I have also similar issue with eks cluster, eks cluster itself going to recreate. plan showing 4 addition 23 changes and 4 destroy that include eks cluster deletion, below the plan output in pretty-json, please help in diagnosing this issue
{
“format_version”: “0.1”,
“terraform_version”: “0.13.6”,
“variables”: {
“account_number”: {
“value”: “xxxxxxxxxxxxx”
},
“account_team_name”: {
“value”: “atlas”
},
“aws_region”: {
“value”: “ap-southeast-2”
},
“resource_changes”: [
{
“address”: “module.eks.aws_eks_cluster.this[0]”,
“module_address”: “module.eks”,
“mode”: “managed”,
“type”: “aws_eks_cluster”,
“name”: “this”,
“index”: 0,
“provider_name”: “Terraform Registry”,
“change”: {
“actions”: [
“create”,
“delete”
],
“before”: {
“arn”: “arn:aws:eks:ap-southeast-2:xxxxxxxxxxxxx:cluster/vz-vss-atlas-int1-ap-southeast-2-eks-v3-new”,
“certificate_authority”: [
{
“data”: “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”
}
],
“created_at”: “2022-08-02 20:22:10.018 +0000 UTC”,
“enabled_cluster_log_types”: [
“api”,
“audit”,
“authenticator”,
“controllerManager”,
“scheduler”
],
“encryption_config”: [
{
“provider”: [
{
“key_arn”: “arn:aws:kms:ap-southeast-2:xxxxxxxxxxxxx:key/6a5a416a-9a37-446b-98e7-864bfe399ced”
}
],
“resources”: [
“secrets”
]
}
],
“endpoint”: “https://E85C22AD359CEED323AC015FAEAF0EE7.gr7.ap-southeast-2.eks.amazonaws.com”,
“id”: “vz-vss-atlas-int1-ap-southeast-2-eks-v3-new”,
“identity”: [
{
“oidc”: [
{
“issuer”: “https://oidc.eks.ap-southeast-2.amazonaws.com/id/E85C22AD359CEED323AC015FAEAF0EE7”
}
]
}
],
“kubernetes_network_config”: [
{
“ip_family”: “ipv4”,
“service_ipv4_cidr”: “172.20.0.0/16”
}
],
“name”: “vz-vss-atlas-int1-ap-southeast-2-eks-v3-new”,
“platform_version”: “eks.9”,
“role_arn”: “arn:aws:iam::xxxxxxxxxxxxx:role/vz-vss-atlas-int1-eks-v3-new-ap-southeast-2-cluster-role”,
“status”: “ACTIVE”,
“tags”: {
“App”: “Atlas”,
“Createdby”: “Terraform”,
“Environment”: “Nonprod”,
“Level”: “Int”,
“Name”: “vz-vss-atlas-int1-ap-southeast-2-eks-v3-new”,
“Organization”: “VSS”,
“Owner”: “vz-vss-aws-di@xyz.com”,
“Purpose”: “EKS cluster”,
“Role”: “App”,
“Team”: “Delivery Infrastructure”,
“Userid”: “v918556”,
“VSAD”: “HLKV”
},
“tags_all”: {
“App”: “Atlas”,
“Createdby”: “Terraform”,
“Environment”: “Nonprod”,
“Level”: “Int”,
“Name”: “vz-vss-atlas-int1-ap-southeast-2-eks-v3-new”,
“Organization”: “VSS”,
“Owner”: “vz-vss-aws-di@xyz.com”,
“Purpose”: “EKS cluster”,
“Role”: “App”,
“Team”: “Delivery Infrastructure”,
“Userid”: “v918556”,
“VSAD”: “HLKV”
},
“timeouts”: {
“create”: “30m”,
“delete”: “15m”,
“update”: null
},
“version”: “1.28”,
“vpc_config”: [
{
“cluster_security_group_id”: “sg-0f776df865ed99267”,
“endpoint_private_access”: true,
“endpoint_public_access”: false,
“public_access_cidrs”: ,
“security_group_ids”: [
“sg-094218aa3b0c63f06”
],
“subnet_ids”: [
“subnet-0660b49c2db3b4e95”,
“subnet-0666c40c49e865b7a”,
“subnet-0f3a5e62d1d3052c2”
],
“vpc_id”: “vpc-06ee8f772c5016a7c”
}
]
},
“after”: {
“enabled_cluster_log_types”: [
“api”,
“audit”,
“authenticator”,
“controllerManager”,
“scheduler”
],
“encryption_config”: [
{
“provider”: [
{
“key_arn”: “arn:aws:kms:ap-southeast-2:xxxxxxxxxxxxx:key/6a5a416a-9a37-446b-98e7-864bfe399ced”
}
],
“resources”: [
“secrets”
]
}
],
“name”: “vz-vss-atlas-int1-ap-southeast-2-eks-v3-new”,
“tags”: {
“App”: “Atlas”,
“Createdby”: “Terraform”,
“Environment”: “Nonprod”,
“Level”: “Int”,
“Name”: “vz-vss-atlas-int1-ap-southeast-2-eks-v3-new”,
“Organization”: “VSS”,
“Owner”: “vz-vss-aws-di@xyz.com”,
“Purpose”: “EKS cluster”,
“Role”: “App”,
“Team”: “Delivery Infrastructure”,
“Userid”: “v918556”,
“Vsad”: “HLKV”
},
“tags_all”: {
“App”: “Atlas”,
“Createdby”: “Terraform”,
“Environment”: “Nonprod”,
“Level”: “Int”,
“Name”: “vz-vss-atlas-int1-ap-southeast-2-eks-v3-new”,
“Organization”: “VSS”,
“Owner”: “vz-vss-aws-di@xyz.com”,
“Purpose”: “EKS cluster”,
“Role”: “App”,
“Team”: “Delivery Infrastructure”,
“Userid”: “v918556”,
“Vsad”: “HLKV”
},
“timeouts”: {
“create”: “30m”,
“delete”: “15m”,
“update”: null
},
“version”: “1.28”,
“vpc_config”: [
{
“endpoint_private_access”: true,
“endpoint_public_access”: false,
“security_group_ids”: [
“sg-094218aa3b0c63f06”
],
“subnet_ids”: [
“subnet-0660b49c2db3b4e95”,
“subnet-0666c40c49e865b7a”,
“subnet-0f3a5e62d1d3052c2”
]
}
]
},
“after_unknown”: {
“arn”: true,
“certificate_authority”: true,
“created_at”: true,
“enabled_cluster_log_types”: [
false,
false,
false,
false,
false
],
“encryption_config”: [
{
“provider”: [
{}
],
“resources”: [
false
]
}
],
“endpoint”: true,
“id”: true,
“identity”: true,
“kubernetes_network_config”: true,
“platform_version”: true,
“role_arn”: true,
“status”: true,
“tags”: {},
“tags_all”: {},
“timeouts”: {},
“vpc_config”: [
{
“cluster_security_group_id”: true,
“public_access_cidrs”: true,
“security_group_ids”: [
false
],
“subnet_ids”: [
false,
false,
false
],
“vpc_id”: true
}
]
}
}
},
{
“address”: “module.eks.aws_iam_openid_connect_provider.oidc_provider[0]”,
“module_address”: “module.eks”,
“mode”: “managed”,
“type”: “aws_iam_openid_connect_provider”,
“name”: “oidc_provider”,
“index”: 0,
“provider_name”: “Terraform Registry”,
“change”: {
“actions”: [
“delete”,
“create”
],
“before”: {
“arn”: “arn:aws:iam::xxxxxxxxxxxxx:oidc-provider/oidc.eks.ap-southeast-2.amazonaws.com/id/E85C22AD359CEED323AC015FAEAF0EE7”,
“client_id_list”: [
“sts.amazonaws.com”
],
“id”: “arn:aws:iam::xxxxxxxxxxxxx:oidc-provider/oidc.eks.ap-southeast-2.amazonaws.com/id/E85C22AD359CEED323AC015FAEAF0EE7”,
“tags”: {
“Environment”: “Nonprod”,
“Name”: “arn:aws:iam::xxxxxxxxxxxxx:oidc-provider/oidc.eks.ap-southeast-2.amazonaws.com/id/E85C22AD359CEED323AC015FAEAF0EE7”,
“Owner”: “vz-vss-aws-di@one.xyz.com”,
“Team”: “DI”,
“Userid”: “v553144”,
“Vsad”: “HLKV”
},
“tags_all”: {
“Environment”: “Nonprod”,
“Name”: “arn:aws:iam::xxxxxxxxxxxxx:oidc-provider/oidc.eks.ap-southeast-2.amazonaws.com/id/E85C22AD359CEED323AC015FAEAF0EE7”,
“Owner”: “vz-vss-aws-di@one.xyz.com”,
“Team”: “DI”,
“Userid”: “v553144”,
“Vsad”: “HLKV”
},
“thumbprint_list”: [
“9e99a48a9960b14926bb7f3b02e22da2b0ab7280”
],
“url”: “oidc.eks.ap-southeast-2.amazonaws.com/id/E85C22AD359CEED323AC015FAEAF0EE7”
},
“after”: {
“tags”: null,
“thumbprint_list”: [
“9e99a48a9960b14926bb7f3b02e22da2b0ab7280”
]
},
“after_unknown”: {
“arn”: true,
“client_id_list”: true,
“id”: true,
“tags_all”: true,
“thumbprint_list”: [
false
],
“url”: true
}
}
},