terraform show (grep resource) in EKS

From wikieduonline
Jump to navigation Jump to search

terraform show | grep -w resource | sort | uniq
terraform show | grep -w resource | sort | cut -d" " -f1,2 | uni

Resources[edit]

20 different types of resources created: K8s

Networking

IAM

Misc:

Full list[edit]

terraform show | grep -w resource
resource "aws_eip" "nat" {
resource "aws_internet_gateway" "this" {
resource "aws_nat_gateway" "this" {
resource "aws_route" "private_nat_gateway" {
resource "aws_route" "public_internet_gateway" {
resource "aws_route_table" "private" {
resource "aws_route_table" "public" {
resource "aws_route_table_association" "private" {
resource "aws_route_table_association" "private" {
resource "aws_route_table_association" "private" {
resource "aws_route_table_association" "public" {
resource "aws_route_table_association" "public" {
resource "aws_route_table_association" "public" {
resource "aws_subnet" "private" {
resource "aws_subnet" "private" {
resource "aws_subnet" "private" {
resource "aws_subnet" "public" {
resource "aws_subnet" "public" {
resource "aws_subnet" "public" {
resource "aws_vpc" "this" {
resource "aws_security_group" "all_worker_mgmt" {
resource "aws_security_group" "worker_group_mgmt_one" {
resource "aws_security_group" "worker_group_mgmt_two" {
resource "random_string" "suffix" {
resource "aws_autoscaling_group" "workers" {
resource "aws_eks_cluster" "this" {
resource "aws_iam_instance_profile" "workers" {
resource "aws_iam_policy" "cluster_deny_log_group" {
resource "aws_iam_policy" "cluster_elb_sl_role_creation" {
resource "aws_iam_role" "cluster" {
resource "aws_iam_role" "workers" {
resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSClusterPolicy" {
resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSServicePolicy" {
resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSVPCResourceControllerPolicy" {
resource "aws_iam_role_policy_attachment" "cluster_deny_log_group" {
resource "aws_iam_role_policy_attachment" "cluster_elb_sl_role_creation" {
resource "aws_iam_role_policy_attachment" "workers_AmazonEC2ContainerRegistryReadOnly" {
resource "aws_iam_role_policy_attachment" "workers_AmazonEKSWorkerNodePolicy" {
resource "aws_iam_role_policy_attachment" "workers_AmazonEKS_CNI_Policy" {
resource "aws_launch_configuration" "workers" {
resource "aws_security_group" "cluster" {
resource "aws_security_group" "workers" {
resource "aws_security_group_rule" "cluster_egress_internet" {
resource "aws_security_group_rule" "cluster_https_worker_ingress" {
resource "aws_security_group_rule" "workers_egress_internet" {
resource "aws_security_group_rule" "workers_ingress_cluster" {
resource "aws_security_group_rule" "workers_ingress_cluster_https" {
resource "aws_security_group_rule" "workers_ingress_self" {
resource "kubernetes_config_map" "aws_auth" {
resource "local_file" "kubeconfig" {

Related[edit]

See also[edit]

Advertising: