up command of nodejs Automation API fails with SyntaxError after provisioning everything correctly
I'm using the Automation API to run tests (with jest) for my Pulumi infrastructure code. Approximately every sixth build fails because of an SyntaxError thrown by the pulumi up execution. The error happens after everything is provisioned. Everything works fine except that this error gets thrown.
Here is a stack trace:
...
Resources:
+ 50 created
Duration: 16m53s
console.error
Unhandled error
at process.uncaught (node_modules/jest-jasmine2/build/jasmine/Env.js:248:21)
console.error
Error [ERR_UNHANDLED_ERROR]: Unhandled error. (Error: An error was encountered while tailing the file
at TailFile._streamFileChanges (/home/vsts/work/1/s/node_modules/@logdna/tail-file/lib/tail-file.js:252:21)
at processTicksAndRejections (internal/process/task_queues.js:93:5)
at TailFile._pollFileForChanges (/home/vsts/work/1/s/node_modules/@logdna/tail-file/lib/tail-file.js:196:9) {
code: 'ETAIL',
meta: {
actual: Error [ERR_UNHANDLED_ERROR]: Unhandled error. (SyntaxError: Unexpected token a in JSON at position 0
at JSON.parse (<anonymous>)
at Transform.<anonymous> (/home/vsts/work/1/s/node_modules/@pulumi/pulumi/x/automation/stack.js:127:44)
at Transform.emit (events.js:315:20)
at addChunk (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/_stream_readable.js:298:12)
at readableAddChunk (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/_stream_readable.js:280:11)
at Transform.Readable.push (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/_stream_readable.js:241:10)
at Transform.push (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/_stream_transform.js:139:32)
at push (/home/vsts/work/1/s/node_modules/split2/index.js:73:10)
at Transform.transform [as _transform] (/home/vsts/work/1/s/node_modules/split2/index.js:44:7)
at Transform._read (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/_stream_transform.js:177:10))
at Transform.emit (events.js:304:17)
at Transform.onerror (internal/streams/readable.js:760:14)
at Transform.emit (events.js:315:20)
at errorOrDestroy (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/internal/streams/destroy.js:98:101)
at onwriteError (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/_stream_writable.js:424:5)
at onwrite (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/_stream_writable.js:450:11)
at WritableState.onwrite (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/_stream_writable.js:160:5)
at Transform.afterTransform (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/_stream_transform.js:89:3)
at Transform.transform [as _transform] (/home/vsts/work/1/s/node_modules/split2/index.js:46:14)
at Transform._read (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/_stream_transform.js:177:10) {
code: 'ERR_UNHANDLED_ERROR',
context: SyntaxError: Unexpected token a in JSON at position 0
at JSON.parse (<anonymous>)
at Transform.<anonymous> (/home/vsts/work/1/s/node_modules/@pulumi/pulumi/x/automation/stack.js:127:44)
at Transform.emit (events.js:315:20)
at addChunk (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/_stream_readable.js:298:12)
at readableAddChunk (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/_stream_readable.js:280:11)
at Transform.Readable.push (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/_stream_readable.js:241:10)
at Transform.push (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/_stream_transform.js:139:32)
at push (/home/vsts/work/1/s/node_modules/split2/index.js:73:10)
at Transform.transform [as _transform] (/home/vsts/work/1/s/node_modules/split2/index.js:44:7)
at Transform._read (/home/vsts/work/1/s/node_modules/split2/node_modules/readable-stream/lib/_stream_transform.js:177:10)
}
}
})
at TailFile.emit (events.js:304:17)
at TailFile.quit (/home/vsts/work/1/s/node_modules/@logdna/tail-file/lib/tail-file.js:273:12)
at TailFile._pollFileForChanges (/home/vsts/work/1/s/node_modules/@logdna/tail-file/lib/tail-file.js:230:19)
at processTicksAndRejections (internal/process/task_queues.js:93:5)
at process.uncaught (node_modules/jest-jasmine2/build/jasmine/Env.js:249:21)
If I understand the stack trace correctly, the error should be thrown here, which is inside a method called readLines. The up method calls it, if the onEvent parameter is used, which we don't do.
Steps to reproduce
This error is not thrown on every run, which makes it hard to reproduce.
Here is the code snippet of the pulumi up command:
await stack.up({
onOutput: (message: string) => process.stdout.write(message)
})
Affected feature
Automation API for nodejs
Hey @muellermatthias thanks for reporting this. I'm curious, do you call preview before up or are you only calling up? Trying to track down why readLines is running if you're not using onEvent, and my guess is it's because readLines runs during preview regardless of whether you pass in onEvent.
Hi @komalali, thanks for looking into this.
Your guess is correct. I didn't spot that, when looking at the code.
Our preview code is similar to the up one:
await stack.preview({
onOutput: (message: string) => process.stdout.write(message)
})
I compared the output of failed runs with successful ones and I can't spot any difference. I will also check the return value of preview.
Do you have any idea, where this error is coming from?
Do you have any idea, where this error is coming from?
Not yet, but it's almost certainly happening during preview and not up. I need to look into this a little further, thanks for bringing it up!
Can you tell me a little more about your workflow? It looks like this is a test run, are you running multiple tests in parallel? Can you share more of the code? Are you running preview before or after up?
There are no other runs/tests in parallel currently.
We run pulumi login --local first and use the Automation API afterwards.
Here is everything that is executed before the error is thrown:
let stack = await LocalWorkspace.createStack({
stackName: this.stackName,
workDir: this.config?.dir || process.cwd() + "/tests",
}, {
envVars: {
PULUMI_CONFIG_PASSPHRASE: ...,
},
})
await stack.setConfig("azure:location", {
value: this.config?.azureLocation || "westeurope",
})
await stack.preview({
onOutput: (message: string) => process.stdout.write(message)
})
await stack.up({
onOutput: (message: string) => process.stdout.write(message)
})
Thanks @muellermatthias, that's helpful. Will investigate 🔍
@komalali did you have a chance to investigate this? This is blocking us to adopt Automation API. Thank you upfront!
Same here (with Pulumi version 3.2.1), we observe this error although we have disabled all usage of onOutput and onEvent. It is definitively some kind of race condition, as it only happens roughly on every second run (up or preview).
error: Unhandled exception: Error: An error was encountered while tailing the file
at TailFile._streamFileChanges (/workdir/common/temp/node_modules/.pnpm/@[email protected]/node_modules/@logdna/tail-file/lib/tail-file.js:252:21)
at runMicrotasks (<anonymous>)
at processTicksAndRejections (internal/process/task_queues.js:93:5)
at TailFile._pollFileForChanges (/workdir/common/temp/node_modules/.pnpm/@[email protected]/node_modules/@logdna/tail-file/lib/tail-file.js:196:9)
error: One or more errors occurred
Hey folks! I'll be taking a closer look at this shortly. Question for @codingarchitect-wq @rustrial are y'all also using jest? Can you tell me a little more about the scenarios where you are running into this bug?
@komalali No, I am not using jest. My scenario is:
- Pulumi version 3.2.1 with TypeScript stacks (but we observed this error before with version 2.*)
- Using the automation-api for all operations
- Error happens during
previewandupoperations - I explicitly disabled
onOutputandonEventwhen using the automation api (this seemed to help with version 2.* but now no longer has any effect with version 3.2.1).
Another observation is, that this error occurs more often when the deploying machine is connected via WLAN (WiFi) instead of LAN. However, manually disconnecting and connecting my machine during deployments, I was not able to reproduce this. Could it be that short network interruptions (e.g. WLAN reconnect) could lead to this error message?
Hey folks, I have been unable to replicate this error myself, but I have a branch open where I am adding extra logging to try to debug the source of the error. https://github.com/pulumi/pulumi/pull/7032
If any of y'all would be willing to help with pulling in those changes and providing some more detailed logs that would be super helpful
OK, I reproduced this with the following log messages. I don't want to publish the event log file (/tmp/automation-logs-preview-TJ99zB/eventlog.txt) here as it contains semi-sensitive information (e.g. AWS Account ID). @komalali: Please let me know how I can provide you with that file on a private channel.
failed to parse engine event
logfile: /tmp/automation-logs-preview-TJ99zB/eventlog.txt
event: 698:oidc-provider/oidc.eks.eu-central-1.amazonaws.com/id/0ADCDA3DE54D54261AB6CB276D48FB3D\"},\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.eu-central-1.amazonaws.com/id/0ADCDA3DE54D54261AB6CB276D48FB3D:sub\":\"system:serviceaccount:kube-system:coredns\"}}}]}","createDate":"2021-03-22T14:41:33Z","description":"Kubernetes CoreDns","forceDetachPolicies":false,"id":"EKSW-20210322144132551900000010","inlinePolicies":[{"name":"CoreDNS2021032214415862470000001c","policy":"{\"Statement\":[{\"Action\":[\"route53:ListHostedZones\",\"route53:ListHostedZonesByName\",\"route53:ListResourceRecordSets\"],\"Effect\":\"Allow\",\"Resource\":[\"*\"]}],\"Version\":\"2012-10-17\"}"}],"managedPolicyArns":[],"maxSessionDuration":3600,"name":"EKSW-20210322144132551900000010","namePrefix":"EKSW-","path":"/","tags":{"nx/eks/cluster/family":"nxc","nx/eks/cluster/memberId":"a","nx/eks/cluster/name":"a-1-nxc","nx/eks/cluster/revision":"1","nx/pulumi/project":"eks-cluster-nxc-v1","nx/pulumi/stack":"live-prd-nexiot.eu-central-1","nx/pulumi/stage":"live","nx/resource/owner":"[email protected]"},"uniqueId":"AROAZZDRP4URC4UVRFAXJ"},"provider":""},"new":{"type":"aws:iam/role:Role","urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane$aws:iam/role:Role::EKSClusterV1-CoreDnsIamRole","custom":true,"id":"EKSW-20210322144132551900000010","parent":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane::EKSClusterV1","inputs":{"__defaults":["forceDetachPolicies","maxSessionDuration","path"],"assumeRolePolicy":"{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.eu-central-1.amazonaws.com/id/0ADCDA3DE54D54261AB6CB276D48FB3D:sub\":\"system:serviceaccount:kube-system:coredns\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::672400401698:oidc-provider/oidc.eks.eu-central-1.amazonaws.com/id/0ADCDA3DE54D54261AB6CB276D48FB3D\"}}],\"Version\":\"2012-10-17\"}","description":"Kubernetes CoreDns","forceDetachPolicies":false,"maxSessionDuration":3600,"namePrefix":"EKSW-","path":"/","tags":{"__defaults":[],"nx/eks/cluster/family":"nxc","nx/eks/cluster/memberId":"a","nx/eks/cluster/name":"a-1-nxc","nx/eks/cluster/revision":"1","nx/pulumi/project":"eks-cluster-nxc-v1","nx/pulumi/stack":"live-prd-nexiot.eu-central-1","nx/pulumi/stage":"live","nx/resource/owner":"[email protected]"}},"outputs":{"arn":"arn:aws:iam::672400401698:role/EKSW-20210322144132551900000010","assumeRolePolicy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::672400401698:oidc-provider/oidc.eks.eu-central-1.amazonaws.com/id/0ADCDA3DE54D54261AB6CB276D48FB3D\"},\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.eu-central-1.amazonaws.com/id/0ADCDA3DE54D54261AB6CB276D48FB3D:sub\":\"system:serviceaccount:kube-system:coredns\"}}}]}","createDate":"2021-03-22T14:41:33Z","description":"Kubernetes CoreDns","forceDetachPolicies":false,"id":"EKSW-20210322144132551900000010","inlinePolicies":[{"name":"CoreDNS2021032214415862470000001c","policy":"{\"Statement\":[{\"Action\":[\"route53:ListHostedZones\",\"route53:ListHostedZonesByName\",\"route53:ListResourceRecordSets\"],\"Effect\":\"Allow\",\"Resource\":[\"*\"]}],\"Version\":\"2012-10-17\"}"}],"managedPolicyArns":[],"maxSessionDuration":3600,"name":"EKSW-20210322144132551900000010","namePrefix":"EKSW-","path":"/","tags":{"nx/eks/cluster/family":"nxc","nx/eks/cluster/memberId":"a","nx/eks/cluster/name":"a-1-nxc","nx/eks/cluster/revision":"1","nx/pulumi/project":"eks-cluster-nxc-v1","nx/pulumi/stack":"live-prd-nexiot.eu-central-1","nx/pulumi/stage":"live","nx/resource/owner":"[email protected]"},"uniqueId":"AROAZZDRP4URC4UVRFAXJ"},"provider":""},"logical":true,"provider":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::pulumi:providers:aws::default_4_3_0::04da6b54-80e4-46f7-96ec-b56ff0331ba9"},"planning":true}}
SyntaxError: Unexpected token : in JSON at position 3
failed to parse engine event
logfile: /tmp/automation-logs-preview-TJ99zB/eventlog.txt
event: rsion\":\"1\"}","id":"https://sqs.eu-central-1.amazonaws.com/672400401698/EKSClusterV1-NodeTerminationHandlerQueue-451fb1a","policy":"{\"Version\":\"2012-10-17\",\"Id\":\"MyQueuePolicy\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Service\":[\"sqs.amazonaws.com\",\"events.amazonaws.com\"]},\"Action\":\"sqs:SendMessage\",\"Resource\":\"arn:aws:sqs:eu-central-1:672400401698:EKSClusterV1-NodeTerminationHandlerQueue-451fb1a\"}]}","queueUrl":"https://sqs.eu-central-1.amazonaws.com/672400401698/EKSClusterV1-NodeTerminationHandlerQueue-451fb1a"},"provider":""},"new":{"type":"aws:sqs/queuePolicy:QueuePolicy","urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane$aws:sqs/queuePolicy:QueuePolicy::EKSClusterV1-NodeTerminationHandlerQueuePolicy","custom":true,"id":"","parent":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane::EKSClusterV1","inputs":{"__defaults":[],"policy":"{\"Id\":\"MyQueuePolicy\",\"Statement\":[{\"Action\":\"sqs:SendMessage\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":[\"events.amazonaws.com\",\"sqs.amazonaws.com\"]},\"Resource\":[\"arn:aws:sqs:eu-central-1:672400401698:EKSClusterV1-NodeTerminationHandlerQueue-451fb1a\"]}],\"Version\":\"2012-10-17\"}","queueUrl":"https://sqs.eu-central-1.amazonaws.com/672400401698/EKSClusterV1-NodeTerminationHandlerQueue-451fb1a"},"outputs":{},"provider":""},"logical":true,"provider":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::pulumi:providers:aws::default_4_3_0::04da6b54-80e4-46f7-96ec-b56ff0331ba9"},"planning":true}}
SyntaxError: Unexpected token r in JSON at position 0
@rustrial Are you on the community slack? If not, you can email me at komal at pulumi dot com
I'll admit I'm quite stumped at what's causing this. The parse always seems to omit the start of the message, but that's about all I can find in common in these occurrences. If that is the case, then why doesn't the parse for the prior section of the event throw an error? It's very strange.
I added a commit that increases the frequency of polling to see if that helps. Let me know what you get with that @rustrial.
I upgraded to Pulumi version 3.3.1 and it still fails with the following error message:
error: failed to parse engine event
event: d-nexiot.eu-central-1","nx/pulumi/stage":"live","nx/resource/owner":"[email protected]"},"userData":"","vpcSecurityGroupIds":[]},"provider":""},"logical":true,"provider":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::pulumi:providers:aws::default_4_5_1::04da6b54-80e4-46f7-96ec-b56ff0331ba9"},"planning":true}}
SyntaxError: Unexpected token d in JSON at position 0
error: Unhandled exception: Error: An error was encountered while tailing the file
at TailFile._streamFileChanges (/workdir/common/temp/node_modules/.pnpm/@[email protected]/node_modules/@logdna/tail-file/lib/tail-file.js:252:21)
at runMicrotasks (<anonymous>)
at processTicksAndRejections (internal/process/task_queues.js:95:5)
at TailFile._pollFileForChanges (/workdir/common/temp/node_modules/.pnpm/@[email protected]/node_modules/@logdna/tail-file/lib/tail-file.js:196:9)
error: One or more errors occurred
Can we please reopen this issue and fix the underlying cause. Until the root cause has been identified, I recommend that you add an interim fix which at least makes sure that the process does not fail (just print a warning, but do not fail).
Sorry for the trouble @alex-berger. I'm going to go ahead and change this error to just log instead of break, but it would be really useful to get some more details from you about your environment. What OS are you using? What's the node version? What pulumi provider libraries and versions are you using? Anything that could help us recreate the issue would be super valuable as it has been impossible to replicate on my end.
I run Pulumi in a Docker toolbox using Docker CE Desktop for Mac with the project directory mounted from the Mac into the Docker Container.
The Docker Image contains:
- OS: Linux (Ubuntu 20.10)
- Pulumi: 3.3.1
- Node Version: v14.17.0
According to the logs above, the event log files are located in /tmp/.../eventlog.txt, a subdirectory of /tmp, which is mounted as overlayfs in the Docker Container. For testing purposes I temporarily changed my setup to mount /tmp as tmpfs (an fast in-memory filesystem) filesystem (such that it is no longer part of the Docker container's overlayfs), but it still fails with the same error.
I also checked the eventlog.txt file and it contains syntactically valid JSON (cat eventlog.txt …| jq succeeds). It's size is 2210714 bytes (2.2Mi), contains 884 lines and the longest line has 64932 bytes.
I guess this might be a bug which only reveals itself if certain timing constraints are violated, maybe on very fast or very slow filesystem (syncs) or maybe it is caused by exceeding certain file or line size.
@komalali I will send you that eventlog.txt file per email.
Thanks @alex-berger! Yeah I looked at the last eventlog you sent me and I had also thought that maybe this was happening with very long lines but the instances that had errored in your case were not on the longest lines. It might be a timing issue though, as your suspect. I'll try this out in Docker, hopefully that'll do the trick.
Actually jq was lying at me there are a lot of invalid lines in the file.
while read line; do if ! echo "$line" | jq >/dev/null; then echo "$line"; fi; done < eventlog.txt
Which reveals
arse error: Invalid numeric literal at line 1, column 183
{"sequence":0,"timestamp":1622149849,"diagnosticEvent":{"prefix":"u003c{%reset%}u003edebug: u003c{%reset%}u003e","message":"u003c{%reset%}u003eAWS Auth provider used: "StaticProvider"u003c{%reset%}u003en","color":"raw","severity":"debug"}}
...
There are unescaped quotes " in there.
@alex-berger Hmm interesting. It doesn't appear to fail on those lines though... Are you able to find invalid json in the line that actually threw the error?
Btw, that same line in VS code shows all of the quotes escaped:
{"sequence":0,"timestamp":1622149849,"diagnosticEvent":{"prefix":"\u003c{%reset%}\u003edebug: \u003c{%reset%}\u003e","message":"\u003c{%reset%}\u003eAWS Auth provider used: \"StaticProvider\"\u003c{%reset%}\u003e\n","color":"raw","severity":"debug"}}
@komalali My bad, the shell code removes the escaped quotes, I should have checked that.
You might also want to check how readline works. What happens if the beginning of a line is flushed but the end of the line including the terminating newline character is not yet flushed (and therefore not yet visible to the reader TailFile resp readline)?
Also remember, only (append) writes below 4k (maybe the exact number changed over the years, but the concept still holds true) in size are atomic on Linux. So if a writer writes a line of size 5k, the reader might observe only the first 4k and the remaining 1k becomes visible with a delay. If readline reaches the end of the (currently available) input, but has not yet seen a newline character, what will it do? Will it emit that input as line or will it wait for the next newline to appear?
@komalali The line that throws the error contains valid JSON, see below:
{"sequence":8,"timestamp":1622149850,"resourcePreEvent":{"metadata":{"op":"same","urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::pulumi:pulumi:Stack::eks-cluster-nxc-v1-live-prd-nexiot.eu-central-1","type":"pulumi:pulumi:Stack","old":{"type":"pulumi:pulumi:Stack","urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::pulumi:pulumi:Stack::eks-cluster-nxc-v1-live-prd-nexiot.eu-central-1","id":"","parent":"","inputs":{},"outputs":{"clusterNodes":[{"name":"cluster_services_linux_amd64_v1","nodeGroups":[{"amiType":"AL2_x86_64","arn":"arn:aws:eks:eu-central-1:672400401698:nodegroup/a-1-nxc/cluster_services_linux_amd64_v1-0-g/34bc2f3e-e3e0-0d20-82d3-4c227632e3ec","capacityType":"ON_DEMAND","clusterName":"a-1-nxc","diskSize":0,"forceUpdateVersion":true,"id":"a-1-nxc:cluster_services_linux_amd64_v1-0-g","instanceTypes":["t3a.xlarge","t3.xlarge","m5a.xlarge","m5.xlarge"],"labels":{"node.k8s.nexxiot.com/network-zone":"private","node.k8s.nexxiot.com/purpose":"k8s-cluster"},"launchTemplate":{"id":"lt-0c8f7e42a45a6385f","name":"cluster_services_linux_amd64_v1-cluster_services_linux_amd64_v1Template-0-880c130","version":"1"},"nodeGroupName":"cluster_services_linux_amd64_v1-0-g","nodeRoleArn":"arn:aws:iam::672400401698:role/EKSW-20210322144015258800000005","releaseVersion":"1.19.6-20210310","remoteAccess":null,"resources":[{"autoscalingGroups":[{"name":"eks-34bc2f3e-e3e0-0d20-82d3-4c227632e3ec"}],"remoteAccessSecurityGroupId":""}],"scalingConfig":{"desiredSize":3,"maxSize":4,"minSize":1},"status":"ACTIVE","subnetIds":["subnet-21f6884a"],"tags":{"nx/AvailabilityZones":"eu-central-1a","nx/pulumi/project":"eks-cluster-nxc-v1","nx/pulumi/stack":"live-prd-nexiot.eu-central-1","nx/pulumi/stage":"live","nx/resource/owner":"[email protected]"},"urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet$aws:eks/nodeGroup:NodeGroup::cluster_services_linux_amd64_v1-cluster_services_linux_amd64_v1-0","version":"1.19"},{"amiType":"AL2_x86_64","arn":"arn:aws:eks:eu-central-1:672400401698:nodegroup/a-1-nxc/cluster_services_linux_amd64_v1-1-g/e8bc2f3e-e65d-4a68-19bd-f9c66cd5c94e","capacityType":"ON_DEMAND","clusterName":"a-1-nxc","diskSize":0,"forceUpdateVersion":true,"id":"a-1-nxc:cluster_services_linux_amd64_v1-1-g","instanceTypes":["t3a.xlarge","t3.xlarge","m5a.xlarge","m5.xlarge"],"labels":{"node.k8s.nexxiot.com/network-zone":"private","node.k8s.nexxiot.com/purpose":"k8s-cluster"},"launchTemplate":{"id":"lt-03fa73166c4a2434c","name":"cluster_services_linux_amd64_v1-cluster_services_linux_amd64_v1Template-1-fef7850","version":"1"},"nodeGroupName":"cluster_services_linux_amd64_v1-1-g","nodeRoleArn":"arn:aws:iam::672400401698:role/EKSW-20210322144015258800000005","releaseVersion":"1.19.6-20210310","remoteAccess":null,"resources":[{"autoscalingGroups":[{"name":"eks-e8bc2f3e-e65d-4a68-19bd-f9c66cd5c94e"}],"remoteAccessSecurityGroupId":""}],"scalingConfig":{"desiredSize":3,"maxSize":4,"minSize":1},"status":"ACTIVE","subnetIds":["subnet-a4ac1ad9"],"tags":{"nx/AvailabilityZones":"eu-central-1b","nx/pulumi/project":"eks-cluster-nxc-v1","nx/pulumi/stack":"live-prd-nexiot.eu-central-1","nx/pulumi/stage":"live","nx/resource/owner":"[email protected]"},"urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet$aws:eks/nodeGroup:NodeGroup::cluster_services_linux_amd64_v1-cluster_services_linux_amd64_v1-1","version":"1.19"},{"amiType":"AL2_x86_64","arn":"arn:aws:eks:eu-central-1:672400401698:nodegroup/a-1-nxc/cluster_services_linux_amd64_v1-2-g/5cbc2f3e-e533-198c-c8a0-d36da96e5965","capacityType":"ON_DEMAND","clusterName":"a-1-nxc","diskSize":0,"forceUpdateVersion":true,"id":"a-1-nxc:cluster_services_linux_amd64_v1-2-g","instanceTypes":["t3a.xlarge","t3.xlarge","m5a.xlarge","m5.xlarge"],"labels":{"node.k8s.nexxiot.com/network-zone":"private","node.k8s.nexxiot.com/purpose":"k8s-cluster"},"launchTemplate":{"id":"lt-03f26b5487c37a306","name":"cluster_services_linux_amd64_v1-cluster_services_linux_amd64_v1Template-2-a8163de","version":"1"},"nodeGroupName":"cluster_services_linux_amd64_v1-2-g","nodeRoleArn":"arn:aws:iam::672400401698:role/EKSW-20210322144015258800000005","releaseVersion":"1.19.6-20210310","remoteAccess":null,"resources":[{"autoscalingGroups":[{"name":"eks-5cbc2f3e-e533-198c-c8a0-d36da96e5965"}],"remoteAccessSecurityGroupId":""}],"scalingConfig":{"desiredSize":3,"maxSize":4,"minSize":1},"status":"ACTIVE","subnetIds":["subnet-d8bb2b95"],"tags":{"nx/AvailabilityZones":"eu-central-1c","nx/pulumi/project":"eks-cluster-nxc-v1","nx/pulumi/stack":"live-prd-nexiot.eu-central-1","nx/pulumi/stage":"live","nx/resource/owner":"[email protected]"},"urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet$aws:eks/nodeGroup:NodeGroup::cluster_services_linux_amd64_v1-cluster_services_linux_amd64_v1-2","version":"1.19"}],"urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet::cluster_services_linux_amd64_v1"},{"name":"gp_linux_amd64_v1","nodeGroups":[{"amiType":"AL2_x86_64","arn":"arn:aws:eks:eu-central-1:672400401698:nodegroup/a-1-nxc/gp_linux_amd64_v1-0-g/6abc2f3e-e2b7-8fbe-6ddc-e4c7165eae6b","capacityType":"ON_DEMAND","clusterName":"a-1-nxc","diskSize":0,"forceUpdateVersion":true,"id":"a-1-nxc:gp_linux_amd64_v1-0-g","instanceTypes":["t3a.xlarge","t3.xlarge","m5a.xlarge","m5.xlarge"],"labels":{"node.k8s.nexxiot.com/network-zone":"private","node.k8s.nexxiot.com/purpose":"application"},"launchTemplate":{"id":"lt-037c18a87b0937b89","name":"gp_linux_amd64_v1-gp_linux_amd64_v1Template-0-d996c1f","version":"1"},"nodeGroupName":"gp_linux_amd64_v1-0-g","nodeRoleArn":"arn:aws:iam::672400401698:role/EKSW-20210322144015258800000005","releaseVersion":"1.19.6-20210414","remoteAccess":null,"resources":[{"autoscalingGroups":[{"name":"eks-6abc2f3e-e2b7-8fbe-6ddc-e4c7165eae6b"}],"remoteAccessSecurityGroupId":""}],"scalingConfig":{"desiredSize":2,"maxSize":15,"minSize":1},"status":"ACTIVE","subnetIds":["subnet-21f6884a"],"tags":{"nx/AvailabilityZones":"eu-central-1a","nx/pulumi/project":"eks-cluster-nxc-v1","nx/pulumi/stack":"live-prd-nexiot.eu-central-1","nx/pulumi/stage":"live","nx/resource/owner":"[email protected]"},"urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet$aws:eks/nodeGroup:NodeGroup::gp_linux_amd64_v1-gp_linux_amd64_v1-0","version":"1.19"},{"amiType":"AL2_x86_64","arn":"arn:aws:eks:eu-central-1:672400401698:nodegroup/a-1-nxc/gp_linux_amd64_v1-1-g/26bc2f3e-e1ed-919c-23bd-fcbf217c6cde","capacityType":"ON_DEMAND","clusterName":"a-1-nxc","diskSize":0,"forceUpdateVersion":true,"id":"a-1-nxc:gp_linux_amd64_v1-1-g","instanceTypes":["t3a.xlarge","t3.xlarge","m5a.xlarge","m5.xlarge"],"labels":{"node.k8s.nexxiot.com/network-zone":"private","node.k8s.nexxiot.com/purpose":"application"},"launchTemplate":{"id":"lt-08a6106153ab57885","name":"gp_linux_amd64_v1-gp_linux_amd64_v1Template-1-2e1036b","version":"1"},"nodeGroupName":"gp_linux_amd64_v1-1-g","nodeRoleArn":"arn:aws:iam::672400401698:role/EKSW-20210322144015258800000005","releaseVersion":"1.19.6-20210414","remoteAccess":null,"resources":[{"autoscalingGroups":[{"name":"eks-26bc2f3e-e1ed-919c-23bd-fcbf217c6cde"}],"remoteAccessSecurityGroupId":""}],"scalingConfig":{"desiredSize":2,"maxSize":15,"minSize":1},"status":"ACTIVE","subnetIds":["subnet-a4ac1ad9"],"tags":{"nx/AvailabilityZones":"eu-central-1b","nx/pulumi/project":"eks-cluster-nxc-v1","nx/pulumi/stack":"live-prd-nexiot.eu-central-1","nx/pulumi/stage":"live","nx/resource/owner":"[email protected]"},"urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet$aws:eks/nodeGroup:NodeGroup::gp_linux_amd64_v1-gp_linux_amd64_v1-1","version":"1.19"},{"amiType":"AL2_x86_64","arn":"arn:aws:eks:eu-central-1:672400401698:nodegroup/a-1-nxc/gp_linux_amd64_v1-2-g/94bc2f3e-e8bb-01d2-ac10-fe34fb9005ca","capacityType":"ON_DEMAND","clusterName":"a-1-nxc","diskSize":0,"forceUpdateVersion":true,"id":"a-1-nxc:gp_linux_amd64_v1-2-g","instanceTypes":["t3a.xlarge","t3.xlarge","m5a.xlarge","m5.xlarge"],"labels":{"node.k8s.nexxiot.com/network-zone":"private","node.k8s.nexxiot.com/purpose":"application"},"launchTemplate":{"id":"lt-0e2ae5fd0e539b404","name":"gp_linux_amd64_v1-gp_linux_amd64_v1Template-2-6a4e5af","version":"1"},"nodeGroupName":"gp_linux_amd64_v1-2-g","nodeRoleArn":"arn:aws:iam::672400401698:role/EKSW-20210322144015258800000005","releaseVersion":"1.19.6-20210414","remoteAccess":null,"resources":[{"autoscalingGroups":[{"name":"eks-94bc2f3e-e8bb-01d2-ac10-fe34fb9005ca"}],"remoteAccessSecurityGroupId":""}],"scalingConfig":{"desiredSize":2,"maxSize":15,"minSize":1},"status":"ACTIVE","subnetIds":["subnet-d8bb2b95"],"tags":{"nx/AvailabilityZones":"eu-central-1c","nx/pulumi/project":"eks-cluster-nxc-v1","nx/pulumi/stack":"live-prd-nexiot.eu-central-1","nx/pulumi/stage":"live","nx/resource/owner":"[email protected]"},"urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet$aws:eks/nodeGroup:NodeGroup::gp_linux_amd64_v1-gp_linux_amd64_v1-2","version":"1.19"}],"urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet::gp_linux_amd64_v1"}],"controlPlane":{"cluster":{"arn":"arn:aws:eks:eu-central-1:672400401698:cluster/a-1-nxc","certificateAuthority":{"data":"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"},"createdAt":"2021-03-22 14:29:24.567 +0000 UTC","enabledClusterLogTypes":["controllerManager","scheduler","authenticator","audit","api"],"encryptionConfig":{"provider":{"keyArn":"arn:aws:kms:eu-central-1:672400401698:key/8d27777f-0524-4836-9a01-9feae8dc1243"},"resources":["secrets"]},"endpoint":"https://0ADCDA3DE54D54261AB6CB276D48FB3D.gr7.eu-central-1.eks.amazonaws.com","id":"a-1-nxc","identities":[{"oidcs":[{"issuer":"https://oidc.eks.eu-central-1.amazonaws.com/id/0ADCDA3DE54D54261AB6CB276D48FB3D"}]}],"kubernetesNetworkConfig":{"serviceIpv4Cidr":"172.20.0.0/16"},"name":"a-1-nxc","platformVersion":"eks.2","roleArn":"arn:aws:iam::672400401698:role/EKSC-20210322142919449500000002","status":"ACTIVE","tags":{"nx/eks/cluster/family":"nxc","nx/eks/cluster/memberId":"a","nx/eks/cluster/name":"a-1-nxc","nx/eks/cluster/revision":"1","nx/pulumi/project":"eks-cluster-nxc-v1","nx/pulumi/stack":"live-prd-nexiot.eu-central-1","nx/pulumi/stage":"live","nx/resource/owner":"[email protected]"},"urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane$aws:eks/cluster:Cluster::EKSClusterV1","version":"1.19","vpcConfig":{"clusterSecurityGroupId":"sg-000f64fd9c94926b7","endpointPrivateAccess":true,"endpointPublicAccess":false,"publicAccessCidrs":["0.0.0.0/0"],"securityGroupIds":["sg-0962cdb2c90a02cc8"],"subnetIds":["subnet-d8bb2b95","subnet-21f6884a","subnet-a4ac1ad9"],"vpcId":"vpc-a053e0cb"}},"controlPlaneRole":{"arn":"arn:aws:iam::672400401698:role/EKSC-20210322142919449500000002","assumeRolePolicy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"},\"Action\":\"sts:AssumeRole\"}]}","createDate":"2021-03-22T14:29:20Z","description":"The role that Amazon EKS uses to manage AWS resources for Kubernetes cluster","forceDetachPolicies":true,"id":"EKSC-20210322142919449500000002","inlinePolicies":[{"name":"","policy":""}],"managedPolicyArns":["arn:aws:iam::aws:policy/AmazonEKSServicePolicy","arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"],"maxSessionDuration":3600,"name":"EKSC-20210322142919449500000002","namePrefix":"EKSC-","path":"/","tags":{"nx/eks/cluster/family":"nxc","nx/eks/cluster/memberId":"a","nx/eks/cluster/name":"a-1-nxc","nx/eks/cluster/revision":"1","nx/pulumi/project":"eks-cluster-nxc-v1","nx/pulumi/stack":"live-prd-nexiot.eu-central-1","nx/pulumi/stage":"live","nx/resource/owner":"[email protected]"},"uniqueId":"AROAZZDRP4URF7IEMSGWU","urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane$aws:iam/role:Role::EKSClusterV1-EKSControlPlaneRole"},"controlPlaneSecurityGroup":{"arn":"arn:aws:ec2:eu-central-1:672400401698:security-group/sg-0962cdb2c90a02cc8","description":"EKS created security group applied to ENI that is attached to EKS Control Plane master nodes, as well as any managed workloads.","egress":[],"id":"sg-0962cdb2c90a02cc8","ingress":[{"cidrBlocks":["0.0.0.0/0"],"description":"Allow Kubernetes API access from external clients, which are not part of the ControlPlane security group.","fromPort":443,"ipv6CidrBlocks":["::/0"],"prefixListIds":[],"protocol":"tcp","securityGroups":[],"self":false,"toPort":443}],"name":"EKSC-20210322142918822000000001","namePrefix":"EKSC-","ownerId":"672400401698","revokeRulesOnDelete":true,"tags":{"nx/eks/cluster/family":"nxc","nx/eks/cluster/memberId":"a","nx/eks/cluster/name":"a-1-nxc","nx/eks/cluster/revision":"1","nx/pulumi/project":"eks-cluster-nxc-v1","nx/pulumi/stack":"live-prd-nexiot.eu-central-1","nx/pulumi/stage":"live","nx/resource/owner":"[email protected]"},"urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane$aws:ec2/securityGroup:SecurityGroup::EKSClusterV1-ExtraSecurityGroup","vpcId":"vpc-a053e0cb"},"defaultWorkerNodeRole":{"arn":"arn:aws:iam::672400401698:role/EKSW-20210322144015258800000005","assumeRolePolicy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"},\"Action\":\"sts:AssumeRole\"}]}","createDate":"2021-03-22T14:40:17Z","description":"EKS worker nodes role for EKS cluster a-1-nxc","forceDetachPolicies":false,"id":"EKSW-20210322144015258800000005","inlinePolicies":[{"name":"CoreDNS20210322144020391800000008","policy":"{\"Statement\":[{\"Action\":[\"route53:ListHostedZones\",\"route53:ListHostedZonesByName\",\"route53:ListResourceRecordSets\"],\"Effect\":\"Allow\",\"Resource\":[\"*\"]}],\"Version\":\"2012-10-17\"}"}],"managedPolicyArns":["arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy","arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy","arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"],"maxSessionDuration":3600,"name":"EKSW-20210322144015258800000005","namePrefix":"EKSW-","path":"/","tags":{"nx/eks/cluster":"a-1-nxc","nx/eks/cluster/family":"nxc","nx/eks/cluster/memberId":"a","nx/eks/cluster/name":"a-1-nxc","nx/eks/cluster/revision":"1","nx/eks/clusterArn":"arn:aws:eks:eu-central-1:672400401698:cluster/a-1-nxc","nx/pulumi/project":"eks-cluster-nxc-v1","nx/pulumi/stack":"live-prd-nexiot.eu-central-1","nx/pulumi/stage":"live","nx/resource/owner":"[email protected]"},"uniqueId":"AROAZZDRP4URPWPTFBVQQ","urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane$aws:iam/role:Role::EKSClusterV1-DefaultEksWorkerNodeRole"},"kubernetesProviderArguments":{"apiEndpoint":"https://0ADCDA3DE54D54261AB6CB276D48FB3D.gr7.eu-central-1.eks.amazonaws.com","certificateAuthorityData":"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","cluster":"a-1-nxc","region":"eu-central-1","roleArn":"arn:aws:iam::672400401698:role/nxAdministrator-V2"},"openIdConnectProviders":[{"arn":"arn:aws:iam::672400401698:oidc-provider/oidc.eks.eu-central-1.amazonaws.com/id/0ADCDA3DE54D54261AB6CB276D48FB3D","clientIdLists":["sts.amazonaws.com"],"id":"arn:aws:iam::672400401698:oidc-provider/oidc.eks.eu-central-1.amazonaws.com/id/0ADCDA3DE54D54261AB6CB276D48FB3D","thumbprintLists":["917e732d330f9a12404f73d8bea36948b929dffc","06b25927c42a721631c1efd9431e648fa62e1e39","9e99a48a9960b14926bb7f3b02e22da2b0ab7280","ad7e1c28b064ef8f6003402014c3d0e3370eb58a"],"url":"oidc.eks.eu-central-1.amazonaws.com/id/0ADCDA3DE54D54261AB6CB276D48FB3D","urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane$aws:iam/openIdConnectProvider:OpenIdConnectProvider::EKSClusterV1-OIDCProvider-0"}],"owner":"arn:aws:iam::672400401698:role/nxAdministrator-V2","urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane::EKSClusterV1","vpc":{"CidrBlock":"10.8.0.0/16","CidrBlockAssociationSet":[{"AssociationId":"vpc-cidr-assoc-0f4cf167","CidrBlock":"10.8.0.0/16","CidrBlockState":{"State":"associated"}}],"DhcpOptionsId":"dopt-fa07f293","InstanceTenancy":"default","Ipv6CidrBlockAssociationSet":[{"AssociationId":"vpc-cidr-assoc-004cf168","Ipv6CidrBlock":"2a05:d014:969:2400::/56","Ipv6CidrBlockState":{"State":"associated"},"Ipv6Pool":"Amazon","NetworkBorderGroup":"eu-central-1"}],"IsDefault":false,"OwnerId":"672400401698","State":"available","Tags":[{"Key":"nx:Scope:Collection","Value":"nexiot-cloud-platform"},{"Key":"nx:Resource:Purpose","Value":"nx:nexiot:cloud-platform"},{"Key":"nx:Resource:ManagementPolicy","Value":"automatically"},{"Key":"nx:Resource:Provisioner","Value":"terraform"},{"Key":"nx:Resource:ScopePolicy:ops","Value":"consumer"},{"Key":"nx:Scope:Stack","Value":"nx-account-networking"},{"Key":"nx:Source:Repository","Value":"https://gitlab.com/nexiot-ag/sre/iac/nexiot-cloud-platform-infrastructure"},{"Key":"nx:Resource:ScopePolicy:adm","Value":"owner"},{"Key":"Name","Value":"nx-platform"},{"Key":"nx:Resource:ScopePolicy:sre","Value":"owner"},{"Key":"nx:Resource:Manager","Value":"nightshift"},{"Key":"nx:Network:Id","Value":"nx-platform"},{"Key":"nx:Resource:Phase","Value":"production"},{"Key":"nx:Resource:Owner","Value":"[email protected]"}],"VpcId":"vpc-a053e0cb","internetGatewayId":"igw-571b783f","isolatedSubnets":[],"natGatewayIds":["nat-05a804eb6f275463f","nat-0696ce162a57dd8da","nat-033faf8e17a54d081"],"privateSubnets":[{"AssignIpv6AddressOnCreation":true,"AvailabilityZone":"eu-central-1b","AvailabilityZoneId":"euc1-az3","AvailableIpAddressCount":3902,"CidrBlock":"10.8.16.0/20","DefaultForAz":false,"Ipv6CidrBlockAssociationSet":[{"AssociationId":"subnet-cidr-assoc-0c141674","Ipv6CidrBlock":"2a05:d014:969:2401::/64","Ipv6CidrBlockState":{"State":"associated"}}],"MapCustomerOwnedIpOnLaunch":false,"MapPublicIpOnLaunch":false,"OwnerId":"672400401698","State":"available","SubnetArn":"arn:aws:ec2:eu-central-1:672400401698:subnet/subnet-a4ac1ad9","SubnetId":"subnet-a4ac1ad9","SubnetType":"private","Tags":[{"Key":"nx:Resource:Purpose","Value":"nx:nexiot:cloud-platform"},{"Key":"nx:Network:Id","Value":"nx-platform"},{"Key":"Name","Value":"nx-platform-LAN-B"},{"Key":"nx:Resource:ScopePolicy:ops","Value":"consumer"},{"Key":"nx:Scope:Collection","Value":"nexiot-cloud-platform"},{"Key":"nx:Resource:Provisioner","Value":"terraform"},{"Key":"nx:Scope:Stack","Value":"nx-account-networking"},{"Key":"nx:Resource:ScopePolicy:sre","Value":"owner"},{"Key":"nx:Source:Repository","Value":"https://gitlab.com/nexiot-ag/sre/iac/nexiot-cloud-platform-infrastructure"},{"Key":"nx:Resource:Manager","Value":"nightshift"},{"Key":"kubernetes.io/role/internal-elb","Value":"1"},{"Key":"nx:Resource:Owner","Value":"[email protected]"},{"Key":"nx:Resource:Phase","Value":"production"},{"Key":"nx:Resource:ManagementPolicy","Value":"automatically"},{"Key":"kubernetes.io/cluster/a-1-nxc","Value":"shared"},{"Key":"nx:Resource:ScopePolicy:adm","Value":"owner"},{"Key":"nx:Network:Zone","Value":"LAN"}],"VpcId":"vpc-a053e0cb"},{"AssignIpv6AddressOnCreation":true,"AvailabilityZone":"eu-central-1a","AvailabilityZoneId":"euc1-az2","AvailableIpAddressCount":3919,"CidrBlock":"10.8.0.0/20","DefaultForAz":false,"Ipv6CidrBlockAssociationSet":[{"AssociationId":"subnet-cidr-assoc-1aae4673","Ipv6CidrBlock":"2a05:d014:969:2400::/64","Ipv6CidrBlockState":{"State":"associated"}}],"MapCustomerOwnedIpOnLaunch":false,"MapPublicIpOnLaunch":false,"OwnerId":"672400401698","State":"available","SubnetArn":"arn:aws:ec2:eu-central-1:672400401698:subnet/subnet-21f6884a","SubnetId":"subnet-21f6884a","SubnetType":"private","Tags":[{"Key":"kubernetes.io/cluster/a-1-nxc","Value":"shared"},{"Key":"nx:Network:Zone","Value":"LAN"},{"Key":"nx:Resource:Purpose","Value":"nx:nexiot:cloud-platform"},{"Key":"nx:Scope:Collection","Value":"nexiot-cloud-platform"},{"Key":"nx:Scope:Stack","Value":"nx-account-networking"},{"Key":"Name","Value":"nx-platform-LAN-A"},{"Key":"nx:Resource:ScopePolicy:ops","Value":"consumer"},{"Key":"nx:Resource:Provisioner","Value":"terraform"},{"Key":"nx:Resource:ScopePolicy:adm","Value":"owner"},{"Key":"nx:Resource:ScopePolicy:sre","Value":"owner"},{"Key":"nx:Resource:ManagementPolicy","Value":"automatically"},{"Key":"nx:Resource:Phase","Value":"production"},{"Key":"kubernetes.io/role/internal-elb","Value":"1"},{"Key":"nx:Resource:Owner","Value":"[email protected]"},{"Key":"nx:Source:Repository","Value":"https://gitlab.com/nexiot-ag/sre/iac/nexiot-cloud-platform-infrastructure"},{"Key":"nx:Network:Id","Value":"nx-platform"},{"Key":"nx:Resource:Manager","Value":"nightshift"}],"VpcId":"vpc-a053e0cb"},{"AssignIpv6AddressOnCreation":true,"AvailabilityZone":"eu-central-1c","AvailabilityZoneId":"euc1-az1","AvailableIpAddressCount":3977,"CidrBlock":"10.8.32.0/20","DefaultForAz":false,"Ipv6CidrBlockAssociationSet":[{"AssociationId":"subnet-cidr-assoc-bc0122f6","Ipv6CidrBlock":"2a05:d014:969:2402::/64","Ipv6CidrBlockState":{"State":"associated"}}],"MapCustomerOwnedIpOnLaunch":false,"MapPublicIpOnLaunch":false,"OwnerId":"672400401698","State":"available","SubnetArn":"arn:aws:ec2:eu-central-1:672400401698:subnet/subnet-d8bb2b95","SubnetId":"subnet-d8bb2b95","SubnetType":"private","Tags":[{"Key":"nx:Resource:ScopePolicy:sre","Value":"owner"},{"Key":"nx:Resource:ManagementPolicy","Value":"automatically"},{"Key":"nx:Resource:Phase","Value":"production"},{"Key":"nx:Resource:Manager","Value":"nightshift"},{"Key":"nx:Source:Repository","Value":"https://gitlab.com/nexiot-ag/sre/iac/nexiot-cloud-platform-infrastructure"},{"Key":"Name","Value":"nx-platform-LAN-C"},{"Key":"nx:Scope:Collection","Value":"nexiot-cloud-platform"},{"Key":"nx:Resource:Purpose","Value":"nx:nexiot:cloud-platform"},{"Key":"kubernetes.io/cluster/a-1-nxc","Value":"shared"},{"Key":"nx:Scope:Stack","Value":"nx-account-networking"},{"Key":"nx:Resource:ScopePolicy:ops","Value":"consumer"},{"Key":"nx:Resource:Provisioner","Value":"terraform"},{"Key":"nx:Resource:Owner","Value":"[email protected]"},{"Key":"kubernetes.io/role/internal-elb","Value":"1"},{"Key":"nx:Network:Id","Value":"nx-platform"},{"Key":"nx:Network:Zone","Value":"LAN"},{"Key":"nx:Resource:ScopePolicy:adm","Value":"owner"}],"VpcId":"vpc-a053e0cb"}],"publicSubnets":[{"AssignIpv6AddressOnCreation":true,"AvailabilityZone":"eu-central-1a","AvailabilityZoneId":"euc1-az2","AvailableIpAddressCount":4088,"CidrBlock":"10.8.128.0/20","DefaultForAz":false,"Ipv6CidrBlockAssociationSet":[{"AssociationId":"subnet-cidr-assoc-01a04868","Ipv6CidrBlock":"2a05:d014:969:2480::/64","Ipv6CidrBlockState":{"State":"associated"}}],"MapCustomerOwnedIpOnLaunch":false,"MapPublicIpOnLaunch":true,"OwnerId":"672400401698","State":"available","SubnetArn":"arn:aws:ec2:eu-central-1:672400401698:subnet/subnet-f6f6889d","SubnetId":"subnet-f6f6889d","SubnetType":"public","Tags":[{"Key":"kubernetes.io/role/elb","Value":"1"},{"Key":"nx:Network:Zone","Value":"DMZ"},{"Key":"nx:Scope:Stack","Value":"nx-account-networking"},{"Key":"Name","Value":"nx-platform-DMZ-A"},{"Key":"nx:Resource:Provisioner","Value":"terraform"},{"Key":"nx:Resource:ScopePolicy:ops","Value":"consumer"},{"Key":"nx:Resource:Owner","Value":"[email protected]"},{"Key":"nx:Resource:Phase","Value":"production"},{"Key":"nx:Resource:ScopePolicy:adm","Value":"owner"},{"Key":"nx:Network:Id","Value":"nx-platform"},{"Key":"kubernetes.io/cluster/a-1-nxc","Value":"shared"},{"Key":"nx:Resource:Manager","Value":"nightshift"},{"Key":"nx:Resource:ManagementPolicy","Value":"automatically"},{"Key":"nx:Resource:ScopePolicy:sre","Value":"owner"},{"Key":"nx:Source:Repository","Value":"https://gitlab.com/nexiot-ag/sre/iac/nexiot-cloud-platform-infrastructure"},{"Key":"nx:Scope:Collection","Value":"nexiot-cloud-platform"},{"Key":"nx:Resource:Purpose","Value":"nx:nexiot:cloud-platform"}],"VpcId":"vpc-a053e0cb"},{"AssignIpv6AddressOnCreation":true,"AvailabilityZone":"eu-central-1c","AvailabilityZoneId":"euc1-az1","AvailableIpAddressCount":4087,"CidrBlock":"10.8.160.0/20","DefaultForAz":false,"Ipv6CidrBlockAssociationSet":[{"AssociationId":"subnet-cidr-assoc-8b0023c1","Ipv6CidrBlock":"2a05:d014:969:2482::/64","Ipv6CidrBlockState":{"State":"associated"}}],"MapCustomerOwnedIpOnLaunch":false,"MapPublicIpOnLaunch":true,"OwnerId":"672400401698","State":"available","SubnetArn":"arn:aws:ec2:eu-central-1:672400401698:subnet/subnet-78bb2b35","SubnetId":"subnet-78bb2b35","SubnetType":"public","Tags":[{"Key":"nx:Resource:ScopePolicy:ops","Value":"consumer"},{"Key":"kubernetes.io/cluster/a-1-nxc","Value":"shared"},{"Key":"nx:Network:Zone","Value":"DMZ"},{"Key":"nx:Scope:Stack","Value":"nx-account-networking"},{"Key":"nx:Resource:Provisioner","Value":"terraform"},{"Key":"nx:Source:Repository","Value":"https://gitlab.com/nexiot-ag/sre/iac/nexiot-cloud-platform-infrastructure"},{"Key":"kubernetes.io/role/elb","Value":"1"},{"Key":"nx:Resource:Purpose","Value":"nx:nexiot:cloud-platform"},{"Key":"nx:Scope:Collection","Value":"nexiot-cloud-platform"},{"Key":"nx:Resource:Manager","Value":"nightshift"},{"Key":"nx:Resource:ScopePolicy:adm","Value":"owner"},{"Key":"nx:Resource:ScopePolicy:sre","Value":"owner"},{"Key":"nx:Resource:ManagementPolicy","Value":"automatically"},{"Key":"Name","Value":"nx-platform-DMZ-C"},{"Key":"nx:Network:Id","Value":"nx-platform"},{"Key":"nx:Resource:Owner","Value":"[email protected]"},{"Key":"nx:Resource:Phase","Value":"production"}],"VpcId":"vpc-a053e0cb"},{"AssignIpv6AddressOnCreation":true,"AvailabilityZone":"eu-central-1b","AvailabilityZoneId":"euc1-az3","AvailableIpAddressCount":4088,"CidrBlock":"10.8.144.0/20","DefaultForAz":false,"Ipv6CidrBlockAssociationSet":[{"AssociationId":"subnet-cidr-assoc-d31715ab","Ipv6CidrBlock":"2a05:d014:969:2481::/64","Ipv6CidrBlockState":{"State":"associated"}}],"MapCustomerOwnedIpOnLaunch":false,"MapPublicIpOnLaunch":true,"OwnerId":"672400401698","State":"available","SubnetArn":"arn:aws:ec2:eu-central-1:672400401698:subnet/subnet-d4aa1ca9","SubnetId":"subnet-d4aa1ca9","SubnetType":"public","Tags":[{"Key":"kubernetes.io/cluster/a-1-nxc","Value":"shared"},{"Key":"nx:Source:Repository","Value":"https://gitlab.com/nexiot-ag/sre/iac/nexiot-cloud-platform-infrastructure"},{"Key":"nx:Scope:Stack","Value":"nx-account-networking"},{"Key":"kubernetes.io/role/elb","Value":"1"},{"Key":"nx:Resource:ScopePolicy:ops","Value":"consumer"},{"Key":"nx:Resource:Provisioner","Value":"terraform"},{"Key":"nx:Resource:ManagementPolicy","Value":"automatically"},{"Key":"nx:Resource:Phase","Value":"production"},{"Key":"nx:Scope:Collection","Value":"nexiot-cloud-platform"},{"Key":"nx:Resource:Purpose","Value":"nx:nexiot:cloud-platform"},{"Key":"nx:Resource:ScopePolicy:adm","Value":"owner"},{"Key":"nx:Resource:Manager","Value":"nightshift"},{"Key":"nx:Network:Zone","Value":"DMZ"},{"Key":"nx:Network:Id","Value":"nx-platform"},{"Key":"nx:Resource:Owner","Value":"[email protected]"},{"Key":"nx:Resource:ScopePolicy:sre","Value":"owner"},{"Key":"Name","Value":"nx-platform-DMZ-B"}],"VpcId":"vpc-a053e0cb"}]}}},"provider":""},"new":{"type":"pulumi:pulumi:Stack","urn":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::pulumi:pulumi:Stack::eks-cluster-nxc-v1-live-prd-nexiot.eu-central-1","id":"","parent":"","inputs":{},"outputs":{},"provider":""},"logical":true,"provider":""},"planning":true}}
Which formatted looks like this:
{
"sequence": 8,
"timestamp": 1622149850,
"resourcePreEvent": {
"metadata": {
"op": "same",
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::pulumi:pulumi:Stack::eks-cluster-nxc-v1-live-prd-nexiot.eu-central-1",
"type": "pulumi:pulumi:Stack",
"old": {
"type": "pulumi:pulumi:Stack",
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::pulumi:pulumi:Stack::eks-cluster-nxc-v1-live-prd-nexiot.eu-central-1",
"id": "",
"parent": "",
"inputs": {},
"outputs": {
"clusterNodes": [
{
"name": "cluster_services_linux_amd64_v1",
"nodeGroups": [
{
"amiType": "AL2_x86_64",
"arn": "arn:aws:eks:eu-central-1:672400401698:nodegroup/a-1-nxc/cluster_services_linux_amd64_v1-0-g/34bc2f3e-e3e0-0d20-82d3-4c227632e3ec",
"capacityType": "ON_DEMAND",
"clusterName": "a-1-nxc",
"diskSize": 0,
"forceUpdateVersion": true,
"id": "a-1-nxc:cluster_services_linux_amd64_v1-0-g",
"instanceTypes": [
"t3a.xlarge",
"t3.xlarge",
"m5a.xlarge",
"m5.xlarge"
],
"labels": {
"node.k8s.nexxiot.com/network-zone": "private",
"node.k8s.nexxiot.com/purpose": "k8s-cluster"
},
"launchTemplate": {
"id": "lt-0c8f7e42a45a6385f",
"name": "cluster_services_linux_amd64_v1-cluster_services_linux_amd64_v1Template-0-880c130",
"version": "1"
},
"nodeGroupName": "cluster_services_linux_amd64_v1-0-g",
"nodeRoleArn": "arn:aws:iam::672400401698:role/EKSW-20210322144015258800000005",
"releaseVersion": "1.19.6-20210310",
"remoteAccess": null,
"resources": [
{
"autoscalingGroups": [
{
"name": "eks-34bc2f3e-e3e0-0d20-82d3-4c227632e3ec"
}
],
"remoteAccessSecurityGroupId": ""
}
],
"scalingConfig": {
"desiredSize": 3,
"maxSize": 4,
"minSize": 1
},
"status": "ACTIVE",
"subnetIds": [
"subnet-21f6884a"
],
"tags": {
"nx/AvailabilityZones": "eu-central-1a",
"nx/pulumi/project": "eks-cluster-nxc-v1",
"nx/pulumi/stack": "live-prd-nexiot.eu-central-1",
"nx/pulumi/stage": "live",
"nx/resource/owner": "[email protected]"
},
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet$aws:eks/nodeGroup:NodeGroup::cluster_services_linux_amd64_v1-cluster_services_linux_amd64_v1-0",
"version": "1.19"
},
{
"amiType": "AL2_x86_64",
"arn": "arn:aws:eks:eu-central-1:672400401698:nodegroup/a-1-nxc/cluster_services_linux_amd64_v1-1-g/e8bc2f3e-e65d-4a68-19bd-f9c66cd5c94e",
"capacityType": "ON_DEMAND",
"clusterName": "a-1-nxc",
"diskSize": 0,
"forceUpdateVersion": true,
"id": "a-1-nxc:cluster_services_linux_amd64_v1-1-g",
"instanceTypes": [
"t3a.xlarge",
"t3.xlarge",
"m5a.xlarge",
"m5.xlarge"
],
"labels": {
"node.k8s.nexxiot.com/network-zone": "private",
"node.k8s.nexxiot.com/purpose": "k8s-cluster"
},
"launchTemplate": {
"id": "lt-03fa73166c4a2434c",
"name": "cluster_services_linux_amd64_v1-cluster_services_linux_amd64_v1Template-1-fef7850",
"version": "1"
},
"nodeGroupName": "cluster_services_linux_amd64_v1-1-g",
"nodeRoleArn": "arn:aws:iam::672400401698:role/EKSW-20210322144015258800000005",
"releaseVersion": "1.19.6-20210310",
"remoteAccess": null,
"resources": [
{
"autoscalingGroups": [
{
"name": "eks-e8bc2f3e-e65d-4a68-19bd-f9c66cd5c94e"
}
],
"remoteAccessSecurityGroupId": ""
}
],
"scalingConfig": {
"desiredSize": 3,
"maxSize": 4,
"minSize": 1
},
"status": "ACTIVE",
"subnetIds": [
"subnet-a4ac1ad9"
],
"tags": {
"nx/AvailabilityZones": "eu-central-1b",
"nx/pulumi/project": "eks-cluster-nxc-v1",
"nx/pulumi/stack": "live-prd-nexiot.eu-central-1",
"nx/pulumi/stage": "live",
"nx/resource/owner": "[email protected]"
},
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet$aws:eks/nodeGroup:NodeGroup::cluster_services_linux_amd64_v1-cluster_services_linux_amd64_v1-1",
"version": "1.19"
},
{
"amiType": "AL2_x86_64",
"arn": "arn:aws:eks:eu-central-1:672400401698:nodegroup/a-1-nxc/cluster_services_linux_amd64_v1-2-g/5cbc2f3e-e533-198c-c8a0-d36da96e5965",
"capacityType": "ON_DEMAND",
"clusterName": "a-1-nxc",
"diskSize": 0,
"forceUpdateVersion": true,
"id": "a-1-nxc:cluster_services_linux_amd64_v1-2-g",
"instanceTypes": [
"t3a.xlarge",
"t3.xlarge",
"m5a.xlarge",
"m5.xlarge"
],
"labels": {
"node.k8s.nexxiot.com/network-zone": "private",
"node.k8s.nexxiot.com/purpose": "k8s-cluster"
},
"launchTemplate": {
"id": "lt-03f26b5487c37a306",
"name": "cluster_services_linux_amd64_v1-cluster_services_linux_amd64_v1Template-2-a8163de",
"version": "1"
},
"nodeGroupName": "cluster_services_linux_amd64_v1-2-g",
"nodeRoleArn": "arn:aws:iam::672400401698:role/EKSW-20210322144015258800000005",
"releaseVersion": "1.19.6-20210310",
"remoteAccess": null,
"resources": [
{
"autoscalingGroups": [
{
"name": "eks-5cbc2f3e-e533-198c-c8a0-d36da96e5965"
}
],
"remoteAccessSecurityGroupId": ""
}
],
"scalingConfig": {
"desiredSize": 3,
"maxSize": 4,
"minSize": 1
},
"status": "ACTIVE",
"subnetIds": [
"subnet-d8bb2b95"
],
"tags": {
"nx/AvailabilityZones": "eu-central-1c",
"nx/pulumi/project": "eks-cluster-nxc-v1",
"nx/pulumi/stack": "live-prd-nexiot.eu-central-1",
"nx/pulumi/stage": "live",
"nx/resource/owner": "[email protected]"
},
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet$aws:eks/nodeGroup:NodeGroup::cluster_services_linux_amd64_v1-cluster_services_linux_amd64_v1-2",
"version": "1.19"
}
],
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet::cluster_services_linux_amd64_v1"
},
{
"name": "gp_linux_amd64_v1",
"nodeGroups": [
{
"amiType": "AL2_x86_64",
"arn": "arn:aws:eks:eu-central-1:672400401698:nodegroup/a-1-nxc/gp_linux_amd64_v1-0-g/6abc2f3e-e2b7-8fbe-6ddc-e4c7165eae6b",
"capacityType": "ON_DEMAND",
"clusterName": "a-1-nxc",
"diskSize": 0,
"forceUpdateVersion": true,
"id": "a-1-nxc:gp_linux_amd64_v1-0-g",
"instanceTypes": [
"t3a.xlarge",
"t3.xlarge",
"m5a.xlarge",
"m5.xlarge"
],
"labels": {
"node.k8s.nexxiot.com/network-zone": "private",
"node.k8s.nexxiot.com/purpose": "application"
},
"launchTemplate": {
"id": "lt-037c18a87b0937b89",
"name": "gp_linux_amd64_v1-gp_linux_amd64_v1Template-0-d996c1f",
"version": "1"
},
"nodeGroupName": "gp_linux_amd64_v1-0-g",
"nodeRoleArn": "arn:aws:iam::672400401698:role/EKSW-20210322144015258800000005",
"releaseVersion": "1.19.6-20210414",
"remoteAccess": null,
"resources": [
{
"autoscalingGroups": [
{
"name": "eks-6abc2f3e-e2b7-8fbe-6ddc-e4c7165eae6b"
}
],
"remoteAccessSecurityGroupId": ""
}
],
"scalingConfig": {
"desiredSize": 2,
"maxSize": 15,
"minSize": 1
},
"status": "ACTIVE",
"subnetIds": [
"subnet-21f6884a"
],
"tags": {
"nx/AvailabilityZones": "eu-central-1a",
"nx/pulumi/project": "eks-cluster-nxc-v1",
"nx/pulumi/stack": "live-prd-nexiot.eu-central-1",
"nx/pulumi/stage": "live",
"nx/resource/owner": "[email protected]"
},
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet$aws:eks/nodeGroup:NodeGroup::gp_linux_amd64_v1-gp_linux_amd64_v1-0",
"version": "1.19"
},
{
"amiType": "AL2_x86_64",
"arn": "arn:aws:eks:eu-central-1:672400401698:nodegroup/a-1-nxc/gp_linux_amd64_v1-1-g/26bc2f3e-e1ed-919c-23bd-fcbf217c6cde",
"capacityType": "ON_DEMAND",
"clusterName": "a-1-nxc",
"diskSize": 0,
"forceUpdateVersion": true,
"id": "a-1-nxc:gp_linux_amd64_v1-1-g",
"instanceTypes": [
"t3a.xlarge",
"t3.xlarge",
"m5a.xlarge",
"m5.xlarge"
],
"labels": {
"node.k8s.nexxiot.com/network-zone": "private",
"node.k8s.nexxiot.com/purpose": "application"
},
"launchTemplate": {
"id": "lt-08a6106153ab57885",
"name": "gp_linux_amd64_v1-gp_linux_amd64_v1Template-1-2e1036b",
"version": "1"
},
"nodeGroupName": "gp_linux_amd64_v1-1-g",
"nodeRoleArn": "arn:aws:iam::672400401698:role/EKSW-20210322144015258800000005",
"releaseVersion": "1.19.6-20210414",
"remoteAccess": null,
"resources": [
{
"autoscalingGroups": [
{
"name": "eks-26bc2f3e-e1ed-919c-23bd-fcbf217c6cde"
}
],
"remoteAccessSecurityGroupId": ""
}
],
"scalingConfig": {
"desiredSize": 2,
"maxSize": 15,
"minSize": 1
},
"status": "ACTIVE",
"subnetIds": [
"subnet-a4ac1ad9"
],
"tags": {
"nx/AvailabilityZones": "eu-central-1b",
"nx/pulumi/project": "eks-cluster-nxc-v1",
"nx/pulumi/stack": "live-prd-nexiot.eu-central-1",
"nx/pulumi/stage": "live",
"nx/resource/owner": "[email protected]"
},
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet$aws:eks/nodeGroup:NodeGroup::gp_linux_amd64_v1-gp_linux_amd64_v1-1",
"version": "1.19"
},
{
"amiType": "AL2_x86_64",
"arn": "arn:aws:eks:eu-central-1:672400401698:nodegroup/a-1-nxc/gp_linux_amd64_v1-2-g/94bc2f3e-e8bb-01d2-ac10-fe34fb9005ca",
"capacityType": "ON_DEMAND",
"clusterName": "a-1-nxc",
"diskSize": 0,
"forceUpdateVersion": true,
"id": "a-1-nxc:gp_linux_amd64_v1-2-g",
"instanceTypes": [
"t3a.xlarge",
"t3.xlarge",
"m5a.xlarge",
"m5.xlarge"
],
"labels": {
"node.k8s.nexxiot.com/network-zone": "private",
"node.k8s.nexxiot.com/purpose": "application"
},
"launchTemplate": {
"id": "lt-0e2ae5fd0e539b404",
"name": "gp_linux_amd64_v1-gp_linux_amd64_v1Template-2-6a4e5af",
"version": "1"
},
"nodeGroupName": "gp_linux_amd64_v1-2-g",
"nodeRoleArn": "arn:aws:iam::672400401698:role/EKSW-20210322144015258800000005",
"releaseVersion": "1.19.6-20210414",
"remoteAccess": null,
"resources": [
{
"autoscalingGroups": [
{
"name": "eks-94bc2f3e-e8bb-01d2-ac10-fe34fb9005ca"
}
],
"remoteAccessSecurityGroupId": ""
}
],
"scalingConfig": {
"desiredSize": 2,
"maxSize": 15,
"minSize": 1
},
"status": "ACTIVE",
"subnetIds": [
"subnet-d8bb2b95"
],
"tags": {
"nx/AvailabilityZones": "eu-central-1c",
"nx/pulumi/project": "eks-cluster-nxc-v1",
"nx/pulumi/stack": "live-prd-nexiot.eu-central-1",
"nx/pulumi/stage": "live",
"nx/resource/owner": "[email protected]"
},
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet$aws:eks/nodeGroup:NodeGroup::gp_linux_amd64_v1-gp_linux_amd64_v1-2",
"version": "1.19"
}
],
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:NodeGroupSet::gp_linux_amd64_v1"
}
],
"controlPlane": {
"cluster": {
"arn": "arn:aws:eks:eu-central-1:672400401698:cluster/a-1-nxc",
"certificateAuthority": {
"data": "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"
},
"createdAt": "2021-03-22 14:29:24.567 +0000 UTC",
"enabledClusterLogTypes": [
"controllerManager",
"scheduler",
"authenticator",
"audit",
"api"
],
"encryptionConfig": {
"provider": {
"keyArn": "arn:aws:kms:eu-central-1:672400401698:key/8d27777f-0524-4836-9a01-9feae8dc1243"
},
"resources": [
"secrets"
]
},
"endpoint": "https://0ADCDA3DE54D54261AB6CB276D48FB3D.gr7.eu-central-1.eks.amazonaws.com",
"id": "a-1-nxc",
"identities": [
{
"oidcs": [
{
"issuer": "https://oidc.eks.eu-central-1.amazonaws.com/id/0ADCDA3DE54D54261AB6CB276D48FB3D"
}
]
}
],
"kubernetesNetworkConfig": {
