Created
January 25, 2019 15:35
-
-
Save alexef/48512329e63c82552cd0535c2246b5f9 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ``` | |
| An execution plan has been generated and is shown below. | |
| Resource actions are indicated with the following symbols: | |
| ~ update in-place | |
| -/+ destroy and then create replacement | |
| Terraform will perform the following actions: | |
| ~ aws_autoscaling_group.ingress[0] | |
| launch_configuration: "k8s-testing1-ingress-20190124044228801300000002" => "${aws_launch_configuration.ingress.id}" | |
| ~ aws_autoscaling_group.ingress[1] | |
| launch_configuration: "k8s-testing1-ingress-20190124044228801300000002" => "${aws_launch_configuration.ingress.id}" | |
| ~ aws_autoscaling_group.ingress[2] | |
| launch_configuration: "k8s-testing1-ingress-20190124044228801300000002" => "${aws_launch_configuration.ingress.id}" | |
| ~ aws_autoscaling_group.worker_generic[0] | |
| launch_configuration: "k8s-testing1-worker-generic-20190124044228814800000003" => "${aws_launch_configuration.worker_generic.id}" | |
| ~ aws_autoscaling_group.worker_generic[1] | |
| launch_configuration: "k8s-testing1-worker-generic-20190124044228814800000003" => "${aws_launch_configuration.worker_generic.id}" | |
| ~ aws_autoscaling_group.worker_quorum[0] | |
| launch_configuration: "k8s-testing1-worker-quorum-20190124044228792000000001" => "${aws_launch_configuration.worker_quorum.id}" | |
| ~ aws_autoscaling_group.worker_quorum[1] | |
| launch_configuration: "k8s-testing1-worker-quorum-20190124044228792000000001" => "${aws_launch_configuration.worker_quorum.id}" | |
| ~ aws_autoscaling_group.worker_quorum[2] | |
| launch_configuration: "k8s-testing1-worker-quorum-20190124044228792000000001" => "${aws_launch_configuration.worker_quorum.id}" | |
| -/+ aws_launch_configuration.ingress (new resource required) | |
| id: "k8s-testing1-ingress-20190124044228801300000002" => <computed> (forces new resource) | |
| associate_public_ip_address: "false" => "false" | |
| ebs_block_device.#: "0" => <computed> | |
| ebs_optimized: "false" => <computed> | |
| enable_monitoring: "true" => "true" | |
| iam_instance_profile: "k8s-testing1-worker" => "k8s-testing1-worker" | |
| image_id: "ami-0cfe08bc0484060f5" => "ami-0cfe08bc0484060f5" | |
| instance_type: "t2.medium" => "t2.medium" | |
| key_name: "" => <computed> | |
| name: "k8s-testing1-ingress-20190124044228801300000002" => <computed> | |
| name_prefix: "k8s-testing1-ingress-" => "k8s-testing1-ingress-" | |
| root_block_device.#: "1" => "1" | |
| root_block_device.0.delete_on_termination: "true" => "true" | |
| root_block_device.0.iops: "0" => <computed> | |
| root_block_device.0.volume_size: "60" => "60" | |
| root_block_device.0.volume_type: "gp2" => "gp2" | |
| security_groups.#: "1" => "1" | |
| security_groups.715788711: "sg-253d7b48" => "sg-253d7b48" | |
| user_data: "c3bff7033cd025c6bc2d0f60328011206c259c02" => "4c8fd68fe685e9e40f02e5e60a0c3076aaa9d4e0" (forces new resource) | |
| -/+ aws_launch_configuration.worker_generic (new resource required) | |
| id: "k8s-testing1-worker-generic-20190124044228814800000003" => <computed> (forces new resource) | |
| associate_public_ip_address: "false" => "false" | |
| ebs_block_device.#: "0" => <computed> | |
| ebs_optimized: "false" => <computed> | |
| enable_monitoring: "true" => "true" | |
| iam_instance_profile: "k8s-testing1-worker" => "k8s-testing1-worker" | |
| image_id: "ami-0cfe08bc0484060f5" => "ami-0cfe08bc0484060f5" | |
| instance_type: "m4.2xlarge" => "m4.2xlarge" | |
| key_name: "" => <computed> | |
| name: "k8s-testing1-worker-generic-20190124044228814800000003" => <computed> | |
| name_prefix: "k8s-testing1-worker-generic-" => "k8s-testing1-worker-generic-" | |
| root_block_device.#: "1" => "1" | |
| root_block_device.0.delete_on_termination: "true" => "true" | |
| root_block_device.0.iops: "0" => <computed> | |
| root_block_device.0.volume_size: "60" => "60" | |
| root_block_device.0.volume_type: "gp2" => "gp2" | |
| security_groups.#: "1" => "1" | |
| security_groups.715788711: "sg-253d7b48" => "sg-253d7b48" | |
| user_data: "3629e5fc8de6e20873b56fa1b4ed15cd1de35386" => "41434771317092002485f3c551d649472a74b14a" (forces new resource) | |
| -/+ aws_launch_configuration.worker_quorum (new resource required) | |
| id: "k8s-testing1-worker-quorum-20190124044228792000000001" => <computed> (forces new resource) | |
| associate_public_ip_address: "false" => "false" | |
| ebs_block_device.#: "0" => <computed> | |
| ebs_optimized: "false" => <computed> | |
| enable_monitoring: "true" => "true" | |
| iam_instance_profile: "k8s-testing1-worker" => "k8s-testing1-worker" | |
| image_id: "ami-0cfe08bc0484060f5" => "ami-0cfe08bc0484060f5" | |
| instance_type: "m4.large" => "m4.large" | |
| key_name: "" => <computed> | |
| name: "k8s-testing1-worker-quorum-20190124044228792000000001" => <computed> | |
| name_prefix: "k8s-testing1-worker-quorum-" => "k8s-testing1-worker-quorum-" | |
| root_block_device.#: "1" => "1" | |
| root_block_device.0.delete_on_termination: "true" => "true" | |
| root_block_device.0.iops: "0" => <computed> | |
| root_block_device.0.volume_size: "60" => "60" | |
| root_block_device.0.volume_type: "gp2" => "gp2" | |
| security_groups.#: "1" => "1" | |
| security_groups.715788711: "sg-253d7b48" => "sg-253d7b48" | |
| user_data: "66f8f805ae96d0a408c771c3dd5d6c8161e908d8" => "3aec251b88042f69c89040646eb6a2fb812be41f" (forces new resource) | |
| Plan: 3 to add, 8 to change, 3 to destroy. | |
| ------------------------------------------------------------------------ | |
| Note: You didn't specify an "-out" parameter to save this plan, so Terraform | |
| can't guarantee that exactly these actions will be performed if | |
| "terraform apply" is subsequently run.``` |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment