "Europe (London)", + "endpoint": "ec2.eu-west-2.amazonaws.com", + "id": "eu-west-2", + "name": "eu-west-2" }, "sensitive_values": {} } @@ -14684,157 +14684,155 @@ }, "relevant_attributes": [ { - "resource": "module.vpc.aws_vpc.this[0]", + "resource": "aws_security_group.allow_ssh", "attribute": [ - "main_route_table_id" + "id" ] }, { - "resource": "module.vpc.aws_vpc_ipv4_cidr_block_association.this[0]", + "resource": "module.vpc.aws_vpc.this[0]", "attribute": [ - "vpc_id" + "default_security_group_id" ] }, { - "resource": "module.vpc.aws_route_table.private", - "attribute": [] + "resource": "module.vpc.aws_vpc.this[0]", + "attribute": [ + "instance_tenancy" + ] }, { - "resource": "module.vpc.aws_subnet.private", + "resource": "module.vpc.aws_route_table.database", "attribute": [] }, { - "resource": "aws_security_group.allow_remote_9090", + "resource": "aws_lb_target_group.main", "attribute": [ - "id" + "arn" ] }, { - "resource": "module.vpc.aws_vpc.this[0]", + "resource": "module.vpc.aws_internet_gateway.this[0]", "attribute": [ - "default_security_group_id" + "id" ] }, { - "resource": "module.vpc.aws_route_table_association.redshift", - "attribute": [] - }, - { - "resource": "module.vpc.aws_route_table_association.database", + "resource": "module.vpc.aws_subnet.public", "attribute": [] }, { - "resource": "aws_security_group.allow_necessary_camunda_ports_within_vpc", + "resource": "module.vpc.aws_vpc.this[0]", "attribute": [ - "id" + "enable_dns_support" ] }, { - "resource": "aws_lb.main[0]", + "resource": "module.vpc.aws_internet_gateway.this[0]", "attribute": [ "arn" ] }, { - "resource": "data.aws_caller_identity.current", + "resource": "data.aws_availability_zones.available", "attribute": [ - "account_id" + "names" ] }, { "resource": "module.vpc.aws_vpc.this[0]", "attribute": [ - "enable_dns_support" + "ipv6_cidr_block" ] }, { - "resource": "aws_security_group.allow_remote_grpc", + "resource": "module.vpc.aws_route_table.private", + "attribute": [] + }, + { + "resource": "aws_security_group.allow_remote_80_443", "attribute": [ "id" ] }, { - "resource": "aws_security_group.allow_ssh", + "resource": "aws_lb.main[0]", "attribute": [ - "id" + "arn" ] }, { - "resource": "data.aws_region.current", + "resource": "aws_iam_instance_profile.cloudwatch_instance_profile", "attribute": [ "name" ] }, { - "resource": "module.vpc.aws_subnet.elasticache", - "attribute": [] + "resource": "module.vpc.aws_vpc.this[0]", + "attribute": [ + "owner_id" + ] }, { - "resource": "aws_instance.bastion", + "resource": "module.vpc.aws_route_table_association.elasticache", "attribute": [] }, { - "resource": "module.vpc.aws_internet_gateway.this[0]", - "attribute": [ - "id" - ] + "resource": "module.vpc.aws_route.database_nat_gateway", + "attribute": [] }, { - "resource": "aws_lb.grpc[0]", + "resource": "aws_kms_key.main", "attribute": [ "arn" ] }, { - "resource": "module.vpc.aws_subnet.intra", - "attribute": [] + "resource": "module.vpc.aws_vpc_ipv4_cidr_block_association.this[0]", + "attribute": [ + "vpc_id" + ] }, { "resource": "module.vpc.aws_route_table.redshift", "attribute": [] }, { - "resource": "module.vpc.aws_route_table_association.private", + "resource": "module.vpc.aws_subnet.outpost", "attribute": [] }, { - "resource": "module.vpc.aws_cloudwatch_log_group.flow_log[0]", + "resource": "aws_lb.grpc[0]", "attribute": [ "arn" ] }, { - "resource": "module.vpc.aws_vpc.this[0]", - "attribute": [ - "id" - ] + "resource": "module.vpc.aws_subnet.intra", + "attribute": [] }, { - "resource": "aws_key_pair.main", + "resource": "module.vpc.aws_route.public_internet_gateway[0]", "attribute": [ - "key_name" + "id" ] }, { - "resource": "module.vpc.aws_vpc.this[0]", - "attribute": [ - "ipv6_association_id" - ] + "resource": "module.vpc.aws_route_table_association.public", + "attribute": [] }, { - "resource": "module.vpc.aws_vpc.this[0]", - "attribute": [ - "enable_dns_hostnames" - ] + "resource": "aws_lb.grpc", + "attribute": [] }, { - "resource": "aws_opensearch_domain.opensearch_cluster", + "resource": "module.vpc.aws_route_table_association.private", "attribute": [] }, { - "resource": "module.vpc.aws_vpc.this[0]", + "resource": "module.vpc.aws_iam_role.vpc_flow_log_cloudwatch[0]", "attribute": [ - "default_route_table_id" + "arn" ] }, { @@ -14842,79 +14840,77 @@ "attribute": [] }, { - "resource": "aws_ebs_volume.camunda", + "resource": "module.vpc.aws_route_table.intra", "attribute": [] }, { - "resource": "module.vpc.aws_route_table_association.elasticache", + "resource": "module.vpc.aws_vpc.this[0]", + "attribute": [ + "enable_dns_hostnames" + ] + }, + { + "resource": "module.vpc.aws_route_table_association.redshift", "attribute": [] }, { - "resource": "module.vpc.aws_route_table_association.public", + "resource": "module.vpc.aws_route.private_ipv6_egress", "attribute": [] }, { - "resource": "aws_iam_policy.cloudwatch_policy", - "attribute": [ - "arn" - ] + "resource": "aws_instance.bastion", + "attribute": [] }, { - "resource": "module.vpc.aws_vpc.this[0]", + "resource": "aws_security_group.allow_remote_9090", "attribute": [ - "instance_tenancy" + "id" ] }, { - "resource": "module.vpc.aws_route_table_association.intra", - "attribute": [] + "resource": "aws_security_group.allow_necessary_camunda_ports_within_vpc", + "attribute": [ + "id" + ] }, { - "resource": "module.vpc.aws_internet_gateway.this[0]", + "resource": "data.aws_region.current", "attribute": [ - "arn" + "name" ] }, { - "resource": "module.vpc.aws_route.database_nat_gateway", + "resource": "module.vpc.aws_route.private_nat_gateway", "attribute": [] }, { - "resource": "module.vpc.aws_egress_only_internet_gateway.this", + "resource": "module.vpc.aws_nat_gateway.this", "attribute": [] }, { - "resource": "aws_iam_role.cloudwatch", - "attribute": [ - "name" - ] - }, - { - "resource": "module.vpc.aws_vpc.this[0]", + "resource": "aws_security_group.allow_remote_grpc", "attribute": [ - "ipv6_cidr_block" + "id" ] }, { - "resource": "aws_lb_target_group.main", - "attribute": [ - "arn" - ] + "resource": "aws_instance.camunda", + "attribute": [] }, { - "resource": "module.vpc.aws_route_table.elasticache", + "resource": "tls_private_key.testing", "attribute": [] }, { - "resource": "module.vpc.aws_route_table_association.redshift_public", + "resource": "module.vpc.aws_route_table_association.intra", "attribute": [] }, { - "resource": "module.vpc.aws_route_table.database", + "resource": "module.vpc.aws_route_table_association.database", "attribute": [] }, { - "resource": "aws_lb.grpc", + "resource": "module.vpc.aws_eip.nat", "attribute": [] }, { @@ -14924,7 +14920,13 @@ ] }, { - "resource": "tls_private_key.testing", + "resource": "data.aws_caller_identity.current", + "attribute": [ + "account_id" + ] + }, + { + "resource": "aws_cloudwatch_log_group.os_log_group", "attribute": [] }, { @@ -14934,135 +14936,133 @@ ] }, { - "resource": "module.vpc.aws_subnet.redshift", - "attribute": [] - }, - { - "resource": "module.vpc.aws_route.public_internet_gateway[0]", + "resource": "module.vpc.aws_vpc.this[0]", "attribute": [ - "id" + "arn" ] }, { - "resource": "aws_instance.camunda", + "resource": "module.vpc.aws_subnet.redshift", "attribute": [] }, { - "resource": "module.vpc.aws_vpc_ipv4_cidr_block_association.this", - "attribute": [] + "resource": "aws_lb_target_group.grpc", + "attribute": [ + "arn" + ] }, { "resource": "module.vpc.aws_subnet.database", "attribute": [] }, { - "resource": "module.vpc.aws_route_table.intra", - "attribute": [] - }, - { - "resource": "module.vpc.aws_subnet.public", + "resource": "module.vpc.aws_egress_only_internet_gateway.this", "attribute": [] }, { - "resource": "aws_lb.main", - "attribute": [] + "resource": "module.vpc.aws_vpc.this[0]", + "attribute": [ + "id" + ] }, { - "resource": "module.vpc.aws_customer_gateway.this", - "attribute": [] + "resource": "module.vpc.aws_vpc.this[0]", + "attribute": [ + "ipv6_association_id" + ] }, { - "resource": "module.vpc.aws_route.private_nat_gateway", + "resource": "module.vpc.aws_vpc_ipv4_cidr_block_association.this", "attribute": [] }, { - "resource": "data.aws_ami.debian", + "resource": "module.vpc.aws_vpc.this[0]", "attribute": [ - "id" + "default_route_table_id" ] }, { - "resource": "module.vpc.aws_subnet.outpost", + "resource": "module.vpc.aws_route_table_association.redshift_public", "attribute": [] }, { - "resource": "module.vpc.aws_eip.nat", + "resource": "aws_lb.main", "attribute": [] }, { - "resource": "aws_lb_target_group.grpc", - "attribute": [ - "arn" - ] - }, - { - "resource": "aws_lb_target_group.connectors", + "resource": "module.vpc.aws_cloudwatch_log_group.flow_log[0]", "attribute": [ "arn" ] }, { - "resource": "aws_cloudwatch_log_group.os_log_group", + "resource": "module.vpc.aws_route_table.elasticache", "attribute": [] }, { - "resource": "module.vpc.aws_iam_role.vpc_flow_log_cloudwatch[0]", + "resource": "aws_lb_target_group.connectors", "attribute": [ "arn" ] }, { - "resource": "module.vpc.aws_vpc.this[0]", + "resource": "data.aws_ami.debian", "attribute": [ - "default_network_acl_id" + "id" ] }, { - "resource": "aws_kms_key.main", + "resource": "aws_key_pair.main", "attribute": [ - "arn" + "key_name" ] }, { - "resource": "aws_security_group.allow_remote_80_443", + "resource": "aws_iam_role.cloudwatch", "attribute": [ - "id" + "name" ] }, { - "resource": "module.vpc.aws_nat_gateway.this", + "resource": "module.vpc.aws_customer_gateway.this", "attribute": [] }, { - "resource": "data.aws_availability_zones.available", + "resource": "module.vpc.aws_vpc.this[0]", "attribute": [ - "names" + "default_network_acl_id" ] }, { - "resource": "aws_iam_instance_profile.cloudwatch_instance_profile", - "attribute": [ - "name" - ] + "resource": "module.vpc.aws_subnet.private", + "attribute": [] }, { - "resource": "module.vpc.aws_vpc.this[0]", - "attribute": [ - "arn" - ] + "resource": "aws_ebs_volume.camunda", + "attribute": [] }, { "resource": "module.vpc.aws_vpc.this[0]", "attribute": [ - "owner_id" + "main_route_table_id" ] }, { - "resource": "module.vpc.aws_route.private_ipv6_egress", + "resource": "module.vpc.aws_subnet.elasticache", "attribute": [] + }, + { + "resource": "aws_opensearch_domain.opensearch_cluster", + "attribute": [] + }, + { + "resource": "aws_iam_policy.cloudwatch_policy", + "attribute": [ + "arn" + ] } ], - "timestamp": "2024-10-17T08:04:53Z", + "timestamp": "2024-10-17T10:41:52Z", "applyable": true, "complete": true, "errored": false