"serviceIpv4Cidr": "172.20.0.0/16"
},
"name": "a-1-nxc",
"platformVersion": "eks.2",
"roleArn": "arn:aws:iam::672400401698:role/EKSC-20210322142919449500000002",
"status": "ACTIVE",
"tags": {
"nx/eks/cluster/family": "nxc",
"nx/eks/cluster/memberId": "a",
"nx/eks/cluster/name": "a-1-nxc",
"nx/eks/cluster/revision": "1",
"nx/pulumi/project": "eks-cluster-nxc-v1",
"nx/pulumi/stack": "live-prd-nexiot.eu-central-1",
"nx/pulumi/stage": "live",
"nx/resource/owner": "[email protected]"
},
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane$aws:eks/cluster:Cluster::EKSClusterV1",
"version": "1.19",
"vpcConfig": {
"clusterSecurityGroupId": "sg-000f64fd9c94926b7",
"endpointPrivateAccess": true,
"endpointPublicAccess": false,
"publicAccessCidrs": [
"0.0.0.0/0"
],
"securityGroupIds": [
"sg-0962cdb2c90a02cc8"
],
"subnetIds": [
"subnet-d8bb2b95",
"subnet-21f6884a",
"subnet-a4ac1ad9"
],
"vpcId": "vpc-a053e0cb"
}
},
"controlPlaneRole": {
"arn": "arn:aws:iam::672400401698:role/EKSC-20210322142919449500000002",
"assumeRolePolicy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"},\"Action\":\"sts:AssumeRole\"}]}",
"createDate": "2021-03-22T14:29:20Z",
"description": "The role that Amazon EKS uses to manage AWS resources for Kubernetes cluster",
"forceDetachPolicies": true,
"id": "EKSC-20210322142919449500000002",
"inlinePolicies": [
{
"name": "",
"policy": ""
}
],
"managedPolicyArns": [
"arn:aws:iam::aws:policy/AmazonEKSServicePolicy",
"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
],
"maxSessionDuration": 3600,
"name": "EKSC-20210322142919449500000002",
"namePrefix": "EKSC-",
"path": "/",
"tags": {
"nx/eks/cluster/family": "nxc",
"nx/eks/cluster/memberId": "a",
"nx/eks/cluster/name": "a-1-nxc",
"nx/eks/cluster/revision": "1",
"nx/pulumi/project": "eks-cluster-nxc-v1",
"nx/pulumi/stack": "live-prd-nexiot.eu-central-1",
"nx/pulumi/stage": "live",
"nx/resource/owner": "[email protected]"
},
"uniqueId": "AROAZZDRP4URF7IEMSGWU",
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane$aws:iam/role:Role::EKSClusterV1-EKSControlPlaneRole"
},
"controlPlaneSecurityGroup": {
"arn": "arn:aws:ec2:eu-central-1:672400401698:security-group/sg-0962cdb2c90a02cc8",
"description": "EKS created security group applied to ENI that is attached to EKS Control Plane master nodes, as well as any managed workloads.",
"egress": [],
"id": "sg-0962cdb2c90a02cc8",
"ingress": [
{
"cidrBlocks": [
"0.0.0.0/0"
],
"description": "Allow Kubernetes API access from external clients, which are not part of the ControlPlane security group.",
"fromPort": 443,
"ipv6CidrBlocks": [
"::/0"
],
"prefixListIds": [],
"protocol": "tcp",
"securityGroups": [],
"self": false,
"toPort": 443
}
],
"name": "EKSC-20210322142918822000000001",
"namePrefix": "EKSC-",
"ownerId": "672400401698",
"revokeRulesOnDelete": true,
"tags": {
"nx/eks/cluster/family": "nxc",
"nx/eks/cluster/memberId": "a",
"nx/eks/cluster/name": "a-1-nxc",
"nx/eks/cluster/revision": "1",
"nx/pulumi/project": "eks-cluster-nxc-v1",
"nx/pulumi/stack": "live-prd-nexiot.eu-central-1",
"nx/pulumi/stage": "live",
"nx/resource/owner": "[email protected]"
},
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane$aws:ec2/securityGroup:SecurityGroup::EKSClusterV1-ExtraSecurityGroup",
"vpcId": "vpc-a053e0cb"
},
"defaultWorkerNodeRole": {
"arn": "arn:aws:iam::672400401698:role/EKSW-20210322144015258800000005",
"assumeRolePolicy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"},\"Action\":\"sts:AssumeRole\"}]}",
"createDate": "2021-03-22T14:40:17Z",
"description": "EKS worker nodes role for EKS cluster a-1-nxc",
"forceDetachPolicies": false,
"id": "EKSW-20210322144015258800000005",
"inlinePolicies": [
{
"name": "CoreDNS20210322144020391800000008",
"policy": "{\"Statement\":[{\"Action\":[\"route53:ListHostedZones\",\"route53:ListHostedZonesByName\",\"route53:ListResourceRecordSets\"],\"Effect\":\"Allow\",\"Resource\":[\"*\"]}],\"Version\":\"2012-10-17\"}"
}
],
"managedPolicyArns": [
"arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
"arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
"arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
],
"maxSessionDuration": 3600,
"name": "EKSW-20210322144015258800000005",
"namePrefix": "EKSW-",
"path": "/",
"tags": {
"nx/eks/cluster": "a-1-nxc",
"nx/eks/cluster/family": "nxc",
"nx/eks/cluster/memberId": "a",
"nx/eks/cluster/name": "a-1-nxc",
"nx/eks/cluster/revision": "1",
"nx/eks/clusterArn": "arn:aws:eks:eu-central-1:672400401698:cluster/a-1-nxc",
"nx/pulumi/project": "eks-cluster-nxc-v1",
"nx/pulumi/stack": "live-prd-nexiot.eu-central-1",
"nx/pulumi/stage": "live",
"nx/resource/owner": "[email protected]"
},
"uniqueId": "AROAZZDRP4URPWPTFBVQQ",
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane$aws:iam/role:Role::EKSClusterV1-DefaultEksWorkerNodeRole"
},
"kubernetesProviderArguments": {
"apiEndpoint": "https://0ADCDA3DE54D54261AB6CB276D48FB3D.gr7.eu-central-1.eks.amazonaws.com",
"certificateAuthorityData": "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",
"cluster": "a-1-nxc",
"region": "eu-central-1",
"roleArn": "arn:aws:iam::672400401698:role/nxAdministrator-V2"
},
"openIdConnectProviders": [
{
"arn": "arn:aws:iam::672400401698:oidc-provider/oidc.eks.eu-central-1.amazonaws.com/id/0ADCDA3DE54D54261AB6CB276D48FB3D",
"clientIdLists": [
"sts.amazonaws.com"
],
"id": "arn:aws:iam::672400401698:oidc-provider/oidc.eks.eu-central-1.amazonaws.com/id/0ADCDA3DE54D54261AB6CB276D48FB3D",
"thumbprintLists": [
"917e732d330f9a12404f73d8bea36948b929dffc",
"06b25927c42a721631c1efd9431e648fa62e1e39",
"9e99a48a9960b14926bb7f3b02e22da2b0ab7280",
"ad7e1c28b064ef8f6003402014c3d0e3370eb58a"
],
"url": "oidc.eks.eu-central-1.amazonaws.com/id/0ADCDA3DE54D54261AB6CB276D48FB3D",
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane$aws:iam/openIdConnectProvider:OpenIdConnectProvider::EKSClusterV1-OIDCProvider-0"
}
],
"owner": "arn:aws:iam::672400401698:role/nxAdministrator-V2",
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::nx:aws:eks:ControlPlane::EKSClusterV1",
"vpc": {
"CidrBlock": "10.8.0.0/16",
"CidrBlockAssociationSet": [
{
"AssociationId": "vpc-cidr-assoc-0f4cf167",
"CidrBlock": "10.8.0.0/16",
"CidrBlockState": {
"State": "associated"
}
}
],
"DhcpOptionsId": "dopt-fa07f293",
"InstanceTenancy": "default",
"Ipv6CidrBlockAssociationSet": [
{
"AssociationId": "vpc-cidr-assoc-004cf168",
"Ipv6CidrBlock": "2a05:d014:969:2400::/56",
"Ipv6CidrBlockState": {
"State": "associated"
},
"Ipv6Pool": "Amazon",
"NetworkBorderGroup": "eu-central-1"
}
],
"IsDefault": false,
"OwnerId": "672400401698",
"State": "available",
"Tags": [
{
"Key": "nx:Scope:Collection",
"Value": "nexiot-cloud-platform"
},
{
"Key": "nx:Resource:Purpose",
"Value": "nx:nexiot:cloud-platform"
},
{
"Key": "nx:Resource:ManagementPolicy",
"Value": "automatically"
},
{
"Key": "nx:Resource:Provisioner",
"Value": "terraform"
},
{
"Key": "nx:Resource:ScopePolicy:ops",
"Value": "consumer"
},
{
"Key": "nx:Scope:Stack",
"Value": "nx-account-networking"
},
{
"Key": "nx:Source:Repository",
"Value": "https://gitlab.com/nexiot-ag/sre/iac/nexiot-cloud-platform-infrastructure"
},
{
"Key": "nx:Resource:ScopePolicy:adm",
"Value": "owner"
},
{
"Key": "Name",
"Value": "nx-platform"
},
{
"Key": "nx:Resource:ScopePolicy:sre",
"Value": "owner"
},
{
"Key": "nx:Resource:Manager",
"Value": "nightshift"
},
{
"Key": "nx:Network:Id",
"Value": "nx-platform"
},
{
"Key": "nx:Resource:Phase",
"Value": "production"
},
{
"Key": "nx:Resource:Owner",
"Value": "[email protected]"
}
],
"VpcId": "vpc-a053e0cb",
"internetGatewayId": "igw-571b783f",
"isolatedSubnets": [],
"natGatewayIds": [
"nat-05a804eb6f275463f",
"nat-0696ce162a57dd8da",
"nat-033faf8e17a54d081"
],
"privateSubnets": [
{
"AssignIpv6AddressOnCreation": true,
"AvailabilityZone": "eu-central-1b",
"AvailabilityZoneId": "euc1-az3",
"AvailableIpAddressCount": 3902,
"CidrBlock": "10.8.16.0/20",
"DefaultForAz": false,
"Ipv6CidrBlockAssociationSet": [
{
"AssociationId": "subnet-cidr-assoc-0c141674",
"Ipv6CidrBlock": "2a05:d014:969:2401::/64",
"Ipv6CidrBlockState": {
"State": "associated"
}
}
],
"MapCustomerOwnedIpOnLaunch": false,
"MapPublicIpOnLaunch": false,
"OwnerId": "672400401698",
"State": "available",
"SubnetArn": "arn:aws:ec2:eu-central-1:672400401698:subnet/subnet-a4ac1ad9",
"SubnetId": "subnet-a4ac1ad9",
"SubnetType": "private",
"Tags": [
{
"Key": "nx:Resource:Purpose",
"Value": "nx:nexiot:cloud-platform"
},
{
"Key": "nx:Network:Id",
"Value": "nx-platform"
},
{
"Key": "Name",
"Value": "nx-platform-LAN-B"
},
{
"Key": "nx:Resource:ScopePolicy:ops",
"Value": "consumer"
},
{
"Key": "nx:Scope:Collection",
"Value": "nexiot-cloud-platform"
},
{
"Key": "nx:Resource:Provisioner",
"Value": "terraform"
},
{
"Key": "nx:Scope:Stack",
"Value": "nx-account-networking"
},
{
"Key": "nx:Resource:ScopePolicy:sre",
"Value": "owner"
},
{
"Key": "nx:Source:Repository",
"Value": "https://gitlab.com/nexiot-ag/sre/iac/nexiot-cloud-platform-infrastructure"
},
{
"Key": "nx:Resource:Manager",
"Value": "nightshift"
},
{
"Key": "kubernetes.io/role/internal-elb",
"Value": "1"
},
{
"Key": "nx:Resource:Owner",
"Value": "[email protected]"
},
{
"Key": "nx:Resource:Phase",
"Value": "production"
},
{
"Key": "nx:Resource:ManagementPolicy",
"Value": "automatically"
},
{
"Key": "kubernetes.io/cluster/a-1-nxc",
"Value": "shared"
},
{
"Key": "nx:Resource:ScopePolicy:adm",
"Value": "owner"
},
{
"Key": "nx:Network:Zone",
"Value": "LAN"
}
],
"VpcId": "vpc-a053e0cb"
},
{
"AssignIpv6AddressOnCreation": true,
"AvailabilityZone": "eu-central-1a",
"AvailabilityZoneId": "euc1-az2",
"AvailableIpAddressCount": 3919,
"CidrBlock": "10.8.0.0/20",
"DefaultForAz": false,
"Ipv6CidrBlockAssociationSet": [
{
"AssociationId": "subnet-cidr-assoc-1aae4673",
"Ipv6CidrBlock": "2a05:d014:969:2400::/64",
"Ipv6CidrBlockState": {
"State": "associated"
}
}
],
"MapCustomerOwnedIpOnLaunch": false,
"MapPublicIpOnLaunch": false,
"OwnerId": "672400401698",
"State": "available",
"SubnetArn": "arn:aws:ec2:eu-central-1:672400401698:subnet/subnet-21f6884a",
"SubnetId": "subnet-21f6884a",
"SubnetType": "private",
"Tags": [
{
"Key": "kubernetes.io/cluster/a-1-nxc",
"Value": "shared"
},
{
"Key": "nx:Network:Zone",
"Value": "LAN"
},
{
"Key": "nx:Resource:Purpose",
"Value": "nx:nexiot:cloud-platform"
},
{
"Key": "nx:Scope:Collection",
"Value": "nexiot-cloud-platform"
},
{
"Key": "nx:Scope:Stack",
"Value": "nx-account-networking"
},
{
"Key": "Name",
"Value": "nx-platform-LAN-A"
},
{
"Key": "nx:Resource:ScopePolicy:ops",
"Value": "consumer"
},
{
"Key": "nx:Resource:Provisioner",
"Value": "terraform"
},
{
"Key": "nx:Resource:ScopePolicy:adm",
"Value": "owner"
},
{
"Key": "nx:Resource:ScopePolicy:sre",
"Value": "owner"
},
{
"Key": "nx:Resource:ManagementPolicy",
"Value": "automatically"
},
{
"Key": "nx:Resource:Phase",
"Value": "production"
},
{
"Key": "kubernetes.io/role/internal-elb",
"Value": "1"
},
{
"Key": "nx:Resource:Owner",
"Value": "[email protected]"
},
{
"Key": "nx:Source:Repository",
"Value": "https://gitlab.com/nexiot-ag/sre/iac/nexiot-cloud-platform-infrastructure"
},
{
"Key": "nx:Network:Id",
"Value": "nx-platform"
},
{
"Key": "nx:Resource:Manager",
"Value": "nightshift"
}
],
"VpcId": "vpc-a053e0cb"
},
{
"AssignIpv6AddressOnCreation": true,
"AvailabilityZone": "eu-central-1c",
"AvailabilityZoneId": "euc1-az1",
"AvailableIpAddressCount": 3977,
"CidrBlock": "10.8.32.0/20",
"DefaultForAz": false,
"Ipv6CidrBlockAssociationSet": [
{
"AssociationId": "subnet-cidr-assoc-bc0122f6",
"Ipv6CidrBlock": "2a05:d014:969:2402::/64",
"Ipv6CidrBlockState": {
"State": "associated"
}
}
],
"MapCustomerOwnedIpOnLaunch": false,
"MapPublicIpOnLaunch": false,
"OwnerId": "672400401698",
"State": "available",
"SubnetArn": "arn:aws:ec2:eu-central-1:672400401698:subnet/subnet-d8bb2b95",
"SubnetId": "subnet-d8bb2b95",
"SubnetType": "private",
"Tags": [
{
"Key": "nx:Resource:ScopePolicy:sre",
"Value": "owner"
},
{
"Key": "nx:Resource:ManagementPolicy",
"Value": "automatically"
},
{
"Key": "nx:Resource:Phase",
"Value": "production"
},
{
"Key": "nx:Resource:Manager",
"Value": "nightshift"
},
{
"Key": "nx:Source:Repository",
"Value": "https://gitlab.com/nexiot-ag/sre/iac/nexiot-cloud-platform-infrastructure"
},
{
"Key": "Name",
"Value": "nx-platform-LAN-C"
},
{
"Key": "nx:Scope:Collection",
"Value": "nexiot-cloud-platform"
},
{
"Key": "nx:Resource:Purpose",
"Value": "nx:nexiot:cloud-platform"
},
{
"Key": "kubernetes.io/cluster/a-1-nxc",
"Value": "shared"
},
{
"Key": "nx:Scope:Stack",
"Value": "nx-account-networking"
},
{
"Key": "nx:Resource:ScopePolicy:ops",
"Value": "consumer"
},
{
"Key": "nx:Resource:Provisioner",
"Value": "terraform"
},
{
"Key": "nx:Resource:Owner",
"Value": "[email protected]"
},
{
"Key": "kubernetes.io/role/internal-elb",
"Value": "1"
},
{
"Key": "nx:Network:Id",
"Value": "nx-platform"
},
{
"Key": "nx:Network:Zone",
"Value": "LAN"
},
{
"Key": "nx:Resource:ScopePolicy:adm",
"Value": "owner"
}
],
"VpcId": "vpc-a053e0cb"
}
],
"publicSubnets": [
{
"AssignIpv6AddressOnCreation": true,
"AvailabilityZone": "eu-central-1a",
"AvailabilityZoneId": "euc1-az2",
"AvailableIpAddressCount": 4088,
"CidrBlock": "10.8.128.0/20",
"DefaultForAz": false,
"Ipv6CidrBlockAssociationSet": [
{
"AssociationId": "subnet-cidr-assoc-01a04868",
"Ipv6CidrBlock": "2a05:d014:969:2480::/64",
"Ipv6CidrBlockState": {
"State": "associated"
}
}
],
"MapCustomerOwnedIpOnLaunch": false,
"MapPublicIpOnLaunch": true,
"OwnerId": "672400401698",
"State": "available",
"SubnetArn": "arn:aws:ec2:eu-central-1:672400401698:subnet/subnet-f6f6889d",
"SubnetId": "subnet-f6f6889d",
"SubnetType": "public",
"Tags": [
{
"Key": "kubernetes.io/role/elb",
"Value": "1"
},
{
"Key": "nx:Network:Zone",
"Value": "DMZ"
},
{
"Key": "nx:Scope:Stack",
"Value": "nx-account-networking"
},
{
"Key": "Name",
"Value": "nx-platform-DMZ-A"
},
{
"Key": "nx:Resource:Provisioner",
"Value": "terraform"
},
{
"Key": "nx:Resource:ScopePolicy:ops",
"Value": "consumer"
},
{
"Key": "nx:Resource:Owner",
"Value": "[email protected]"
},
{
"Key": "nx:Resource:Phase",
"Value": "production"
},
{
"Key": "nx:Resource:ScopePolicy:adm",
"Value": "owner"
},
{
"Key": "nx:Network:Id",
"Value": "nx-platform"
},
{
"Key": "kubernetes.io/cluster/a-1-nxc",
"Value": "shared"
},
{
"Key": "nx:Resource:Manager",
"Value": "nightshift"
},
{
"Key": "nx:Resource:ManagementPolicy",
"Value": "automatically"
},
{
"Key": "nx:Resource:ScopePolicy:sre",
"Value": "owner"
},
{
"Key": "nx:Source:Repository",
"Value": "https://gitlab.com/nexiot-ag/sre/iac/nexiot-cloud-platform-infrastructure"
},
{
"Key": "nx:Scope:Collection",
"Value": "nexiot-cloud-platform"
},
{
"Key": "nx:Resource:Purpose",
"Value": "nx:nexiot:cloud-platform"
}
],
"VpcId": "vpc-a053e0cb"
},
{
"AssignIpv6AddressOnCreation": true,
"AvailabilityZone": "eu-central-1c",
"AvailabilityZoneId": "euc1-az1",
"AvailableIpAddressCount": 4087,
"CidrBlock": "10.8.160.0/20",
"DefaultForAz": false,
"Ipv6CidrBlockAssociationSet": [
{
"AssociationId": "subnet-cidr-assoc-8b0023c1",
"Ipv6CidrBlock": "2a05:d014:969:2482::/64",
"Ipv6CidrBlockState": {
"State": "associated"
}
}
],
"MapCustomerOwnedIpOnLaunch": false,
"MapPublicIpOnLaunch": true,
"OwnerId": "672400401698",
"State": "available",
"SubnetArn": "arn:aws:ec2:eu-central-1:672400401698:subnet/subnet-78bb2b35",
"SubnetId": "subnet-78bb2b35",
"SubnetType": "public",
"Tags": [
{
"Key": "nx:Resource:ScopePolicy:ops",
"Value": "consumer"
},
{
"Key": "kubernetes.io/cluster/a-1-nxc",
"Value": "shared"
},
{
"Key": "nx:Network:Zone",
"Value": "DMZ"
},
{
"Key": "nx:Scope:Stack",
"Value": "nx-account-networking"
},
{
"Key": "nx:Resource:Provisioner",
"Value": "terraform"
},
{
"Key": "nx:Source:Repository",
"Value": "https://gitlab.com/nexiot-ag/sre/iac/nexiot-cloud-platform-infrastructure"
},
{
"Key": "kubernetes.io/role/elb",
"Value": "1"
},
{
"Key": "nx:Resource:Purpose",
"Value": "nx:nexiot:cloud-platform"
},
{
"Key": "nx:Scope:Collection",
"Value": "nexiot-cloud-platform"
},
{
"Key": "nx:Resource:Manager",
"Value": "nightshift"
},
{
"Key": "nx:Resource:ScopePolicy:adm",
"Value": "owner"
},
{
"Key": "nx:Resource:ScopePolicy:sre",
"Value": "owner"
},
{
"Key": "nx:Resource:ManagementPolicy",
"Value": "automatically"
},
{
"Key": "Name",
"Value": "nx-platform-DMZ-C"
},
{
"Key": "nx:Network:Id",
"Value": "nx-platform"
},
{
"Key": "nx:Resource:Owner",
"Value": "[email protected]"
},
{
"Key": "nx:Resource:Phase",
"Value": "production"
}
],
"VpcId": "vpc-a053e0cb"
},
{
"AssignIpv6AddressOnCreation": true,
"AvailabilityZone": "eu-central-1b",
"AvailabilityZoneId": "euc1-az3",
"AvailableIpAddressCount": 4088,
"CidrBlock": "10.8.144.0/20",
"DefaultForAz": false,
"Ipv6CidrBlockAssociationSet": [
{
"AssociationId": "subnet-cidr-assoc-d31715ab",
"Ipv6CidrBlock": "2a05:d014:969:2481::/64",
"Ipv6CidrBlockState": {
"State": "associated"
}
}
],
"MapCustomerOwnedIpOnLaunch": false,
"MapPublicIpOnLaunch": true,
"OwnerId": "672400401698",
"State": "available",
"SubnetArn": "arn:aws:ec2:eu-central-1:672400401698:subnet/subnet-d4aa1ca9",
"SubnetId": "subnet-d4aa1ca9",
"SubnetType": "public",
"Tags": [
{
"Key": "kubernetes.io/cluster/a-1-nxc",
"Value": "shared"
},
{
"Key": "nx:Source:Repository",
"Value": "https://gitlab.com/nexiot-ag/sre/iac/nexiot-cloud-platform-infrastructure"
},
{
"Key": "nx:Scope:Stack",
"Value": "nx-account-networking"
},
{
"Key": "kubernetes.io/role/elb",
"Value": "1"
},
{
"Key": "nx:Resource:ScopePolicy:ops",
"Value": "consumer"
},
{
"Key": "nx:Resource:Provisioner",
"Value": "terraform"
},
{
"Key": "nx:Resource:ManagementPolicy",
"Value": "automatically"
},
{
"Key": "nx:Resource:Phase",
"Value": "production"
},
{
"Key": "nx:Scope:Collection",
"Value": "nexiot-cloud-platform"
},
{
"Key": "nx:Resource:Purpose",
"Value": "nx:nexiot:cloud-platform"
},
{
"Key": "nx:Resource:ScopePolicy:adm",
"Value": "owner"
},
{
"Key": "nx:Resource:Manager",
"Value": "nightshift"
},
{
"Key": "nx:Network:Zone",
"Value": "DMZ"
},
{
"Key": "nx:Network:Id",
"Value": "nx-platform"
},
{
"Key": "nx:Resource:Owner",
"Value": "[email protected]"
},
{
"Key": "nx:Resource:ScopePolicy:sre",
"Value": "owner"
},
{
"Key": "Name",
"Value": "nx-platform-DMZ-B"
}
],
"VpcId": "vpc-a053e0cb"
}
]
}
}
},
"provider": ""
},
"new": {
"type": "pulumi:pulumi:Stack",
"urn": "urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::pulumi:pulumi:Stack::eks-cluster-nxc-v1-live-prd-nexiot.eu-central-1",
"id": "",
"parent": "",
"inputs": {},
"outputs": {},
"provider": ""
},
"logical": true,
"provider": ""
},
"planning": true
}
}
The thing I find particularly odd is why there isn't an error thrown on the first half of the offending event. Like the error you got was for this event, which is missing the first part of the event. Why isn't there an error on the beginning bits?
d-nexiot.eu-central-1","nx/pulumi/stage":"live","nx/resource/owner":"[email protected]"},"userData":"","vpcSecurityGroupIds":[]},"provider":""},"logical":true,"provider":"urn:pulumi:live-prd-nexiot.eu-central-1::eks-cluster-nxc-v1::pulumi:providers:aws::default_4_5_1::04da6b54-80e4-46f7-96ec-b56ff0331ba9"},"planning":true}}
Also, the line that errored is quite long, but there are actually much longer lines before that event.
I had initially thought there was something wrong with the line splitting library we were using and I actually reimplemented it for the fix in #7032 which is why I had believed it was resolved - but it appears that was not the issue.
We also use the nodejs automation API ourselves in a number of places including in our github action and haven't seen this error. Not making an excuse just trying to explain why this is difficult to track down.
I have a quite big stack and now I'm trying to apply changes that affect many resources. Then I saw this warning and at the end an error inside of Github Actions. This error doesn't happen if I try to run pulumi preview locally.
In this case it's showing that the resources are "unchanged", but what I've changed is that I've set protected: false to many of them.
Resources:
1515 unchanged
warning: provider config warning: "organization": [DEPRECATED] Use owner (or GITHUB_OWNER) instead of organization (or GITHUB_ORGANIZATION)
(node:1942) UnhandledPromiseRejectionWarning: HttpError: Bad credentials
at /home/runner/work/_actions/pulumi/actions/v3/webpack:/pulumi-github-action/node_modules/@octokit/request/dist-node/index.js:66:1
at processTicksAndRejections (internal/process/task_queues.js:93:5)
(node:1942) UnhandledPromiseRejectionWarning: Unhandled promise rejection. This error originated either by throwing inside of an async function without a catch block, or by rejecting a promise which was not handled with .catch(). (rejection id: 1)
(node:1942) [DEP0018] DeprecationWarning: Unhandled promise rejections are deprecated. In the future, promise rejections that are not handled will terminate the Node.js process with a non-zero exit code.
Thanks to the changed logging I now get a better error message:
console.warn
warning: [runtime] Failed to parse engine event
If you're seeing this warning, please comment on https://github.com/pulumi/pulumi/issues/6768 with the event and any
details about your environment.
Event: sion,,,0.44.0,helm.sh/chart,,,ingress-nginx-3.23.0,managedFields,,,,,,,,,,apiVersion,,,batch/v1,fieldsType,,,FieldsV1,fieldsV1,,,,,f:metadata,,,,,f:annotations,,,,,.,,,,,,f:kubectl.kubernetes.io/last-applied-configuration,,,,,,f:labels,,,,,.,,,,,,f:app.kubernetes.io/component,,,,,,f:app.kubernetes.io/instance,,,,,,f:app.kubernetes.io/managed-by,,,,,,f:app.kubernetes.io/name,,,,,,f:app.kubernetes.io/version,,,,,,f:helm.sh/chart,,,,,,f:spec,,,,,f:backoffLimit,,,,,,f:completions,,,,,,f:parallelism,,,,,,f:template,,,,,f:metadata,,,,,f:labels,,,,,.,,,,,,f:app.kubernetes.io/component,,,,,,f:app.kubernetes.io/instance,,,,,,f:app.kubernetes.io/managed-by,,,,,,f:app.kubernetes.io/name,,,,,,f:app.kubernetes.io/version,,,,,,f:helm.sh/chart,,,,,,f:name,,,,,,f:spec,,,,,f:containers,,,,,k:{\"name\":\"create\"},,,,,.,,,,,,f:args,,,,,,f:env,,,,,.,,,,,,k:{\"name\":\"POD_NAMESPACE\"},,,,,.,,,,,,f:name,,,,,,f:valueFrom,,,,,.,,,,,,f:fieldRef,,,,,.,,,,,,f:apiVersion,,,,,,f:fieldPath,,,,,,f:image,,,,,,f:imagePullPolicy,,,,,,f:name,,,,,,f:resources,,,,,,f:terminationMessagePath,,,,,,f:terminationMessagePolicy,,,,,,f:dnsPolicy,,,,,,f:restartPolicy,,,,,,f:schedulerName,,,,,,f:securityContext,,,,,.,,,,,,f:runAsNonRoot,,,,,,f:runAsUser,,,,,,f:serviceAccount,,,,,,f:serviceAccountName,,,,,,f:terminationGracePeriodSeconds,,,,,,manager,,,pulumi-resource-kubernetes,operation,,,Update,time,,,2021-06-17T08:01:42Z,,,,,apiVersion,,,batch/v1,fieldsType,,,FieldsV1,fieldsV1,,,,,f:status,,,,,f:completionTime,,,,,,f:conditions,,,,,.,,,,,,k:{\"type\":\"Complete\"},,,,,.,,,,,,f:lastProbeTime,,,,,,f:lastTransitionTime,,,,,,f:status,,,,,,f:type,,,,,,f:startTime,,,,,,f:succeeded,,,,,,manager,,,kube-controller-manager,operation,,,Update,time,,,2021-06-17T08:01:49Z,name,,,test-aksref-ingress-nginx-admission-create,namespace,,,default,resourceVersion,,,1101,selfLink,,,/apis/batch/v1/namespaces/default/jobs/test-aksref-ingress-nginx-admission-create,uid,,,347fb6e9-1bc8-4be4-993f-cb1f39c200f4,spec,,,,,backoffLimit,,6,completions,,1,parallelism,,1,selector,,,,,matchLabels,,,,,controller-uid,,,347fb6e9-1bc8-4be4-993f-cb1f39c200f4,template,,,,,metadata,,,,,labels,,,,,app.kubernetes.io/component,,,admission-webhook,app.kubernetes.io/instance,,,test-aksref,app.kubernetes.io/managed-by,,,Helm,app.kubernetes.io/name,,,ingress-nginx,app.kubernetes.io/version,,,0.44.0,controller-uid,,,347fb6e9-1bc8-4be4-993f-cb1f39c200f4,helm.sh/chart,,,ingress-nginx-3.23.0,job-name,,,test-aksref-ingress-nginx-admission-create,name,,,test-aksref-ingress-nginx-admission-create,spec,,,,,containers,,,,,,,,,,args,,,,,,,,create,,,--host=test-aksref-ingress-nginx-controller-admission,test-aksref-ingress-nginx-controller-admission.$(POD_NAMESPACE).svc,,,--namespace=$(POD_NAMESPACE),,,--secret-name=test-aksref-ingress-nginx-admission,env,,,,,,,,,,name,,,POD_NAMESPACE,valueFrom,,,,,fieldRef,,,,,apiVersion,,,v1,fieldPath,,,metadata.namespace,image,,,docker.io/jettech/kube-webhook-certgen:v1.5.1,imagePullPolicy,,,IfNotPresent,name,,,create,resources,,,,,,terminationMessagePath,,,/dev/termination-log,terminationMessagePolicy,,,File,dnsPolicy,,,ClusterFirst,restartPolicy,,,OnFailure,schedulerName,,,default-scheduler,securityContext,,,,,runAsNonRoot,,,,true,runAsUser,,2000,serviceAccount,,,test-aksref-ingress-nginx-admission,serviceAccountName,,,test-aksref-ingress-nginx-admission,terminationGracePeriodSeconds,,30,status,,,,,completionTime,,,2021-06-17T08:01:48Z,conditions,,,,,,,,,,lastProbeTime,,,2021-06-17T08:01:48Z,lastTransitionTime,,,2021-06-17T08:01:48Z,status,,,True,type,,,Complete,startTime,,,2021-06-17T08:01:43Z,succeeded,,1,,\u003c{%reset%}\u003e\n","color":"raw","severity":"debug"}}
SyntaxError: Unexpected token s in JSON at position 0
at Object.warn (node_modules/@pulumi/pulumi/log/index.js:69:17)
at Interface.<anonymous> (node_modules/@pulumi/pulumi/automation/stack.js:127:25)
console.warn
warning: [runtime] Failed to parse engine event
If you're seeing this warning, please comment on https://github.com/pulumi/pulumi/issues/6768 with the event and any
details about your environment.
Event: gress-nginx,app.kubernetes.io/version,,,0.44.0,helm.sh/chart,,,ingress-nginx-3.23.0,managedFields,,,,,,,,,,apiVersion,,,batch/v1,fieldsType,,,FieldsV1,fieldsV1,,,,,f:metadata,,,,,f:annotations,,,,,.,,,,,,f:kubectl.kubernetes.io/last-applied-configuration,,,,,,f:labels,,,,,.,,,,,,f:app.kubernetes.io/component,,,,,,f:app.kubernetes.io/instance,,,,,,f:app.kubernetes.io/managed-by,,,,,,f:app.kubernetes.io/name,,,,,,f:app.kubernetes.io/version,,,,,,f:helm.sh/chart,,,,,,f:spec,,,,,f:backoffLimit,,,,,,f:completions,,,,,,f:parallelism,,,,,,f:template,,,,,f:metadata,,,,,f:labels,,,,,.,,,,,,f:app.kubernetes.io/component,,,,,,f:app.kubernetes.io/instance,,,,,,f:app.kubernetes.io/managed-by,,,,,,f:app.kubernetes.io/name,,,,,,f:app.kubernetes.io/version,,,,,,f:helm.sh/chart,,,,,,f:name,,,,,,f:spec,,,,,f:containers,,,,,k:{\"name\":\"create\"},,,,,.,,,,,,f:args,,,,,,f:env,,,,,.,,,,,,k:{\"name\":\"POD_NAMESPACE\"},,,,,.,,,,,,f:name,,,,,,f:valueFrom,,,,,.,,,,,,f:fieldRef,,,,,.,,,,,,f:apiVersion,,,,,,f:fieldPath,,,,,,f:image,,,,,,f:imagePullPolicy,,,,,,f:name,,,,,,f:resources,,,,,,f:terminationMessagePath,,,,,,f:terminationMessagePolicy,,,,,,f:dnsPolicy,,,,,,f:restartPolicy,,,,,,f:schedulerName,,,,,,f:securityContext,,,,,.,,,,,,f:runAsNonRoot,,,,,,f:runAsUser,,,,,,f:serviceAccount,,,,,,f:serviceAccountName,,,,,,f:terminationGracePeriodSeconds,,,,,,manager,,,pulumi-resource-kubernetes,operation,,,Update,time,,,2021-06-17T08:01:42Z,,,,,apiVersion,,,batch/v1,fieldsType,,,FieldsV1,fieldsV1,,,,,f:status,,,,,f:completionTime,,,,,,f:conditions,,,,,.,,,,,,k:{\"type\":\"Complete\"},,,,,.,,,,,,f:lastProbeTime,,,,,,f:lastTransitionTime,,,,,,f:status,,,,,,f:type,,,,,,f:startTime,,,,,,f:succeeded,,,,,,manager,,,kube-controller-manager,operation,,,Update,time,,,2021-06-17T08:01:49Z,name,,,test-aksref-ingress-nginx-admission-create,namespace,,,default,resourceVersion,,,1101,selfLink,,,/apis/batch/v1/namespaces/default/jobs/test-aksref-ingress-nginx-admission-create,uid,,,347fb6e9-1bc8-4be4-993f-cb1f39c200f4,spec,,,,,backoffLimit,,6,completions,,1,parallelism,,1,selector,,,,,matchLabels,,,,,controller-uid,,,347fb6e9-1bc8-4be4-993f-cb1f39c200f4,template,,,,,metadata,,,,,labels,,,,,app.kubernetes.io/component,,,admission-webhook,app.kubernetes.io/instance,,,test-aksref,app.kubernetes.io/managed-by,,,Helm,app.kubernetes.io/name,,,ingress-nginx,app.kubernetes.io/version,,,0.44.0,controller-uid,,,347fb6e9-1bc8-4be4-993f-cb1f39c200f4,helm.sh/chart,,,ingress-nginx-3.23.0,job-name,,,test-aksref-ingress-nginx-admission-create,name,,,test-aksref-ingress-nginx-admission-create,spec,,,,,containers,,,,,,,,,,args,,,,,,,,create,,,--host=test-aksref-ingress-nginx-controller-admission,test-aksref-ingress-nginx-controller-admission.$(POD_NAMESPACE).svc,,,--namespace=$(POD_NAMESPACE),,,--secret-name=test-aksref-ingress-nginx-admission,env,,,,,,,,,,name,,,POD_NAMESPACE,valueFrom,,,,,fieldRef,,,,,apiVersion,,,v1,fieldPath,,,metadata.namespace,image,,,docker.io/jettech/kube-webhook-certgen:v1.5.1,imagePullPolicy,,,IfNotPresent,name,,,create,resources,,,,,,terminationMessagePath,,,/dev/termination-log,terminationMessagePolicy,,,File,dnsPolicy,,,ClusterFirst,restartPolicy,,,OnFailure,schedulerName,,,default-scheduler,securityContext,,,,,runAsNonRoot,,,,true,runAsUser,,2000,serviceAccount,,,test-aksref-ingress-nginx-admission,serviceAccountName,,,test-aksref-ingress-nginx-admission,terminationGracePeriodSeconds,,30,status,,,,,completionTime,,,2021-06-17T08:01:48Z,conditions,,,,,,,,,,lastProbeTime,,,2021-06-17T08:01:48Z,lastTransitionTime,,,2021-06-17T08:01:48Z,status,,,True,type,,,Complete,startTime,,,2021-06-17T08:01:43Z,succeeded,,1,,\u003c{%reset%}\u003e\n","color":"raw","severity":"debug"}}
SyntaxError: Unexpected token g in JSON at position 0
at Object.warn (node_modules/@pulumi/pulumi/log/index.js:69:17)
at Interface.<anonymous> (node_modules/@pulumi/pulumi/automation/stack.js:127:25)
This is the code of the helm chart mentioned above:
new k8s.helm.v3.Chart(name, {
chart: "ingress-nginx",
version: "3.23.0",
fetchOpts: {
repo: "https://kubernetes.github.io/ingress-nginx",
},
values: {
controller: {
service: {
loadBalancerIP: "10.10.10.10",
annotations: {
"service.beta.kubernetes.io/azure-load-balancer-internal": "true"
}
},
},
},
}, {
provider: kubeconfig,
})
We never encountered this issue, when using the Pulumi CLI directly.
Hitting this with preview on github action. No issues when running preview locally from laptop. It is causing preview to hang.
Looking like this may possible be related to incorrect json escaping elsewhere, but needs more investigation: https://github.com/pulumi/pulumi/pull/7593#issuecomment-883897564
I just got this with the event:
Event: ct\",\n \"s3:Get*\"\n ],\n \"Resource\": [\n \"arn:aws:s3:::lucid-chef-backup-preprod/event/*\",\n \"arn:aws:s3:::lucid-chef-backup-preprod/event\"\n ]\n },\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": \"s3:ListBucket\",\n \"Resource\": [\n \"arn:aws:s3:::lucidbag-lucidchart-preprod\",\n \"arn:aws:s3:::lucid-chef-backup-preprod\"\n ]\n }\n ]\n}","role":"event"},"provider":""},"new":{"type":"aws:iam/rolePolicy:RolePolicy","urn":"urn:pulumi:preprod::preprod::aws:iam/rolePolicy:RolePolicy::event-lucidbag","custom":true,"id":"","parent":"urn:pulumi:preprod::preprod::pulumi:pulumi:Stack::preprod-preprod","inputs":{"__defaults":["name"],"name":"event-lucidbag-82716cc","policy":"{\"Statement\":[{\"Action\":\"s3:GetObject\",\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:s3:::lucidbag-lucidchart-preprod/.iams/event/*\",\"arn:aws:s3:::lucidbag-lucidchart-preprod/.iams/default/*\"]},{\"Action\":[\"s3:Get*\",\"s3:PutObject\"],\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:s3:::lucid-chef-backup-preprod/event/*\",\"arn:aws:s3:::lucid-chef-backup-preprod/event\"]},{\"Action\":\"s3:ListBucket\",\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:s3:::lucidbag-lucidchart-preprod\",\"arn:aws:s3:::lucid-chef-backup-preprod\"]}],\"Version\":\"2012-10-17\"}","role":"event"},"outputs":{"id":"","name":"event-lucidbag-82716cc","policy":"{\"Statement\":[{\"Action\":\"s3:GetObject\",\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:s3:::lucidbag-lucidchart-preprod/.iams/event/*\",\"arn:aws:s3:::lucidbag-lucidchart-preprod/.iams/default/*\"]},{\"Action\":[\"s3:Get*\",\"s3:PutObject\"],\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:s3:::lucid-chef-backup-preprod/event/*\",\"arn:aws:s3:::lucid-chef-backup-preprod/event\"]},{\"Action\":\"s3:ListBucket\",\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:s3:::lucidbag-lucidchart-preprod\",\"arn:aws:s3:::lucid-chef-backup-preprod\"]}],\"Version\":\"2012-10-17\"}","role":"event"},"provider":""},"keys":["name"],"diffs":["name","policy"],"detailedDiff":{"name":{"diffKind":"update-replace","inputDiff":false},"policy":{"diffKind":"update","inputDiff":false}},"logical":true,"provider":"urn:pulumi:preprod::preprod::pulumi:providers:aws::default_4_25_0::6564be68-9957-4df7-92c0-ec255831bf0b"},"planning":true}}
SyntaxError: Unexpected token c in JSON at position 0
SyntaxError: Unexpected token c in JSON at position 0
warning: [runtime] Failed to parse engine event
If you're seeing this warning, please comment on https://github.com/pulumi/pulumi/issues/6768 with the event and any
details about your environment.
Event: root\"},\"Action\":\"sts:AssumeRole\"}]}","createDate":"2021-10-20T11:37:17Z","description":"Managed by pulumi","forceDetachPolicies":false,"id":"ExternalSecurityAuditorRole","inlinePolicies":[{"name":"","policy":""}],"managedPolicyArns":["arn:aws:iam::aws:policy/SecurityAudit","arn:aws:iam::555555555555:policy/dev-securityHubIntegrationPolicy-3af008a","arn:aws:iam::aws:policy/job-function/ViewOnlyAccess"],"maxSessionDuration":3600,"name":"ExternalSecurityAuditorRole","path":"/","tags":{},"tagsAll":{}},"provider":""},"logical":true},"planning":true}}
SyntaxError: Unexpected token r in JSON at position 0
Error: code: 255
I'm getting this in Github Actions workflow runs. Below our environment:
- Ubuntu 20.04.3 LTS
- NodeJS version v16.x
- Pulumi version: v3.20.0 as of now (we are using pulumi/actions@v3)
Running preview/update locally works as expected.