Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Revert eks to solr supported version #129

Merged
merged 1 commit into from
Mar 4, 2022
Merged

Revert eks to solr supported version #129

merged 1 commit into from
Mar 4, 2022

Conversation

nickumia-reisys
Copy link
Contributor

@nickumia-reisys nickumia-reisys commented Mar 4, 2022

This is to get inventory-solr working again.

Supersedes #128

@nickumia-reisys nickumia-reisys temporarily deployed to production March 4, 2022 18:59 Inactive
@nickumia-reisys nickumia-reisys temporarily deployed to staging March 4, 2022 18:59 Inactive
@github-actions
Copy link

github-actions bot commented Mar 4, 2022

Terraform plan for production

Plan: 2 to add, 1 to change, 0 to destroy.
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
  ~ update in-place
 <= read (data resources)

Terraform will perform the following actions:

  # cloudfoundry_user_provided_service.ssb-solrcloud-k8s will be updated in-place
  ~ resource "cloudfoundry_user_provided_service" "ssb-solrcloud-k8s" {
      ~ credentials_json = (sensitive value)
        id               = "140e50d0-8b21-4c03-b84a-5a9e4098a518"
        name             = "ssb-solrcloud-k8s"
        tags             = []
        # (1 unchanged attribute hidden)
    }

  # module.broker_solr.cloudfoundry_app.ssb will be created
  + resource "cloudfoundry_app" "ssb" {
      + buildpack                  = "binary_buildpack"
      + command                    = "source .profile && ./cloud-service-broker serve"
      + disk_quota                 = 2048
      + enable_ssh                 = false
      + environment                = (sensitive value)
      + health_check_http_endpoint = (known after apply)
      + health_check_timeout       = (known after apply)
      + health_check_type          = "port"
      + id                         = (known after apply)
      + id_bg                      = (known after apply)
      + instances                  = 1
      + memory                     = 256
      + name                       = "ssb-solr"
      + path                       = "./app-ssb-solr.zip"
      + ports                      = (known after apply)
      + source_code_hash           = "XiYr3BX9sxZDqxn59BFZ5FCtHcIdmnlBOjcJlB6gz+I="
      + space                      = "9a1db116-0180-42be-8ffa-7944dcf6bf50"
      + stack                      = (known after apply)
      + stopped                    = false
      + strategy                   = "blue-green"
      + timeout                    = 60

      + routes {
          + port  = (known after apply)
          + route = "55daf0e6-9dd4-4273-995c-6c1363ead364"
        }

      + service_binding {
          + service_instance = "4c682b52-1f15-438d-9e4d-621a1d9c3e22"
        }
      + service_binding {
          + service_instance = "d3c260c4-e79c-4561-abe6-0794ea580693"
        }
    }

  # module.brokerpak-eks-terraform.module.bind.data.aws_eks_cluster.main will be read during apply
  # (config refers to values not yet known)
 <= data "aws_eks_cluster" "main"  {
      ~ arn                       = "arn:aws:eks:us-west-2:821341638715:cluster/k8s-d6e0b7fc580c3a4d" -> (known after apply)
      ~ certificate_authority     = [
          - {
              - data = "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"
            },
        ] -> (known after apply)
      ~ created_at                = "2022-03-03 17:49:14.931 +0000 UTC" -> (known after apply)
      ~ enabled_cluster_log_types = [
          - "api",
          - "audit",
          - "authenticator",
          - "controllerManager",
          - "scheduler",
        ] -> (known after apply)
      ~ endpoint                  = "https://B3BA57C48C223D301BFC0E8B6092D1B7.sk1.us-west-2.eks.amazonaws.com" -> (known after apply)
      ~ id                        = "********************" -> (known after apply)
      ~ identity                  = [
          - {
              - oidc = [
                  - {
                      - issuer = "https://oidc.eks.us-west-2.amazonaws.com/id/B3BA57C48C223D301BFC0E8B6092D1B7"
                    },
                ]
            },
        ] -> (known after apply)
      ~ kubernetes_network_config = [
          - {
              - ip_family         = "ipv4"
              - service_ipv4_cidr = "172.20.0.0/16"
            },
        ] -> (known after apply)
        name                      = "k8s-d6e0b7fc580c3a4d"
      ~ platform_version          = "eks.4" -> (known after apply)
      ~ role_arn                  = "arn:aws:iam::821341638715:role/k8s-d6e0b7fc580c3a4d-cluster-20220303174638717300000003" -> (known after apply)
      ~ status                    = "ACTIVE" -> (known after apply)
      ~ tags                      = {
          - "domain" = "solrcloud-k8s.ssb.data.gov"
        } -> (known after apply)
      ~ version                   = "1.21" -> (known after apply)
      ~ vpc_config                = [
          - {
              - cluster_security_group_id = "********************"
              - endpoint_private_access   = false
              - endpoint_public_access    = true
              - public_access_cidrs       = [
                  - "0.0.0.0/0",
                ]
              - security_group_ids        = [
                  - "sg-05b3c6ab8ba4310ae",
                ]
              - subnet_ids                = [
                  - "subnet-007e6f63e73ede610",
                  - "subnet-00bd6b66d9fd6ad48",
                  - "subnet-0e416adf62875f88a",
                ]
              - vpc_id                    = "*********************"
            },
        ] -> (known after apply)
    }

  # module.brokerpak-eks-terraform.module.bind.data.aws_eks_cluster_auth.main will be read during apply
  # (config refers to values not yet known)
 <= data "aws_eks_cluster_auth" "main"  {
      ~ id    = "********************" -> (known after apply)
        name  = "k8s-d6e0b7fc580c3a4d"
      ~ token = (sensitive value)
    }

  # module.brokerpak-eks-terraform.module.bind.data.kubernetes_secret.secret will be read during apply
  # (config refers to values not yet known)
 <= data "kubernetes_secret" "secret"  {
      ~ data      = (sensitive value)
      ~ id        = "************************************" -> (known after apply)
      ~ immutable = false -> (known after apply)
      ~ type      = "kubernetes.io/service-account-token" -> (known after apply)

      ~ metadata {
          - annotations      = {} -> null
          ~ generation       = 0 -> (known after apply)
          - labels           = {} -> null
            name             = "95b475a54670fc2a-token-98zkg"
          ~ resource_version = "5433" -> (known after apply)
          ~ uid              = "e3deae22-3b8d-446a-b8d0-b559a311efa3" -> (known after apply)
            # (1 unchanged attribute hidden)
        }
    }

  # module.brokerpak-eks-terraform.module.bind.data.template_file.kubeconfig will be read during apply
  # (config refers to values not yet known)
 <= data "template_file" "kubeconfig"  {
      ~ id       = "****************************************************************" -> (known after apply)
      ~ rendered = <<-EOT
            apiVersion: v1
            kind: Config
            users:
            - name: 95b475a54670fc2a
              user:
                token: eyJhbGciOiJSUzI1NiIsImtpZCI6InZJRzU5SnQ1cXBETnM0YjJuczl1WHdlUkxtUExkR1VBcjlQbFc5YTFxU0kifQ.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.atUvCtC6HZqlSOfplkA2wStUWyI8WPbYWO17ozfciCExJXjWKVF6TyEbAwuRh9_ctPsAX4SXMP1AzzwkKoU1-oIDO4or5OHWTFR1f0JbxXbqGcorckS0D-ejb3POXzrq-YFEA3oYLzrAFWtwNNMFJME_ULm_EfEl5QQS14CYn_AZAu2qglXBhkxNMdJNSazm2i6e-MzSE90h7b-Und2-Zvr06jJ6SG63MAMo3qVya6Hvh5ifJadffPTCfptGQquahabx0yA8xagHg-mES_RDAx2KfLxhTg_6lK2ElVRLFvQkmBF-Z-3OIG4B3Sm-a094ETVAlYghcEbiC8o094PrjQ
            clusters:
            - cluster:
                certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUM1ekNDQWMrZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwcmRXSmwKY201bGRHVnpNQjRYRFRJeU1ETXdNekUzTlRVek9Wb1hEVE15TURJeU9URTNOVFV6T1Zvd0ZURVRNQkVHQTFVRQpBeE1LYTNWaVpYSnVaWFJsY3pDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTThWCjhpTWdVQmF5RmdockU2WFRUcFFRNFU5YmVqbVM3QVBtQi9yMExpeUovUVFtcHVVVmNHNEVzUDlIcmJqbHl5ZGUKUVNkSldEZEloRkRXeVJKQVExRXZPaXdQcEJpb01lT2VIMDhmbDdXVWZIN1Y0enhWODNmTGhGeWh0S1lXV1E0NQpQVlFwak5mdnpUNWpKQUd2YXd2TWlGWWxLNWRHanJPdUYyMktlazVVeWJmbnZiMHdXUS80SytEWDlGai9BMjdBCmtmV2VnSEdtUFB4U0RqQ0REcTZLK3pDRlNuRU11aDl0MXlUK3RPREdnNHFqK2NHdGM0WTk0L1FrVGMxMkhhVGoKc2dtWjh2MmZONlg0UFk0QzNZVktDbzA3Y09KUTNFcUFDdkFlZW0wTU16aW1IWXJuZE9sVjlTT3ZMMUVQZWJVRQpjSlhyaE9UM05QaDVGZmlHQW8wQ0F3RUFBYU5DTUVBd0RnWURWUjBQQVFIL0JBUURBZ0trTUE4R0ExVWRFd0VCCi93UUZNQU1CQWY4d0hRWURWUjBPQkJZRUZHUUJkdmZ0KzFza1NTTUlDa3N1SVcraFNJNWlNQTBHQ1NxR1NJYjMKRFFFQkN3VUFBNElCQVFDMGwvODkwMzRxOFhraG5TdkRsRUcxOFo4RXZ5V3FWR3JZdmtWc3MrQU1NdjNqdERKZApOSEFBNGJUdlM0NGtSN2ZUV0FXWlh3M1RHeDdrQXhEL2RtalNhVkVxYnorTWxlcTVSYTYvNTdnU2dvTGZkQzBqCnZNN1VnUmJORHJlUWdJQ2Y5MnR2Mnh4bG5IQjNuVnhNdWlydzVGUlZaOW4zaHRPVlp0UDJZZFptUFQyNVpxc0EKQTI4NjJKcnZTV1ZtTWROZDRqd3hsZ0ROUlpHUVlWeGlGbVhxdVdMTVRXVWd4NkNnSkdiNlFDSEQxNkpYOEhPegpjSkRpVG0wL3FyVHljTVp6TWc5YlFZaWh3bC9IYVovN1ZxcWdkVGhOKzBjUFhZYVFVTlZiTmZqeGdiQ2ZVMHFqCll5OVhYeS93N0dMdUs5NFRpcnZIQU14TXZsL05jb0tqWTZEZQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==
                server: https://B3BA57C48C223D301BFC0E8B6092D1B7.sk1.us-west-2.eks.amazonaws.com
              name: k8s-d6e0b7fc580c3a4d
            contexts:
            - context:
                cluster: k8s-d6e0b7fc580c3a4d
                namespace: default
                user: 95b475a54670fc2a
              name: k8s-d6e0b7fc580c3a4d-default-95b475a54670fc2a
            current-context: k8s-d6e0b7fc580c3a4d-default-95b475a54670fc2a
        EOT -> (known after apply)
      # Warning: this attribute value will no longer be marked as sensitive
      # after applying this change.
      ~ template = (sensitive) -> (known after apply)
    }

  # module.brokerpak-eks-terraform.module.provision.local_file.kubeconfig[0] will be created
  + resource "local_file" "kubeconfig" {
      + directory_permission = "0777"
      + file_permission      = "0600"
      + filename             = "kubeconfig-k8s-d6e0b7fc580c3a4d"
      + id                   = (known after apply)
      + sensitive_content    = (sensitive value)
    }

Plan: 2 to add, 1 to change, 0 to destroy.

❌ Error applying plan in apply #79

@github-actions
Copy link

github-actions bot commented Mar 4, 2022

Terraform plan for staging

Plan: 1 to add, 1 to change, 0 to destroy.
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
  ~ update in-place
 <= read (data resources)

Terraform will perform the following actions:

  # cloudfoundry_user_provided_service.ssb-solrcloud-k8s will be updated in-place
  ~ resource "cloudfoundry_user_provided_service" "ssb-solrcloud-k8s" {
      ~ credentials_json = (sensitive value)
        id               = "f9f9f40d-912e-4b30-99c4-2704dc39081c"
        name             = "ssb-solrcloud-k8s"
        tags             = []
        # (1 unchanged attribute hidden)
    }

  # module.brokerpak-eks-terraform.module.bind.data.aws_eks_cluster.main will be read during apply
  # (config refers to values not yet known)
 <= data "aws_eks_cluster" "main"  {
      ~ arn                       = "arn:aws:eks:us-west-2:054110281448:cluster/k8s-d6e0b7fc580c3a4d" -> (known after apply)
      ~ certificate_authority     = [
          - {
              - data = "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"
            },
        ] -> (known after apply)
      ~ created_at                = "2022-03-03 16:42:30.494 +0000 UTC" -> (known after apply)
      ~ enabled_cluster_log_types = [
          - "api",
          - "audit",
          - "authenticator",
          - "controllerManager",
          - "scheduler",
        ] -> (known after apply)
      ~ endpoint                  = "https://E97035E8E3B7536C8E5BAEA9123ECC97.gr7.us-west-2.eks.amazonaws.com" -> (known after apply)
      ~ id                        = "********************" -> (known after apply)
      ~ identity                  = [
          - {
              - oidc = [
                  - {
                      - issuer = "https://oidc.eks.us-west-2.amazonaws.com/id/E97035E8E3B7536C8E5BAEA9123ECC97"
                    },
                ]
            },
        ] -> (known after apply)
      ~ kubernetes_network_config = [
          - {
              - ip_family         = "ipv4"
              - service_ipv4_cidr = "172.20.0.0/16"
            },
        ] -> (known after apply)
        name                      = "k8s-d6e0b7fc580c3a4d"
      ~ platform_version          = "eks.4" -> (known after apply)
      ~ role_arn                  = "arn:aws:iam::054110281448:role/k8s-d6e0b7fc580c3a4d-cluster-20220303163904249300000004" -> (known after apply)
      ~ status                    = "ACTIVE" -> (known after apply)
      ~ tags                      = {
          - "domain" = "solrcloud-k8s.ssb-staging.data.gov"
        } -> (known after apply)
      ~ version                   = "1.21" -> (known after apply)
      ~ vpc_config                = [
          - {
              - cluster_security_group_id = "********************"
              - endpoint_private_access   = false
              - endpoint_public_access    = true
              - public_access_cidrs       = [
                  - "0.0.0.0/0",
                ]
              - security_group_ids        = [
                  - "sg-033458e536cdfbf6e",
                ]
              - subnet_ids                = [
                  - "subnet-095181b79768c6bb2",
                  - "subnet-0ae384f0e2f4fdf5a",
                  - "subnet-0fb9117ab72a85725",
                ]
              - vpc_id                    = "*********************"
            },
        ] -> (known after apply)
    }

  # module.brokerpak-eks-terraform.module.bind.data.aws_eks_cluster_auth.main will be read during apply
  # (config refers to values not yet known)
 <= data "aws_eks_cluster_auth" "main"  {
      ~ id    = "********************" -> (known after apply)
        name  = "k8s-d6e0b7fc580c3a4d"
      ~ token = (sensitive value)
    }

  # module.brokerpak-eks-terraform.module.bind.data.kubernetes_secret.secret will be read during apply
  # (config refers to values not yet known)
 <= data "kubernetes_secret" "secret"  {
      ~ data      = (sensitive value)
      ~ id        = "************************************" -> (known after apply)
      ~ immutable = false -> (known after apply)
      ~ type      = "kubernetes.io/service-account-token" -> (known after apply)

      ~ metadata {
          - annotations      = {} -> null
          ~ generation       = 0 -> (known after apply)
          - labels           = {} -> null
            name             = "a4b24fc558d22fbd-token-hzcjg"
          ~ resource_version = "6289" -> (known after apply)
          ~ uid              = "ee489a7d-243a-42ed-a905-5891c4439a51" -> (known after apply)
            # (1 unchanged attribute hidden)
        }
    }

  # module.brokerpak-eks-terraform.module.bind.data.template_file.kubeconfig will be read during apply
  # (config refers to values not yet known)
 <= data "template_file" "kubeconfig"  {
      ~ id       = "****************************************************************" -> (known after apply)
      ~ rendered = <<-EOT
            apiVersion: v1
            kind: Config
            users:
            - name: a4b24fc558d22fbd
              user:
                token: eyJhbGciOiJSUzI1NiIsImtpZCI6IlZ4NXZ4N1l2UWduclh5VFJwdU84VnBac0hCUGFSbzNrTVNFTk9WOTFhbmcifQ.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.gWoKBJW2I1vV2cpFNjnPQCz2XTueM6Tsk3mgEEBOfYVqfB6ZxqNmuyNinUuaH6piEntL4KwkL1Gn_X8bSZvO_8VLSIFAo9uNBxtEwz7oB3MDPbTaJWjMM4Ed-zHWHRHiHZDsvZ-nWUWICj6NcrI-Uy3_cB7nA9IJZV2nsWL3HnNFGTQEP2UDaCItMcqQcTGADVgGlZ5eZSsxm00aSxT-VlnFfkQ-2hpzos0yi0rAbwaVZxUXuIHVOWmFnIBKy_DkADUxet_RiZFRq9rCbtlfgXJNgrR_jXc-dTsd7y3d8grTpscdh9FGKBCUk0g6vWvmgnStZ0aGqJGOfB8uMJ2CxA
            clusters:
            - cluster:
                certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUM1ekNDQWMrZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwcmRXSmwKY201bGRHVnpNQjRYRFRJeU1ETXdNekUyTkRnek1Gb1hEVE15TURJeU9URTJORGd6TUZvd0ZURVRNQkVHQTFVRQpBeE1LYTNWaVpYSnVaWFJsY3pDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTmNDCmRXWldQWGsrR0NPYkFEWlFObTZJTG4veHpuVGhnKzR1SUhCUjd3c213NUErRExIQlFlNi96Qjhqck9hNXFHdUIKMlNiS3FTaXRBT1ZTOTdxNEdLWXZKekV2bG1uVks2Lzg0ZWx4eXJjL2FFZWxjdmZLZE84NGtwTGNPeE9lWUpEYwpRVTZwZlFxN2FoejhLRkxvSnQvR3NlUi9VYzl0NjdkczZsNUVqTkZuam1IMEZ3bjZNaWxCcjlUWXZiSmsrYmF3CkwzeXErSjU1K1kyNnc5TXFzci9uOHFJQ0YyaUp5Y2lMMWJDOG5CUnp4NmVMOWhqekc1VzBpQVcvaHV5OVUxR3gKTGRxMytMU3pBNXRtekhRekpHekg3bUdVaEdJWi9xQkpwc3orRUhSeFdWVmhJWGVpSWNnWExKcmgzNWxaOFlDaApkSnVxb1ZlbmRONC96NzFZR0lFQ0F3RUFBYU5DTUVBd0RnWURWUjBQQVFIL0JBUURBZ0trTUE4R0ExVWRFd0VCCi93UUZNQU1CQWY4d0hRWURWUjBPQkJZRUZDdHB5TzErZ3VPNTc3TGl3ODBiR20xdkt6Q2RNQTBHQ1NxR1NJYjMKRFFFQkN3VUFBNElCQVFBaWNKV1ZqaDBxd1dFRWdsK2gvMm1BNzdUWFdEN0ltc3dHWE9PNUcwMGErcGtJU0R2bgpPbGpQQ2dxb3dpYmFQaTZrZjB0ZlFmTzc2UUp5eWJxV01Bai96bSs3Z3l4RGVSVGFkVGRablNRRG9sbDBDRnZmCkl5WlZESzJWZThXclUrVGJFT3lCSWk0ejFYV1JkeWx1M3R0WDZENXdBWFo1di84Z0ZWV3kzbDhzQ3BINmhYUk8KTUZlbUlvR0dXUFROYXg0a3BWcGFROHE4M1VFNGxMcnlWTGFGTEhjZStkQzlOS1dTc2xMVnRwa205TmFxVHpiNApZcHJZYklmWnUrRm1TS2ZyYU5xanFDUlJxb045c2VEeG53TUMvbFVReTQ4SG9ZSFhoRjhxUXdVaFZnN0M2dFoyCmVXZkFQcVFaUG1mWEZvb2V4akRRUHpHNG1BWVFBS1p6RXFvYgotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==
                server: https://E97035E8E3B7536C8E5BAEA9123ECC97.gr7.us-west-2.eks.amazonaws.com
              name: k8s-d6e0b7fc580c3a4d
            contexts:
            - context:
                cluster: k8s-d6e0b7fc580c3a4d
                namespace: default
                user: a4b24fc558d22fbd
              name: k8s-d6e0b7fc580c3a4d-default-a4b24fc558d22fbd
            current-context: k8s-d6e0b7fc580c3a4d-default-a4b24fc558d22fbd
        EOT -> (known after apply)
      # Warning: this attribute value will no longer be marked as sensitive
      # after applying this change.
      ~ template = (sensitive) -> (known after apply)
    }

  # module.brokerpak-eks-terraform.module.provision.local_file.kubeconfig[0] will be created
  + resource "local_file" "kubeconfig" {
      + directory_permission = "0777"
      + file_permission      = "0600"
      + filename             = "kubeconfig-k8s-d6e0b7fc580c3a4d"
      + id                   = (known after apply)
      + sensitive_content    = (sensitive value)
    }

Plan: 1 to add, 1 to change, 0 to destroy.

✅ Plan applied in apply #79

@nickumia-reisys nickumia-reisys temporarily deployed to staging March 4, 2022 19:02 Inactive
@nickumia-reisys nickumia-reisys temporarily deployed to production March 4, 2022 19:02 Inactive
@robert-bryson robert-bryson enabled auto-merge (squash) March 4, 2022 19:04
@robert-bryson robert-bryson merged commit d69ccc6 into main Mar 4, 2022
@robert-bryson robert-bryson deleted the solr6-fix branch March 4, 2022 19:04
@nickumia-reisys nickumia-reisys temporarily deployed to production March 4, 2022 19:10 Inactive
@nickumia-reisys nickumia-reisys temporarily deployed to staging March 4, 2022 19:10 Inactive
@nickumia-reisys nickumia-reisys temporarily deployed to production March 4, 2022 19:45 Inactive
@nickumia-reisys nickumia-reisys temporarily deployed to staging March 4, 2022 19:45 Inactive
@nickumia-reisys nickumia-reisys temporarily deployed to staging March 4, 2022 20:01 Inactive
@nickumia-reisys nickumia-reisys temporarily deployed to production March 4, 2022 20:01 Inactive
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants