{ "version": 4, "terraform_version": "1.2.0", "serial": 167, "lineage": "f11a6304-aea4-5304-f584-cf21c8436f1c", "outputs": {}, "resources": [ { "module": "module.dns", "mode": "managed", "type": "cloudflare_record", "name": "exact", "provider": "module.dns.provider[\"registry.terraform.io/cloudflare/cloudflare\"]", "instances": [ { "index_key": "*.kjuulh.app", "schema_version": 2, "attributes": { "allow_overwrite": false, "created_on": "2022-06-04T12:03:52.731592Z", "data": [], "hostname": "*.kjuulh.app", "id": "8016ec2af70cfc7830f5221887bb2df6", "metadata": { "auto_added": "false", "managed_by_apps": "false", "managed_by_argo_tunnel": "false", "source": "primary" }, "modified_on": "2022-06-04T12:03:52.731592Z", "name": "*.kjuulh.app", "priority": null, "proxiable": true, "proxied": false, "timeouts": null, "ttl": 3600, "type": "A", "value": "49.12.22.84", "zone_id": "9454b35cb1010b9eab9aadf206fdf11f" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMCwidXBkYXRlIjozMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMiJ9", "dependencies": [ "module.kube-hetzner.data.github_release.hetzner_ccm", "module.kube-hetzner.data.github_release.hetzner_csi", "module.kube-hetzner.data.github_release.kured", "module.kube-hetzner.data.hcloud_load_balancer.traefik", "module.kube-hetzner.data.remote_file.kubeconfig", "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.local_sensitive_file.kubeconfig", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.hcloud_server.server", "module.kube-hetzner.module.control_planes.hcloud_server_network.server", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server", "module.kube-hetzner.null_resource.control_planes", "module.kube-hetzner.null_resource.first_control_plane", "module.kube-hetzner.null_resource.kustomization", "module.kube-hetzner.random_password.k3s_token", "module.kube-hetzner.random_password.rancher_bootstrap" ] }, { "index_key": "kjuulh.app", "schema_version": 2, "attributes": { "allow_overwrite": false, "created_on": "2022-06-04T12:03:53.069218Z", "data": [], "hostname": "kjuulh.app", "id": "9083ba58d7b0a13ffd825c9c088ec607", "metadata": { "auto_added": "false", "managed_by_apps": "false", "managed_by_argo_tunnel": "false", "source": "primary" }, "modified_on": "2022-06-04T12:03:53.069218Z", "name": "kjuulh.app", "priority": null, "proxiable": true, "proxied": false, "timeouts": null, "ttl": 3600, "type": "A", "value": "49.12.22.84", "zone_id": "9454b35cb1010b9eab9aadf206fdf11f" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMCwidXBkYXRlIjozMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMiJ9", "dependencies": [ "module.kube-hetzner.data.github_release.hetzner_ccm", "module.kube-hetzner.data.github_release.hetzner_csi", "module.kube-hetzner.data.github_release.kured", "module.kube-hetzner.data.hcloud_load_balancer.traefik", "module.kube-hetzner.data.remote_file.kubeconfig", "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.local_sensitive_file.kubeconfig", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.hcloud_server.server", "module.kube-hetzner.module.control_planes.hcloud_server_network.server", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server", "module.kube-hetzner.null_resource.control_planes", "module.kube-hetzner.null_resource.first_control_plane", "module.kube-hetzner.null_resource.kustomization", "module.kube-hetzner.random_password.k3s_token", "module.kube-hetzner.random_password.rancher_bootstrap" ] } ] }, { "module": "module.kube-hetzner", "mode": "data", "type": "github_release", "name": "hetzner_ccm", "provider": "provider[\"registry.terraform.io/integrations/github\"]", "instances": [ { "schema_version": 0, "attributes": { "asserts_url": "https://api.github.com/repos/hetznercloud/hcloud-cloud-controller-manager/releases/52762979/assets", "body": "## Changelog\r\n\r\n1b33f524 Prepare Release v1.21.1\r\n9fa68870 Update hcloud-go to v1.33 (#255)\r\nff044e93 deploy: add missing operator: Exists (#251)\r\n7c9948b6 Bump k8s.io/kubernetes from 1.18.3 to 1.18.19 (#243)\r\n451703ae Testsetup: Unify with CSI Driver test setup suite (#244)\r\n635cf10a Update docs (#240)\r\nf21278cc Health Check: Set healthcheck port to destination port if no port was defined via annotation (#239)\r\n\r\n\r\n## Docker images\r\n\r\n- `docker pull hetznercloud/hcloud-cloud-controller-manager:v1.12.1`\r\n", "created_at": null, "draft": false, "html_url": "https://github.com/hetznercloud/hcloud-cloud-controller-manager/releases/tag/v1.12.1", "id": "52762979", "name": "v1.12.1", "owner": "hetznercloud", "prerelease": false, "published_at": null, "release_id": null, "release_tag": "v1.12.1", "repository": "hcloud-cloud-controller-manager", "retrieve_by": "latest", "tarball_url": "https://api.github.com/repos/hetznercloud/hcloud-cloud-controller-manager/tarball/v1.12.1", "target_commitish": "master", "upload_url": "https://uploads.github.com/repos/hetznercloud/hcloud-cloud-controller-manager/releases/52762979/assets{?name,label}", "url": "https://api.github.com/repos/hetznercloud/hcloud-cloud-controller-manager/releases/52762979", "zipball_url": "https://api.github.com/repos/hetznercloud/hcloud-cloud-controller-manager/zipball/v1.12.1" }, "sensitive_attributes": [] } ] }, { "module": "module.kube-hetzner", "mode": "data", "type": "github_release", "name": "hetzner_csi", "provider": "provider[\"registry.terraform.io/integrations/github\"]", "instances": [ { "schema_version": 0, "attributes": { "asserts_url": "https://api.github.com/repos/hetznercloud/csi-driver/releases/48351180/assets", "body": "## Changelog\n\n2ea4803 Add btrfs support\n7719e45 Add exclude for blockstorage during resize (#211)\n4a69641 Add k8s 1.22 to tests (#225)\nbeb3783 Adjust stale bot to be more userfriendly (#217)\n0de9bd9 CI improvements for speed and fork-friendliness. (#221)\ne07b392 Fix changelog generation\n8cb0bfe Implement Instrumentation from hcloud-go (#227)\nc89c462 Increase default polling interval to 3 seconds. (#230)\n11c9940 Make e2e workflow friendly to running on forks. (#214)\n29893db Migrate Testsuite Setup to be in line with our CCM Testsuite (#219)\n4ad4d69 Prepare release v1.6.0 (#231)\ncf4e7e4 Recognition of root servers (#195)\nc213244 Reduce default log verbosity to info level (#224)\nc74a95b Remove testing for k8s 1.18 as written in our Versioning policy. (#199)\n8d1f531 Run e2e tests in parallel. (#215)\nda859e8 Simplify CSI socket handling (#222)\n6164eaf Update README.md (#196)\n140dad9 Update hcloud-go to v1.29.1 (#218)\nfb90575 Upgrade csi sidecars to latest versions. (#216)\n54f573e Use Go 1.17 (#228)\n5d2ac90 Use Goreleaser to publish changelog (#229)\n\n", "created_at": null, "draft": false, "html_url": "https://github.com/hetznercloud/csi-driver/releases/tag/v1.6.0", "id": "48351180", "name": "v1.6.0", "owner": "hetznercloud", "prerelease": false, "published_at": null, "release_id": null, "release_tag": "v1.6.0", "repository": "csi-driver", "retrieve_by": "latest", "tarball_url": "https://api.github.com/repos/hetznercloud/csi-driver/tarball/v1.6.0", "target_commitish": "master", "upload_url": "https://uploads.github.com/repos/hetznercloud/csi-driver/releases/48351180/assets{?name,label}", "url": "https://api.github.com/repos/hetznercloud/csi-driver/releases/48351180", "zipball_url": "https://api.github.com/repos/hetznercloud/csi-driver/zipball/v1.6.0" }, "sensitive_attributes": [] } ] }, { "module": "module.kube-hetzner", "mode": "data", "type": "github_release", "name": "kured", "provider": "provider[\"registry.terraform.io/integrations/github\"]", "instances": [ { "schema_version": 0, "attributes": { "asserts_url": "https://api.github.com/repos/weaveworks/kured/releases/63019853/assets", "body": "# Build\r\n- update to alpine@3.15.3 #518\r\n- build(deps): bump helm/chart-testing-action from 2.1.0 to 2.2.0 #493\r\n- build(deps): bump actions/setup-python from 2 to 3 #507\r\n- build(deps): bump helm/chart-testing-action from 2.2.0 to 2.2.1 #512\r\n- build(deps): bump actions/checkout from 2 to 3 #508\r\n\r\n# Dependencies\r\n- build(deps): bump gotest.tools/v3 from 3.0.3 to 3.1.0 #497\r\n- build(deps): bump github.com/prometheus/client_golang to 1.12.1 #502\r\n- build(deps): bump github.com/spf13/cobra from 1.3.0 to 1.4.0 #510\r\n- build(deps): bump github.com/stretchr/testify from 1.7.0 to 1.7.1 #513\r\n\r\n# Helm chart\r\n- Add ability to define ds annotations in helm chart #494\r\n- Use templating in Slack URL, channel and username #505\r\n\r\n# Documentation\r\n- docs: add sentinel command example for RHEL family #504\r\n\r\n# Kubernetes Version Compatibility\r\n\r\nThe daemon image contains a 1.22.x k8s.io/{client-go,kubectl} for the purposes of maintaining the lock and draining worker nodes. Kubernetes aims to provide forwards \u0026 backwards compatibility of one minor version between client and server, so this should work on 1.21.x, 1.22.x and 1.23.x\r\n\r\nThanks a lot to everyone who contributed to kured since 1.9.1. Commits from @bambriy, @khuedoan, @weseven, @ckotzbauer\r\n", "created_at": null, "draft": false, "html_url": "https://github.com/weaveworks/kured/releases/tag/1.9.2", "id": "63019853", "name": "Kured 1.9.2", "owner": "weaveworks", "prerelease": false, "published_at": null, "release_id": null, "release_tag": "1.9.2", "repository": "kured", "retrieve_by": "latest", "tarball_url": "https://api.github.com/repos/weaveworks/kured/tarball/1.9.2", "target_commitish": "main", "upload_url": "https://uploads.github.com/repos/weaveworks/kured/releases/63019853/assets{?name,label}", "url": "https://api.github.com/repos/weaveworks/kured/releases/63019853", "zipball_url": "https://api.github.com/repos/weaveworks/kured/zipball/1.9.2" }, "sensitive_attributes": [] } ] }, { "module": "module.kube-hetzner", "mode": "data", "type": "hcloud_load_balancer", "name": "traefik", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "algorithm": [ { "type": "round_robin" } ], "delete_protection": false, "id": 743098, "ipv4": "49.12.22.84", "ipv6": "2a01:4f8:c011:945::1", "labels": { "hcloud-ccm/service-uid": "f39c1534-4895-4f98-82de-43f449113f10" }, "load_balancer_type": "lb11", "location": "fsn1", "name": "clank-traefik", "network_zone": "eu-central", "service": null, "target": [ { "label_selector": "", "server_id": 21030913, "type": "server" }, { "label_selector": "", "server_id": 21030909, "type": "server" } ], "with_selector": null }, "sensitive_attributes": [] } ] }, { "module": "module.kube-hetzner", "mode": "data", "type": "remote_file", "name": "kubeconfig", "provider": "provider[\"registry.terraform.io/tenstad/remote\"]", "instances": [ { "schema_version": 0, "attributes": { "conn": [ { "agent": false, "host": "142.132.182.232", "password": "", "port": 22, "private_key": "-----BEGIN OPENSSH PRIVATE KEY-----\nb3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW\nQyNTUxOQAAACDppcjQxBsUMZ1zixjJ/NA8Iz7fgqgste1GlvTEgaYTsgAAAJiZYtI7mWLS\nOwAAAAtzc2gtZWQyNTUxOQAAACDppcjQxBsUMZ1zixjJ/NA8Iz7fgqgste1GlvTEgaYTsg\nAAAEDLWiPDiI2P8wK7bHz6Xxg1LKWEVekqnkLNEdp//Fi4uOmlyNDEGxQxnXOLGMn80Dwj\nPt+CqCy17UaW9MSBphOyAAAAEWNvbnRhY3RAa2p1dWxoLmlvAQIDBA==\n-----END OPENSSH PRIVATE KEY-----\n", "private_key_env_var": "", "private_key_path": "", "sudo": false, "user": "root" } ], "content": "apiVersion: v1\nclusters:\n- cluster:\n certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUJlRENDQVIyZ0F3SUJBZ0lCQURBS0JnZ3Foa2pPUFFRREFqQWpNU0V3SHdZRFZRUUREQmhyTTNNdGMyVnkKZG1WeUxXTmhRREUyTlRRek5EUXdOak13SGhjTk1qSXdOakEwTVRJd01UQXpXaGNOTXpJd05qQXhNVEl3TVRBegpXakFqTVNFd0h3WURWUVFEREJock0zTXRjMlZ5ZG1WeUxXTmhRREUyTlRRek5EUXdOak13V1RBVEJnY3Foa2pPClBRSUJCZ2dxaGtqT1BRTUJCd05DQUFTaC9BejJrM1RPcVhJdERTb1pZQ0ZYTS85OHg4K1c3S2hkYmgvY2VoVWoKY2ZaK2lXWW1kdlpJV0FUZGNobDZoUnZCYlFkOWhFQTkySTU0KzJIVmVId3VvMEl3UURBT0JnTlZIUThCQWY4RQpCQU1DQXFRd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBZEJnTlZIUTRFRmdRVS8xQTNaQ0MvZ3p1dkVaYkk1eVhuCjRBbXhkR0V3Q2dZSUtvWkl6ajBFQXdJRFNRQXdSZ0loQUpPVlJxYTVPbTBZL3JzZVJ1SUZvRVFDc213blFDR00KV0lCVi84WDE4VWNIQWlFQTU5TTNwN2ZXQ3dEOEIyMjh6ejJXbGtoYjRUMUg4OEVzeS9abzYzM1kzVjg9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K\n server: https://127.0.0.1:6443\n name: default\ncontexts:\n- context:\n cluster: default\n user: default\n name: default\ncurrent-context: default\nkind: Config\npreferences: {}\nusers:\n- name: default\n user:\n client-certificate-data: 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\n client-key-data: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSUJ5R2pjc29zbi9UVHVPOEJVOWptK1dBcmt5ZHQ1WGNYRWFybmtnNFRnRmFvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFKzBSZ0lQNGw5SExDTlJsK0lKd1k0ZTluSTNMa0ZTbFQyQWZXcEhWTThzMGUyREtlS2xSSwpCck4yTCtwNHl4cHVPem0wOTVEaXZZVXhTd0FNNEZTRHFBPT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=\n", "id": "142.132.182.232:22:/etc/rancher/k3s/k3s.yaml", "path": "/etc/rancher/k3s/k3s.yaml" }, "sensitive_attributes": [ [ { "type": "get_attr", "value": "conn" }, { "type": "index", "value": { "value": 0, "type": "number" } }, { "type": "get_attr", "value": "agent" } ], [ { "type": "get_attr", "value": "conn" }, { "type": "index", "value": { "value": 0, "type": "number" } }, { "type": "get_attr", "value": "private_key" } ] ] } ] }, { "module": "module.kube-hetzner", "mode": "data", "type": "remote_file", "name": "kustomization_backup", "provider": "provider[\"registry.terraform.io/tenstad/remote\"]", "instances": [ { "schema_version": 0, "attributes": { "conn": [ { "agent": false, "host": "142.132.182.232", "password": "", "port": 22, "private_key": "-----BEGIN OPENSSH PRIVATE KEY-----\nb3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW\nQyNTUxOQAAACDppcjQxBsUMZ1zixjJ/NA8Iz7fgqgste1GlvTEgaYTsgAAAJiZYtI7mWLS\nOwAAAAtzc2gtZWQyNTUxOQAAACDppcjQxBsUMZ1zixjJ/NA8Iz7fgqgste1GlvTEgaYTsg\nAAAEDLWiPDiI2P8wK7bHz6Xxg1LKWEVekqnkLNEdp//Fi4uOmlyNDEGxQxnXOLGMn80Dwj\nPt+CqCy17UaW9MSBphOyAAAAEWNvbnRhY3RAa2p1dWxoLmlvAQIDBA==\n-----END OPENSSH PRIVATE KEY-----\n", "private_key_env_var": "", "private_key_path": "", "sudo": false, "user": "root" } ], "content": "\"apiVersion\": \"kustomize.config.k8s.io/v1beta1\"\n\"kind\": \"Kustomization\"\n\"patchesStrategicMerge\":\n- |\n apiVersion: apps/v1\n kind: DaemonSet\n metadata:\n name: kured\n namespace: kube-system\n spec:\n selector:\n matchLabels:\n name: kured\n template:\n metadata:\n labels:\n name: kured\n spec:\n serviceAccountName: kured\n containers:\n - name: kured\n command:\n - /usr/bin/kured\n - --reboot-command=/usr/bin/systemctl reboot\n- |\n apiVersion: apps/v1\n kind: Deployment\n metadata:\n name: system-upgrade-controller\n namespace: system-upgrade\n spec:\n template:\n spec:\n containers:\n - name: system-upgrade-controller\n volumeMounts:\n - name: ca-certificates\n mountPath: /var/lib/ca-certificates\n volumes:\n - name: ca-certificates\n hostPath:\n path: /var/lib/ca-certificates\n type: Directory\n- \"ccm.yaml\"\n\"resources\":\n- \"https://github.com/hetznercloud/hcloud-cloud-controller-manager/releases/download/v1.12.1/ccm-networks.yaml\"\n- \"https://github.com/weaveworks/kured/releases/download/1.9.2/kured-1.9.2-dockerhub.yaml\"\n- \"https://raw.githubusercontent.com/rancher/system-upgrade-controller/master/manifests/system-upgrade-controller.yaml\"\n- \"https://raw.githubusercontent.com/hetznercloud/csi-driver/v1.6.0/deploy/kubernetes/hcloud-csi.yml\"\n- \"traefik_config.yaml\"\n", "id": "142.132.182.232:22:/var/post_install/kustomization.yaml", "path": "/var/post_install/kustomization.yaml" }, "sensitive_attributes": [ [ { "type": "get_attr", "value": "conn" }, { "type": "index", "value": { "value": 0, "type": "number" } }, { "type": "get_attr", "value": "private_key" } ], [ { "type": "get_attr", "value": "conn" }, { "type": "index", "value": { "value": 0, "type": "number" } }, { "type": "get_attr", "value": "agent" } ] ] } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "hcloud_firewall", "name": "k3s", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "schema_version": 0, "attributes": { "apply_to": [], "id": "412602", "labels": {}, "name": "clank", "rule": [ { "description": "", "destination_ips": [ "0.0.0.0/0", "::/0" ], "direction": "out", "port": "22", "protocol": "tcp", "source_ips": [] }, { "description": "", "destination_ips": [ "0.0.0.0/0" ], "direction": "out", "port": "", "protocol": "icmp", "source_ips": [] }, { "description": "", "destination_ips": [ "0.0.0.0/0" ], "direction": "out", "port": "123", "protocol": "udp", "source_ips": [] }, { "description": "", "destination_ips": [ "0.0.0.0/0" ], "direction": "out", "port": "443", "protocol": "tcp", "source_ips": [] }, { "description": "", "destination_ips": [ "0.0.0.0/0" ], "direction": "out", "port": "53", "protocol": "tcp", "source_ips": [] }, { "description": "", "destination_ips": [ "0.0.0.0/0" ], "direction": "out", "port": "53", "protocol": "udp", "source_ips": [] }, { "description": "", "destination_ips": [ "0.0.0.0/0" ], "direction": "out", "port": "80", "protocol": "tcp", "source_ips": [] }, { "description": "", "destination_ips": [], "direction": "in", "port": "", "protocol": "icmp", "source_ips": [ "0.0.0.0/0" ] }, { "description": "", "destination_ips": [], "direction": "in", "port": "", "protocol": "icmp", "source_ips": [ "10.0.0.0/8", "127.0.0.1/32", "169.254.169.254/32", "213.239.246.1/32" ] }, { "description": "", "destination_ips": [], "direction": "in", "port": "22", "protocol": "tcp", "source_ips": [ "0.0.0.0/0" ] }, { "description": "", "destination_ips": [], "direction": "in", "port": "6443", "protocol": "tcp", "source_ips": [ "0.0.0.0/0" ] }, { "description": "", "destination_ips": [], "direction": "in", "port": "any", "protocol": "tcp", "source_ips": [ "10.0.0.0/8", "127.0.0.1/32", "169.254.169.254/32", "213.239.246.1/32" ] }, { "description": "", "destination_ips": [], "direction": "in", "port": "any", "protocol": "udp", "source_ips": [ "10.0.0.0/8", "127.0.0.1/32", "169.254.169.254/32", "213.239.246.1/32" ] } ] }, "sensitive_attributes": [], "private": "bnVsbA==" } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "hcloud_network", "name": "k3s", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "schema_version": 0, "attributes": { "delete_protection": false, "id": "1711263", "ip_range": "10.0.0.0/8", "labels": null, "name": "clank" }, "sensitive_attributes": [], "private": "bnVsbA==" } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "hcloud_network_subnet", "name": "agent", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "gateway": "10.0.0.1", "id": "1711263-10.0.0.0/16", "ip_range": "10.0.0.0/16", "network_id": 1711263, "network_zone": "eu-central", "type": "cloud", "vswitch_id": null }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s" ] }, { "index_key": 1, "schema_version": 0, "attributes": { "gateway": "10.0.0.1", "id": "1711263-10.1.0.0/16", "ip_range": "10.1.0.0/16", "network_id": 1711263, "network_zone": "eu-central", "type": "cloud", "vswitch_id": null }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s" ] }, { "index_key": 2, "schema_version": 0, "attributes": { "gateway": "10.0.0.1", "id": "1711263-10.2.0.0/16", "ip_range": "10.2.0.0/16", "network_id": 1711263, "network_zone": "eu-central", "type": "cloud", "vswitch_id": null }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s" ] } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "hcloud_network_subnet", "name": "control_plane", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "gateway": "10.0.0.1", "id": "1711263-10.255.0.0/16", "ip_range": "10.255.0.0/16", "network_id": 1711263, "network_zone": "eu-central", "type": "cloud", "vswitch_id": null }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s" ] }, { "index_key": 1, "schema_version": 0, "attributes": { "gateway": "10.0.0.1", "id": "1711263-10.254.0.0/16", "ip_range": "10.254.0.0/16", "network_id": 1711263, "network_zone": "eu-central", "type": "cloud", "vswitch_id": null }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s" ] }, { "index_key": 2, "schema_version": 0, "attributes": { "gateway": "10.0.0.1", "id": "1711263-10.253.0.0/16", "ip_range": "10.253.0.0/16", "network_id": 1711263, "network_zone": "eu-central", "type": "cloud", "vswitch_id": null }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s" ] } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "hcloud_placement_group", "name": "agent", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "47148", "labels": null, "name": "clank-agent-1", "servers": [], "type": "spread" }, "sensitive_attributes": [], "private": "bnVsbA==" } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "hcloud_placement_group", "name": "control_plane", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "47147", "labels": null, "name": "clank-control-plane-1", "servers": [], "type": "spread" }, "sensitive_attributes": [], "private": "bnVsbA==" } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "hcloud_ssh_key", "name": "k3s", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "fingerprint": "f4:16:88:3f:66:9e:f5:7d:d9:ed:20:0e:6a:55:a2:c3", "id": "6654542", "labels": null, "name": "clank", "public_key": "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOmlyNDEGxQxnXOLGMn80DwjPt+CqCy17UaW9MSBphOy contact@kjuulh.io\n" }, "sensitive_attributes": [], "private": "bnVsbA==" } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "local_file", "name": "kustomization_backup", "provider": "provider[\"registry.terraform.io/hashicorp/local\"]", "instances": [ { "schema_version": 0, "attributes": { "content": "\"apiVersion\": \"kustomize.config.k8s.io/v1beta1\"\n\"kind\": \"Kustomization\"\n\"patchesStrategicMerge\":\n- |\n apiVersion: apps/v1\n kind: DaemonSet\n metadata:\n name: kured\n namespace: kube-system\n spec:\n selector:\n matchLabels:\n name: kured\n template:\n metadata:\n labels:\n name: kured\n spec:\n serviceAccountName: kured\n containers:\n - name: kured\n command:\n - /usr/bin/kured\n - --reboot-command=/usr/bin/systemctl reboot\n- |\n apiVersion: apps/v1\n kind: Deployment\n metadata:\n name: system-upgrade-controller\n namespace: system-upgrade\n spec:\n template:\n spec:\n containers:\n - name: system-upgrade-controller\n volumeMounts:\n - name: ca-certificates\n mountPath: /var/lib/ca-certificates\n volumes:\n - name: ca-certificates\n hostPath:\n path: /var/lib/ca-certificates\n type: Directory\n- \"ccm.yaml\"\n\"resources\":\n- \"https://github.com/hetznercloud/hcloud-cloud-controller-manager/releases/download/v1.12.1/ccm-networks.yaml\"\n- \"https://github.com/weaveworks/kured/releases/download/1.9.2/kured-1.9.2-dockerhub.yaml\"\n- \"https://raw.githubusercontent.com/rancher/system-upgrade-controller/master/manifests/system-upgrade-controller.yaml\"\n- \"https://raw.githubusercontent.com/hetznercloud/csi-driver/v1.6.0/deploy/kubernetes/hcloud-csi.yml\"\n- \"traefik_config.yaml\"\n", "content_base64": null, "directory_permission": "0777", "file_permission": "600", "filename": "clank_kustomization_backup.yaml", "id": "1694cc7a4f94aa22b006ea774211e9b61d094424", "sensitive_content": null, "source": null }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.data.github_release.hetzner_ccm", "module.kube-hetzner.data.github_release.hetzner_csi", "module.kube-hetzner.data.github_release.kured", "module.kube-hetzner.data.remote_file.kubeconfig", "module.kube-hetzner.data.remote_file.kustomization_backup", "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.local_sensitive_file.kubeconfig", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.hcloud_server.server", "module.kube-hetzner.module.control_planes.hcloud_server_network.server", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server", "module.kube-hetzner.null_resource.control_planes", "module.kube-hetzner.null_resource.first_control_plane", "module.kube-hetzner.null_resource.kustomization", "module.kube-hetzner.random_password.k3s_token", "module.kube-hetzner.random_password.rancher_bootstrap" ] } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "local_sensitive_file", "name": "kubeconfig", "provider": "provider[\"registry.terraform.io/hashicorp/local\"]", "instances": [ { "schema_version": 0, "attributes": { "content": "apiVersion: v1\nclusters:\n- cluster:\n certificate-authority-data: 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\n server: https://142.132.182.232:6443\n name: default\ncontexts:\n- context:\n cluster: default\n user: default\n name: default\ncurrent-context: default\nkind: Config\npreferences: {}\nusers:\n- name: default\n user:\n client-certificate-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUJrRENDQVRlZ0F3SUJBZ0lJZGY0eWhyNC9ZRGd3Q2dZSUtvWkl6ajBFQXdJd0l6RWhNQjhHQTFVRUF3d1kKYXpOekxXTnNhV1Z1ZEMxallVQXhOalUwTXpRME1EWXpNQjRYRFRJeU1EWXdOREV5TURFd00xb1hEVEl6TURZdwpOREV5TURFd00xb3dNREVYTUJVR0ExVUVDaE1PYzNsemRHVnRPbTFoYzNSbGNuTXhGVEFUQmdOVkJBTVRESE41CmMzUmxiVHBoWkcxcGJqQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJQdEVZQ0QrSmZSeXdqVVoKZmlDY0dPSHZaeU55NUJVcFU5Z0gxcVIxVFBMTkh0Z3luaXBVU2dhemRpL3FlTXNhYmpzNXRQZVE0cjJGTVVzQQpET0JVZzZpalNEQkdNQTRHQTFVZER3RUIvd1FFQXdJRm9EQVRCZ05WSFNVRUREQUtCZ2dyQmdFRkJRY0RBakFmCkJnTlZIU01FR0RBV2dCUndOTnhkWGZlT21sa0YrOGFWYXpvbGtVQWFoekFLQmdncWhrak9QUVFEQWdOSEFEQkUKQWlBMFJIYXJQZHRwZkdhUEpva1RPN3RRcWZHdTNtK1pLUzFhM2RldXY5RVdHUUlnWTVmZS9iVWcyVWMyQ0J6ZwowREZPWnJndHBCdE5ucG9WT24vMVFlQk80MzA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUJkekNDQVIyZ0F3SUJBZ0lCQURBS0JnZ3Foa2pPUFFRREFqQWpNU0V3SHdZRFZRUUREQmhyTTNNdFkyeHAKWlc1MExXTmhRREUyTlRRek5EUXdOak13SGhjTk1qSXdOakEwTVRJd01UQXpXaGNOTXpJd05qQXhNVEl3TVRBegpXakFqTVNFd0h3WURWUVFEREJock0zTXRZMnhwWlc1MExXTmhRREUyTlRRek5EUXdOak13V1RBVEJnY3Foa2pPClBRSUJCZ2dxaGtqT1BRTUJCd05DQUFSaTh0YTR2eE1GalRqNjd0eE9MWS82T25UcXhsTGRWL0VVV0JFeTg5OXUKSW5mOWRIcDloU0RINWllK0ZOam11QTB3VWhieWF5TFJCNTNDMFBqYkp5OTRvMEl3UURBT0JnTlZIUThCQWY4RQpCQU1DQXFRd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBZEJnTlZIUTRFRmdRVWNEVGNYVjMzanBwWkJmdkdsV3M2CkpaRkFHb2N3Q2dZSUtvWkl6ajBFQXdJRFNBQXdSUUlnRzJOTUpoM2NCRHhVSnJoMHJlRDh4VlN5SjBRK3Vzc3QKclR2NG1VaGg1bjhDSVFERWUzMkRNcDF0bUZSZ1NGTjF4WlZVVmIzdDdjdHFQVE9mSDZRZzB2VVFrQT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K\n client-key-data: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSUJ5R2pjc29zbi9UVHVPOEJVOWptK1dBcmt5ZHQ1WGNYRWFybmtnNFRnRmFvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFKzBSZ0lQNGw5SExDTlJsK0lKd1k0ZTluSTNMa0ZTbFQyQWZXcEhWTThzMGUyREtlS2xSSwpCck4yTCtwNHl4cHVPem0wOTVEaXZZVXhTd0FNNEZTRHFBPT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=\n", "content_base64": null, "directory_permission": "0700", "file_permission": "600", "filename": "clank_kubeconfig.yaml", "id": "07ed90e2cb45133be9e752c990276c6cd51f6112", "source": null }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.data.remote_file.kubeconfig", "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.hcloud_server.server", "module.kube-hetzner.module.control_planes.hcloud_server_network.server", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server", "module.kube-hetzner.null_resource.control_planes", "module.kube-hetzner.null_resource.first_control_plane", "module.kube-hetzner.random_password.k3s_token" ] } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "null_resource", "name": "agents", "provider": "provider[\"registry.terraform.io/hashicorp/null\"]", "instances": [ { "index_key": "0-0-agent-small1", "schema_version": 0, "attributes": { "id": "4017788061829142869", "triggers": { "agent_id": "21030909" } }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.agent", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.agent", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.agents.data.cloudinit_config.config", "module.kube-hetzner.module.agents.hcloud_server.server", "module.kube-hetzner.module.agents.hcloud_server_network.server", "module.kube-hetzner.module.agents.random_string.identity_file", "module.kube-hetzner.module.agents.random_string.server", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.hcloud_server.server", "module.kube-hetzner.module.control_planes.hcloud_server_network.server", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server", "module.kube-hetzner.null_resource.first_control_plane", "module.kube-hetzner.random_password.k3s_token" ] }, { "index_key": "2-0-storage1", "schema_version": 0, "attributes": { "id": "2021479560687393717", "triggers": { "agent_id": "21030913" } }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.agent", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.agent", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.agents.data.cloudinit_config.config", "module.kube-hetzner.module.agents.hcloud_server.server", "module.kube-hetzner.module.agents.hcloud_server_network.server", "module.kube-hetzner.module.agents.random_string.identity_file", "module.kube-hetzner.module.agents.random_string.server", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.hcloud_server.server", "module.kube-hetzner.module.control_planes.hcloud_server_network.server", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server", "module.kube-hetzner.null_resource.first_control_plane", "module.kube-hetzner.random_password.k3s_token" ] } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "null_resource", "name": "control_planes", "provider": "provider[\"registry.terraform.io/hashicorp/null\"]", "instances": [ { "index_key": "0-0-control-plane-fsn1", "schema_version": 0, "attributes": { "id": "7807642786198214523", "triggers": { "control_plane_id": "21030914" } }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.hcloud_server.server", "module.kube-hetzner.module.control_planes.hcloud_server_network.server", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server", "module.kube-hetzner.null_resource.first_control_plane", "module.kube-hetzner.random_password.k3s_token" ] }, { "index_key": "1-0-control-plane-nbg1", "schema_version": 0, "attributes": { "id": "5803799578768166593", "triggers": { "control_plane_id": "21030912" } }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.hcloud_server.server", "module.kube-hetzner.module.control_planes.hcloud_server_network.server", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server", "module.kube-hetzner.null_resource.first_control_plane", "module.kube-hetzner.random_password.k3s_token" ] }, { "index_key": "2-0-control-plane-hel1", "schema_version": 0, "attributes": { "id": "3635468883212270278", "triggers": { "control_plane_id": "21030910" } }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.hcloud_server.server", "module.kube-hetzner.module.control_planes.hcloud_server_network.server", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server", "module.kube-hetzner.null_resource.first_control_plane", "module.kube-hetzner.random_password.k3s_token" ] } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "null_resource", "name": "destroy_traefik_loadbalancer", "provider": "provider[\"registry.terraform.io/hashicorp/null\"]", "instances": [ { "schema_version": 0, "attributes": { "id": "1790329008838659956", "triggers": { "cluster_name": "clank", "kustomization_id": "6088396699429752181" } }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.data.github_release.hetzner_ccm", "module.kube-hetzner.data.github_release.hetzner_csi", "module.kube-hetzner.data.github_release.kured", "module.kube-hetzner.data.remote_file.kubeconfig", "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.agent", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.agent", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.local_sensitive_file.kubeconfig", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.hcloud_server.server", "module.kube-hetzner.module.control_planes.hcloud_server_network.server", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server", "module.kube-hetzner.null_resource.control_planes", "module.kube-hetzner.null_resource.first_control_plane", "module.kube-hetzner.null_resource.kustomization", "module.kube-hetzner.random_password.k3s_token", "module.kube-hetzner.random_password.rancher_bootstrap" ] } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "null_resource", "name": "first_control_plane", "provider": "provider[\"registry.terraform.io/hashicorp/null\"]", "instances": [ { "schema_version": 0, "attributes": { "id": "6286931890177495938", "triggers": null }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.hcloud_server.server", "module.kube-hetzner.module.control_planes.hcloud_server_network.server", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server", "module.kube-hetzner.random_password.k3s_token" ] } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "null_resource", "name": "kustomization", "provider": "provider[\"registry.terraform.io/hashicorp/null\"]", "instances": [ { "schema_version": 0, "attributes": { "id": "6088396699429752181", "triggers": null }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.data.github_release.hetzner_ccm", "module.kube-hetzner.data.github_release.hetzner_csi", "module.kube-hetzner.data.github_release.kured", "module.kube-hetzner.data.remote_file.kubeconfig", "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.local_sensitive_file.kubeconfig", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.hcloud_server.server", "module.kube-hetzner.module.control_planes.hcloud_server_network.server", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server", "module.kube-hetzner.null_resource.control_planes", "module.kube-hetzner.null_resource.first_control_plane", "module.kube-hetzner.random_password.k3s_token", "module.kube-hetzner.random_password.rancher_bootstrap" ] } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "random_password", "name": "k3s_token", "provider": "provider[\"registry.terraform.io/hashicorp/random\"]", "instances": [ { "schema_version": 1, "attributes": { "bcrypt_hash": "$2a$10$P/ht94jhK56szeFs6mIVT.c4RM1AvMkwqFOQkoKfdvNkJ5xPT0w9m", "id": "none", "keepers": null, "length": 48, "lower": true, "min_lower": 0, "min_numeric": 0, "min_special": 0, "min_upper": 0, "number": true, "override_special": null, "result": "EQlqW4QjRiJAcv7Fd0Cgu0NFageEumwbaXkr7XyRiSx5tvuf", "special": false, "upper": true }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==" } ] }, { "module": "module.kube-hetzner", "mode": "managed", "type": "random_password", "name": "rancher_bootstrap", "provider": "provider[\"registry.terraform.io/hashicorp/random\"]", "instances": [ { "index_key": 0, "schema_version": 1, "attributes": { "bcrypt_hash": "$2a$10$L8Yq97KEie3QTyfLn5bueOewaIzbyaAe3u4zxbx30bHr/sQXLJ216", "id": "none", "keepers": null, "length": 48, "lower": true, "min_lower": 0, "min_numeric": 0, "min_special": 0, "min_upper": 0, "number": true, "override_special": null, "result": "R#a\u003cWz@0{)JM1z9@Dfy(]OJ3U$mZ2kh-zXL5Y%_e=lKI@eC1", "special": true, "upper": true }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==" } ] }, { "module": "module.kube-hetzner.module.agents[\"0-0-agent-small1\"]", "mode": "data", "type": "cloudinit_config", "name": "config", "provider": "provider[\"registry.terraform.io/hashicorp/cloudinit\"]", "instances": [ { "schema_version": 0, "attributes": { "base64_encode": true, "boundary": "MIMEBOUNDARY", "gzip": true, "id": "967727445", "part": [ { "content": "#cloud-config\n\nwrite_files:\n\n# Configure the private network interface\n- content: |\n BOOTPROTO='dhcp'\n STARTMODE='auto'\n path: /etc/sysconfig/network/ifcfg-eth1\n\n# Disable ssh password authentication\n- content: |\n PasswordAuthentication no\n X11Forwarding no\n MaxAuthTries 2\n AllowTcpForwarding no\n AllowAgentForwarding no\n AuthorizedKeysFile .ssh/authorized_keys\n path: /etc/ssh/sshd_config.d/kube-hetzner.conf\n\n# Set reboot method as \"kured\"\n- content: |\n REBOOT_METHOD=kured\n path: /etc/transactional-update.conf\n\n# Create Rancher repo config\n- content: |\n [rancher-k3s-common-stable]\n name=Rancher K3s Common (stable)\n baseurl=https://rpm.rancher.io/k3s/stable/common/microos/noarch\n enabled=1\n gpgcheck=1\n repo_gpgcheck=0\n gpgkey=https://rpm.rancher.io/public.key\n path: /etc/zypp/repos.d/rancher-k3s-common.repo\n\n# Add ssh authorized keys\nssh_authorized_keys:\n - ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOmlyNDEGxQxnXOLGMn80DwjPt+CqCy17UaW9MSBphOy contact@kjuulh.io\n\n\n# Resize /var, not /, as that's the last partition in MicroOS image.\ngrowpart:\n devices: [\"/var\"]\n\n# Make sure the hostname is set correctly\nhostname: clank-agent-small1-qlb\npreserve_hostname: true\n\nruncmd:\n\n# As above, make sure the hostname is not reset\n- [sed, '-i', 's/NETCONFIG_NIS_SETDOMAINNAME=\"yes\"/NETCONFIG_NIS_SETDOMAINNAME=\"no\"/g', /etc/sysconfig/network/config]\n- [sed, '-i', 's/DHCLIENT_SET_HOSTNAME=\"yes\"/DHCLIENT_SET_HOSTNAME=\"no\"/g', /etc/sysconfig/network/dhcp]\n\n# We set Cloudflare DNS servers, followed by Google as a backup\n- [sed, '-i', 's/NETCONFIG_DNS_STATIC_SERVERS=\"\"/NETCONFIG_DNS_STATIC_SERVERS=\"1.1.1.1 1.0.0.1 8.8.8.8\"/g', /etc/sysconfig/network/config]\n\n# Bounds the amount of logs that can survive on the system\n- [sed, '-i', 's/#SystemMaxUse=/SystemMaxUse=3G/g', /etc/systemd/journald.conf]\n- [sed, '-i', 's/#MaxRetentionSec=/MaxRetentionSec=1week/g', /etc/systemd/journald.conf]\n\n# Reduces the default number of snapshots from 2-10 number limit, to 4 and from 4-10 number limit important, to 2\n- [sed, '-i', 's/NUMBER_LIMIT=\"2-10\"/NUMBER_LIMIT=\"4\"/g', /etc/snapper/configs/root]\n- [sed, '-i', 's/NUMBER_LIMIT_IMPORTANT=\"4-10\"/NUMBER_LIMIT_IMPORTANT=\"3\"/g', /etc/snapper/configs/root]\n\n# Disables unneeded services\n- [systemctl, disable, '--now', 'rebootmgr.service']\n", "content_type": "text/cloud-config", "filename": "init.cfg", "merge_type": "" } ], "rendered": "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" }, "sensitive_attributes": [] } ] }, { "module": "module.kube-hetzner.module.agents[\"0-0-agent-small1\"]", "mode": "managed", "type": "hcloud_server", "name": "server", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "schema_version": 0, "attributes": { "backup_window": "", "backups": false, "datacenter": "fsn1-dc14", "delete_protection": false, "firewall_ids": [ 412602 ], "id": "21030909", "ignore_remote_firewall_ids": false, "image": "ubuntu-20.04", "ipv4_address": "167.235.247.244", "ipv6_address": "2a01:4f8:c012:d005::1", "ipv6_network": "2a01:4f8:c012:d005::/64", "iso": null, "keep_disk": false, "labels": { "engine": "k3s", "provisioner": "terraform" }, "location": "fsn1", "name": "clank-agent-small1-qlb", "network": [], "placement_group_id": 47148, "rebuild_protection": false, "rescue": "linux64", "server_type": "cpx11", "ssh_keys": [ "6654542" ], "status": "running", "timeouts": null, "user_data": "ySuIGFT5eeSh9i9Qty/EW5mtQpM=" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo1NDAwMDAwMDAwMDAwfX0=", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.agent", "module.kube-hetzner.hcloud_placement_group.agent", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.agents.data.cloudinit_config.config", "module.kube-hetzner.module.agents.random_string.identity_file", "module.kube-hetzner.module.agents.random_string.server" ] } ] }, { "module": "module.kube-hetzner.module.agents[\"0-0-agent-small1\"]", "mode": "managed", "type": "hcloud_server_network", "name": "server", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "schema_version": 0, "attributes": { "alias_ips": null, "id": "21030909-1711263", "ip": "10.0.0.101", "mac_address": "86:00:00:12:fa:7a", "network_id": null, "server_id": 21030909, "subnet_id": "1711263-10.0.0.0/16" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.agent", "module.kube-hetzner.hcloud_placement_group.agent", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.agents.data.cloudinit_config.config", "module.kube-hetzner.module.agents.hcloud_server.server", "module.kube-hetzner.module.agents.random_string.identity_file", "module.kube-hetzner.module.agents.random_string.server" ] } ] }, { "module": "module.kube-hetzner.module.agents[\"0-0-agent-small1\"]", "mode": "managed", "type": "random_string", "name": "identity_file", "provider": "provider[\"registry.terraform.io/hashicorp/random\"]", "instances": [ { "schema_version": 1, "attributes": { "id": "shtisef944vem08h3gjg", "keepers": null, "length": 20, "lower": true, "min_lower": 0, "min_numeric": 0, "min_special": 0, "min_upper": 0, "number": true, "override_special": null, "result": "shtisef944vem08h3gjg", "special": false, "upper": false }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.agent" ] } ] }, { "module": "module.kube-hetzner.module.agents[\"0-0-agent-small1\"]", "mode": "managed", "type": "random_string", "name": "server", "provider": "provider[\"registry.terraform.io/hashicorp/random\"]", "instances": [ { "schema_version": 1, "attributes": { "id": "qlb", "keepers": { "name": "clank-agent-small1" }, "length": 3, "lower": true, "min_lower": 0, "min_numeric": 0, "min_special": 0, "min_upper": 0, "number": false, "override_special": null, "result": "qlb", "special": false, "upper": false }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.agent" ] } ] }, { "module": "module.kube-hetzner.module.agents[\"2-0-storage1\"]", "mode": "data", "type": "cloudinit_config", "name": "config", "provider": "provider[\"registry.terraform.io/hashicorp/cloudinit\"]", "instances": [ { "schema_version": 0, "attributes": { "base64_encode": true, "boundary": "MIMEBOUNDARY", "gzip": true, "id": "2276970806", "part": [ { "content": "#cloud-config\n\nwrite_files:\n\n# Configure the private network interface\n- content: |\n BOOTPROTO='dhcp'\n STARTMODE='auto'\n path: /etc/sysconfig/network/ifcfg-eth1\n\n# Disable ssh password authentication\n- content: |\n PasswordAuthentication no\n X11Forwarding no\n MaxAuthTries 2\n AllowTcpForwarding no\n AllowAgentForwarding no\n AuthorizedKeysFile .ssh/authorized_keys\n path: /etc/ssh/sshd_config.d/kube-hetzner.conf\n\n# Set reboot method as \"kured\"\n- content: |\n REBOOT_METHOD=kured\n path: /etc/transactional-update.conf\n\n# Create Rancher repo config\n- content: |\n [rancher-k3s-common-stable]\n name=Rancher K3s Common (stable)\n baseurl=https://rpm.rancher.io/k3s/stable/common/microos/noarch\n enabled=1\n gpgcheck=1\n repo_gpgcheck=0\n gpgkey=https://rpm.rancher.io/public.key\n path: /etc/zypp/repos.d/rancher-k3s-common.repo\n\n# Add ssh authorized keys\nssh_authorized_keys:\n - ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOmlyNDEGxQxnXOLGMn80DwjPt+CqCy17UaW9MSBphOy contact@kjuulh.io\n\n\n# Resize /var, not /, as that's the last partition in MicroOS image.\ngrowpart:\n devices: [\"/var\"]\n\n# Make sure the hostname is set correctly\nhostname: clank-storage1-jqo\npreserve_hostname: true\n\nruncmd:\n\n# As above, make sure the hostname is not reset\n- [sed, '-i', 's/NETCONFIG_NIS_SETDOMAINNAME=\"yes\"/NETCONFIG_NIS_SETDOMAINNAME=\"no\"/g', /etc/sysconfig/network/config]\n- [sed, '-i', 's/DHCLIENT_SET_HOSTNAME=\"yes\"/DHCLIENT_SET_HOSTNAME=\"no\"/g', /etc/sysconfig/network/dhcp]\n\n# We set Cloudflare DNS servers, followed by Google as a backup\n- [sed, '-i', 's/NETCONFIG_DNS_STATIC_SERVERS=\"\"/NETCONFIG_DNS_STATIC_SERVERS=\"1.1.1.1 1.0.0.1 8.8.8.8\"/g', /etc/sysconfig/network/config]\n\n# Bounds the amount of logs that can survive on the system\n- [sed, '-i', 's/#SystemMaxUse=/SystemMaxUse=3G/g', /etc/systemd/journald.conf]\n- [sed, '-i', 's/#MaxRetentionSec=/MaxRetentionSec=1week/g', /etc/systemd/journald.conf]\n\n# Reduces the default number of snapshots from 2-10 number limit, to 4 and from 4-10 number limit important, to 2\n- [sed, '-i', 's/NUMBER_LIMIT=\"2-10\"/NUMBER_LIMIT=\"4\"/g', /etc/snapper/configs/root]\n- [sed, '-i', 's/NUMBER_LIMIT_IMPORTANT=\"4-10\"/NUMBER_LIMIT_IMPORTANT=\"3\"/g', /etc/snapper/configs/root]\n\n# Disables unneeded services\n- [systemctl, disable, '--now', 'rebootmgr.service']\n", "content_type": "text/cloud-config", "filename": "init.cfg", "merge_type": "" } ], "rendered": "H4sIAAAAAAAA/4xW72/aSBD9bin/w8j5wJ0O2yFp1ZYK6RygKWqNc+C0vasitOwOeIO96+6uQxzdH3/addL8IGlOiA8783hv9s0w9lAKg8IEWVNhH8q6MLwiykQlv0L2HpayFoyoZuAnk2R8nJ5NR/Hsb9+zp+ALKs2l6EMvPNjz9rwguA/a8265R1xXUnPjsMQYQvMShXkPK16gICUOfC64Celq7d/9KlNE6BWqYCyoZFys+/Bmyc09gCvZ4JWJaCFrFlApVny95yW8xJ3i9u9jPG+ruMGFLUD3PW8fhi5eKwSTI1SKXxKDINBspdoAFwbVilD0AqCtfB/+9QAAjtM0O52lWTrosJxWHRecZ/EsS9LReNAhtZE2WBGT9yFCQyPd6LaM6IY/4iu6Wgdo8p6tZcQ1WRYIWudQEa23UjEgtclRGE6J9XG3jtMbYPwAB0K67Lde74NUW6KskbfBhFxZdKY4ajh0obgo5Daj1S7YZeI1CvNErja5VPwa2Sds9AdeIIRa5xH5GV9ssNGPXNC5/bJF60XIok29xCBHcy1QhTZqzZijAYVLKQ2UaHLJgGjwN7VC5u+6MBvbfiyScfYxHQ0c6qGqsVNFqPWGFEFdMWLwp9ZQoe36jAiaowKFlYSbgdlR+q5aVLA50gGVZSlFoI3t27nLu7m+Zfp0pGHoMPBbC/rdgZZEY62KQW5MpftRpKoyvOENuYw2Rzpq4VGrEJWcKil1JCRRNHccKCyADXrutK7WNEe6uTnaKyx+xg5uIRtsntOs6mXBabjB5qFx101VRZZOhyzavXtoU9bDmDE3uHe9B9d7rfPFo3noewCBBQfIDl+/7r2DOI7j4dH0mgx7xT+jSW+ajV/b2CQti2Y6Gp9c/XUlvqWfTxLx9mC0vTg1fwx/DJvemzPy9V0yP67ytHGNItT8ubmo6yIPufRsXTPU/BohuiSqC0IaiLp2kkxOTEe7P31BtAG7/NymAi4gsW6nc+AlWWPorZXc2nzf2cjwklPUffjuW1L/3KokZIOgb9dILrWxcwBcg0YDVCqF1BSNd5vpAy2I2ATaSEXW2AsufkivUqhRXeLiDmVUjZ6nakFL5vZVrIEs5SV2oXxW0t7SUhkvgO8aWRc6Ae90oaOj6TgbptMPk5PFdDJfzMfZKE3iyXQaJ+OB36D2f40Q0o/Wne5z66w9nu/Kjj4OP0/G08zyLT6m8+ye4DO5F6TsznXOf0Vn8dBu+VVBFMJoOgfno9JdWEm7v5DBsoETKdcF2u4TWBK6qatfGTSazhfzLM4mw8V8PPsyns0Hvv9Cvhe6j332hAdhD96G7vO/TPP24dg+dduhJKWshQG5gkKu23EFSoRt+CW/RJDCwXSjDZa719ifu0RCrs40DqIHp6OTB+UYLFl0IWslSMHcSnyigfsJuZqh3YNcijnSQfQ40Nsibl4kdn9IVlNsb8lwRerCgKjLJSp7Wy1IpXNpNKyULOEw6B3cZgtectMFI+EVEMFawKvHAOBlJZUhooUePtHis+R4PFt8niSTbOBbBf9R7NX9hglSVahu2qQjJaV5wqD7BItJcprOsnhqqXbo72ePXhS6ey3QUAuByJC56bY7yJXhjKam6AJrgbaqQMitLax9gpZrFd78pnO+88IWBHvefwEAAP//AMOH/Q8KAAA=" }, "sensitive_attributes": [] } ] }, { "module": "module.kube-hetzner.module.agents[\"2-0-storage1\"]", "mode": "managed", "type": "hcloud_server", "name": "server", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "schema_version": 0, "attributes": { "backup_window": "", "backups": false, "datacenter": "fsn1-dc14", "delete_protection": false, "firewall_ids": [ 412602 ], "id": "21030913", "ignore_remote_firewall_ids": false, "image": "ubuntu-20.04", "ipv4_address": "142.132.189.194", "ipv6_address": "2a01:4f8:c012:d1c2::1", "ipv6_network": "2a01:4f8:c012:d1c2::/64", "iso": null, "keep_disk": false, "labels": { "engine": "k3s", "provisioner": "terraform" }, "location": "fsn1", "name": "clank-storage1-jqo", "network": [], "placement_group_id": 47148, "rebuild_protection": false, "rescue": "linux64", "server_type": "cpx11", "ssh_keys": [ "6654542" ], "status": "running", "timeouts": null, "user_data": "WofWRChEiezS+e5A4WToqMWnhuE=" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo1NDAwMDAwMDAwMDAwfX0=", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.agent", "module.kube-hetzner.hcloud_placement_group.agent", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.agents.data.cloudinit_config.config", "module.kube-hetzner.module.agents.random_string.identity_file", "module.kube-hetzner.module.agents.random_string.server" ] } ] }, { "module": "module.kube-hetzner.module.agents[\"2-0-storage1\"]", "mode": "managed", "type": "hcloud_server_network", "name": "server", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "schema_version": 0, "attributes": { "alias_ips": null, "id": "21030913-1711263", "ip": "10.2.0.101", "mac_address": "86:00:00:12:fa:6c", "network_id": null, "server_id": 21030913, "subnet_id": "1711263-10.2.0.0/16" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.agent", "module.kube-hetzner.hcloud_placement_group.agent", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.agents.data.cloudinit_config.config", "module.kube-hetzner.module.agents.hcloud_server.server", "module.kube-hetzner.module.agents.random_string.identity_file", "module.kube-hetzner.module.agents.random_string.server" ] } ] }, { "module": "module.kube-hetzner.module.agents[\"2-0-storage1\"]", "mode": "managed", "type": "random_string", "name": "identity_file", "provider": "provider[\"registry.terraform.io/hashicorp/random\"]", "instances": [ { "schema_version": 1, "attributes": { "id": "qgu4estxg8uvl5vswiwl", "keepers": null, "length": 20, "lower": true, "min_lower": 0, "min_numeric": 0, "min_special": 0, "min_upper": 0, "number": true, "override_special": null, "result": "qgu4estxg8uvl5vswiwl", "special": false, "upper": false }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.agent" ] } ] }, { "module": "module.kube-hetzner.module.agents[\"2-0-storage1\"]", "mode": "managed", "type": "random_string", "name": "server", "provider": "provider[\"registry.terraform.io/hashicorp/random\"]", "instances": [ { "schema_version": 1, "attributes": { "id": "jqo", "keepers": { "name": "clank-storage1" }, "length": 3, "lower": true, "min_lower": 0, "min_numeric": 0, "min_special": 0, "min_upper": 0, "number": false, "override_special": null, "result": "jqo", "special": false, "upper": false }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.agent" ] } ] }, { "module": "module.kube-hetzner.module.control_planes[\"0-0-control-plane-fsn1\"]", "mode": "data", "type": "cloudinit_config", "name": "config", "provider": "provider[\"registry.terraform.io/hashicorp/cloudinit\"]", "instances": [ { "schema_version": 0, "attributes": { "base64_encode": true, "boundary": "MIMEBOUNDARY", "gzip": true, "id": "1609124482", "part": [ { "content": "#cloud-config\n\nwrite_files:\n\n# Configure the private network interface\n- content: |\n BOOTPROTO='dhcp'\n STARTMODE='auto'\n path: /etc/sysconfig/network/ifcfg-eth1\n\n# Disable ssh password authentication\n- content: |\n PasswordAuthentication no\n X11Forwarding no\n MaxAuthTries 2\n AllowTcpForwarding no\n AllowAgentForwarding no\n AuthorizedKeysFile .ssh/authorized_keys\n path: /etc/ssh/sshd_config.d/kube-hetzner.conf\n\n# Set reboot method as \"kured\"\n- content: |\n REBOOT_METHOD=kured\n path: /etc/transactional-update.conf\n\n# Create Rancher repo config\n- content: |\n [rancher-k3s-common-stable]\n name=Rancher K3s Common (stable)\n baseurl=https://rpm.rancher.io/k3s/stable/common/microos/noarch\n enabled=1\n gpgcheck=1\n repo_gpgcheck=0\n gpgkey=https://rpm.rancher.io/public.key\n path: /etc/zypp/repos.d/rancher-k3s-common.repo\n\n# Add ssh authorized keys\nssh_authorized_keys:\n - ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOmlyNDEGxQxnXOLGMn80DwjPt+CqCy17UaW9MSBphOy contact@kjuulh.io\n\n\n# Resize /var, not /, as that's the last partition in MicroOS image.\ngrowpart:\n devices: [\"/var\"]\n\n# Make sure the hostname is set correctly\nhostname: clank-control-plane-fsn1-rxs\npreserve_hostname: true\n\nruncmd:\n\n# As above, make sure the hostname is not reset\n- [sed, '-i', 's/NETCONFIG_NIS_SETDOMAINNAME=\"yes\"/NETCONFIG_NIS_SETDOMAINNAME=\"no\"/g', /etc/sysconfig/network/config]\n- [sed, '-i', 's/DHCLIENT_SET_HOSTNAME=\"yes\"/DHCLIENT_SET_HOSTNAME=\"no\"/g', /etc/sysconfig/network/dhcp]\n\n# We set Cloudflare DNS servers, followed by Google as a backup\n- [sed, '-i', 's/NETCONFIG_DNS_STATIC_SERVERS=\"\"/NETCONFIG_DNS_STATIC_SERVERS=\"1.1.1.1 1.0.0.1 8.8.8.8\"/g', /etc/sysconfig/network/config]\n\n# Bounds the amount of logs that can survive on the system\n- [sed, '-i', 's/#SystemMaxUse=/SystemMaxUse=3G/g', /etc/systemd/journald.conf]\n- [sed, '-i', 's/#MaxRetentionSec=/MaxRetentionSec=1week/g', /etc/systemd/journald.conf]\n\n# Reduces the default number of snapshots from 2-10 number limit, to 4 and from 4-10 number limit important, to 2\n- [sed, '-i', 's/NUMBER_LIMIT=\"2-10\"/NUMBER_LIMIT=\"4\"/g', /etc/snapper/configs/root]\n- [sed, '-i', 's/NUMBER_LIMIT_IMPORTANT=\"4-10\"/NUMBER_LIMIT_IMPORTANT=\"3\"/g', /etc/snapper/configs/root]\n\n# Disables unneeded services\n- [systemctl, disable, '--now', 'rebootmgr.service']\n", "content_type": "text/cloud-config", "filename": "init.cfg", "merge_type": "" } ], "rendered": "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" }, "sensitive_attributes": [] } ] }, { "module": "module.kube-hetzner.module.control_planes[\"0-0-control-plane-fsn1\"]", "mode": "managed", "type": "hcloud_server", "name": "server", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "schema_version": 0, "attributes": { "backup_window": "", "backups": false, "datacenter": "fsn1-dc14", "delete_protection": false, "firewall_ids": [ 412602 ], "id": "21030914", "ignore_remote_firewall_ids": false, "image": "ubuntu-20.04", "ipv4_address": "142.132.182.232", "ipv6_address": "2a01:4f8:c012:d1c0::1", "ipv6_network": "2a01:4f8:c012:d1c0::/64", "iso": null, "keep_disk": false, "labels": { "engine": "k3s", "provisioner": "terraform" }, "location": "fsn1", "name": "clank-control-plane-fsn1-rxs", "network": [], "placement_group_id": 47147, "rebuild_protection": false, "rescue": "linux64", "server_type": "cpx11", "ssh_keys": [ "6654542" ], "status": "running", "timeouts": null, "user_data": "M58JAmPIBZRmdC7unRLAA3v7VuM=" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo1NDAwMDAwMDAwMDAwfX0=", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server" ] } ] }, { "module": "module.kube-hetzner.module.control_planes[\"0-0-control-plane-fsn1\"]", "mode": "managed", "type": "hcloud_server_network", "name": "server", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "schema_version": 0, "attributes": { "alias_ips": null, "id": "21030914-1711263", "ip": "10.255.0.101", "mac_address": "86:00:00:12:fa:6d", "network_id": null, "server_id": 21030914, "subnet_id": "1711263-10.255.0.0/16" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.hcloud_server.server", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server" ] } ] }, { "module": "module.kube-hetzner.module.control_planes[\"0-0-control-plane-fsn1\"]", "mode": "managed", "type": "random_string", "name": "identity_file", "provider": "provider[\"registry.terraform.io/hashicorp/random\"]", "instances": [ { "schema_version": 1, "attributes": { "id": "01t9v05yia1ocb4q53ih", "keepers": null, "length": 20, "lower": true, "min_lower": 0, "min_numeric": 0, "min_special": 0, "min_upper": 0, "number": true, "override_special": null, "result": "01t9v05yia1ocb4q53ih", "special": false, "upper": false }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane" ] } ] }, { "module": "module.kube-hetzner.module.control_planes[\"0-0-control-plane-fsn1\"]", "mode": "managed", "type": "random_string", "name": "server", "provider": "provider[\"registry.terraform.io/hashicorp/random\"]", "instances": [ { "schema_version": 1, "attributes": { "id": "rxs", "keepers": { "name": "clank-control-plane-fsn1" }, "length": 3, "lower": true, "min_lower": 0, "min_numeric": 0, "min_special": 0, "min_upper": 0, "number": false, "override_special": null, "result": "rxs", "special": false, "upper": false }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane" ] } ] }, { "module": "module.kube-hetzner.module.control_planes[\"1-0-control-plane-nbg1\"]", "mode": "data", "type": "cloudinit_config", "name": "config", "provider": "provider[\"registry.terraform.io/hashicorp/cloudinit\"]", "instances": [ { "schema_version": 0, "attributes": { "base64_encode": true, "boundary": "MIMEBOUNDARY", "gzip": true, "id": "2895757147", "part": [ { "content": "#cloud-config\n\nwrite_files:\n\n# Configure the private network interface\n- content: |\n BOOTPROTO='dhcp'\n STARTMODE='auto'\n path: /etc/sysconfig/network/ifcfg-eth1\n\n# Disable ssh password authentication\n- content: |\n PasswordAuthentication no\n X11Forwarding no\n MaxAuthTries 2\n AllowTcpForwarding no\n AllowAgentForwarding no\n AuthorizedKeysFile .ssh/authorized_keys\n path: /etc/ssh/sshd_config.d/kube-hetzner.conf\n\n# Set reboot method as \"kured\"\n- content: |\n REBOOT_METHOD=kured\n path: /etc/transactional-update.conf\n\n# Create Rancher repo config\n- content: |\n [rancher-k3s-common-stable]\n name=Rancher K3s Common (stable)\n baseurl=https://rpm.rancher.io/k3s/stable/common/microos/noarch\n enabled=1\n gpgcheck=1\n repo_gpgcheck=0\n gpgkey=https://rpm.rancher.io/public.key\n path: /etc/zypp/repos.d/rancher-k3s-common.repo\n\n# Add ssh authorized keys\nssh_authorized_keys:\n - ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOmlyNDEGxQxnXOLGMn80DwjPt+CqCy17UaW9MSBphOy contact@kjuulh.io\n\n\n# Resize /var, not /, as that's the last partition in MicroOS image.\ngrowpart:\n devices: [\"/var\"]\n\n# Make sure the hostname is set correctly\nhostname: clank-control-plane-nbg1-ufb\npreserve_hostname: true\n\nruncmd:\n\n# As above, make sure the hostname is not reset\n- [sed, '-i', 's/NETCONFIG_NIS_SETDOMAINNAME=\"yes\"/NETCONFIG_NIS_SETDOMAINNAME=\"no\"/g', /etc/sysconfig/network/config]\n- [sed, '-i', 's/DHCLIENT_SET_HOSTNAME=\"yes\"/DHCLIENT_SET_HOSTNAME=\"no\"/g', /etc/sysconfig/network/dhcp]\n\n# We set Cloudflare DNS servers, followed by Google as a backup\n- [sed, '-i', 's/NETCONFIG_DNS_STATIC_SERVERS=\"\"/NETCONFIG_DNS_STATIC_SERVERS=\"1.1.1.1 1.0.0.1 8.8.8.8\"/g', /etc/sysconfig/network/config]\n\n# Bounds the amount of logs that can survive on the system\n- [sed, '-i', 's/#SystemMaxUse=/SystemMaxUse=3G/g', /etc/systemd/journald.conf]\n- [sed, '-i', 's/#MaxRetentionSec=/MaxRetentionSec=1week/g', /etc/systemd/journald.conf]\n\n# Reduces the default number of snapshots from 2-10 number limit, to 4 and from 4-10 number limit important, to 2\n- [sed, '-i', 's/NUMBER_LIMIT=\"2-10\"/NUMBER_LIMIT=\"4\"/g', /etc/snapper/configs/root]\n- [sed, '-i', 's/NUMBER_LIMIT_IMPORTANT=\"4-10\"/NUMBER_LIMIT_IMPORTANT=\"3\"/g', /etc/snapper/configs/root]\n\n# Disables unneeded services\n- [systemctl, disable, '--now', 'rebootmgr.service']\n", "content_type": "text/cloud-config", "filename": "init.cfg", "merge_type": "" } ], "rendered": "H4sIAAAAAAAA/4xW4W/ayBP9bin/w8j5wO+nw3ZIWrWlQjoHaIpa4xw4be+qCC27A95i7/p21yGO7o8/7TppSEiaE+LDzjzem30zjD2UwqAwQdZU2IeyLgyviDJRya+RvYelrAUjqhn4ySQZn6YX01E8+9P37Cn4gkpzKfrQC48OvAMvCHZBB94d94jrSmpuHJYYQ2heojDvYcULFKTEgc8FNyFdrf37X2WKCL1CFYwFlYyLdR/eLLnZAbiSDV6biBayZgGVYsXXB17CS9wr7nAX43lbxQ0ubAG673mHMHTxWiGYHKFS/IoYBIFmK9UGuDCoVoSiFwBt5fvwjwcAcJqm2fkszdJBh+W06rjgPItnWZKOxoMOqY20wYqYvA8RGhrpRrdlRLf8EV/R1TpAk/dsLSOuybJA0DqHimi9lYoBqU2OwnBKrI/7dZzfAuMHOBDSZb/1eh+k2hJljbwLJuTaojPFUcOxC8VFIbcZrfbBLhOvUZgncrXJpeI3yD5hoz/wAiHUOo/Iz/hig41+5ILO7ZctWi9CFm3qJQY5mhuBKrRRa8YcDShcSmmgRJNLBkSDv6kVMn/fhdnY9mORjLOP6WjgUA9VjZ0qQq03pAjqihGDP7WGCm3XZ0TQHBUorCTcDsye0nfVooLNiQ6oLEspAm1s3y5d3s31HdOnEw1Dh4H/taD/O9CSaKxVMciNqXQ/ilRVhre8IZfR5kRHLTxqFaKSUyWljoQkiuaOA4UFsEHPndbVmuZIN7dHe4XFz9jRHWSDzXOaVb0sOA032Dw07qapqsjS6ZBF+3cPbcp6GDPmBve+9+B6r3W+eDQPfQ8gsOAA2fHr1713EMdxPDyZ3pBhr/hrNOlNs/FrG5ukZdFMR+Oz6z+uxbf081ki3h6Ntj/OzW/Dv4dN780F+foumZ9Wedq4RhFqft/8qOsiD7n0bF0z1PwGIboiqgtCGoi6dpJMTkxHuz99QbQBu/zcpgIuILFup3PgJVlj6K2V3Np839nI8IpT1H347ltS/9KqJGSDoO/WSC61sXMAXINGA1QqhdQUjXeX6QMtiNjYtWSULIKqIAIDsVz3gnq19CqFGtUVLu7xRtXoeaoWtGRuc8UayFJeYRfKZ8XtfS2V8QL4rpF1oRPwThc6OpqOs2E6/TA5W0wn88V8nI3SJJ5Mp3EyHvgNav/XCCH9aN3pPrfY2uPlvuzo4/DzZDzNLN/iYzrPdgSfyb0gZbev68FXdGYP7b5fFUQhjKZzcD4q3YWVtJsMGSwbOJNyXaCdAwJLQjd19SuDRtP5Yp7F2WS4mI9nX8az+cD3X8j3QvexT6HwKOzB29B9/pNp3iGc2udvO56klLUwIFdQyHU7uECJsA2/4lcIUjiYbrTBcv8ah3OXSMj1hcZB9OB0cvagHIMli37IWglSMLccn2jgYUKuZ2g3IpdijnQQPQ70toibF4ndX5PVFNtbMlyRujAg6nKJyt5WC1LpXBoNKyVLOA56R3fZgpfcdMFIeAVEsBbw6jEAeFlJZYhoocdPtPgiOR3PFp8nySQb+FbBfxR7tdswQaoK1W2bdKSkNE8YtEuwmCTn6SyLp5Zqj343e/Ki0P0LgoZaCESGzE233UauDGc0NUUXWAu0VQVCbm1h7bO0XKvw9jedy71XtyA48P4NAAD//+237e0ZCgAA" }, "sensitive_attributes": [] } ] }, { "module": "module.kube-hetzner.module.control_planes[\"1-0-control-plane-nbg1\"]", "mode": "managed", "type": "hcloud_server", "name": "server", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "schema_version": 0, "attributes": { "backup_window": "", "backups": false, "datacenter": "nbg1-dc3", "delete_protection": false, "firewall_ids": [ 412602 ], "id": "21030912", "ignore_remote_firewall_ids": false, "image": "ubuntu-20.04", "ipv4_address": "116.203.29.245", "ipv6_address": "2a01:4f8:1c1e:c5b4::1", "ipv6_network": "2a01:4f8:1c1e:c5b4::/64", "iso": null, "keep_disk": false, "labels": { "engine": "k3s", "provisioner": "terraform" }, "location": "nbg1", "name": "clank-control-plane-nbg1-ufb", "network": [], "placement_group_id": 47147, "rebuild_protection": false, "rescue": "linux64", "server_type": "cpx11", "ssh_keys": [ "6654542" ], "status": "running", "timeouts": null, "user_data": "Of6KXZ6Q/8Rx/tocgZl7Y+52U6g=" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo1NDAwMDAwMDAwMDAwfX0=", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server" ] } ] }, { "module": "module.kube-hetzner.module.control_planes[\"1-0-control-plane-nbg1\"]", "mode": "managed", "type": "hcloud_server_network", "name": "server", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "schema_version": 0, "attributes": { "alias_ips": null, "id": "21030912-1711263", "ip": "10.254.0.101", "mac_address": "86:00:00:12:fa:a2", "network_id": null, "server_id": 21030912, "subnet_id": "1711263-10.254.0.0/16" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.hcloud_server.server", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server" ] } ] }, { "module": "module.kube-hetzner.module.control_planes[\"1-0-control-plane-nbg1\"]", "mode": "managed", "type": "random_string", "name": "identity_file", "provider": "provider[\"registry.terraform.io/hashicorp/random\"]", "instances": [ { "schema_version": 1, "attributes": { "id": "059zvy8k1ow2juf9hvql", "keepers": null, "length": 20, "lower": true, "min_lower": 0, "min_numeric": 0, "min_special": 0, "min_upper": 0, "number": true, "override_special": null, "result": "059zvy8k1ow2juf9hvql", "special": false, "upper": false }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane" ] } ] }, { "module": "module.kube-hetzner.module.control_planes[\"1-0-control-plane-nbg1\"]", "mode": "managed", "type": "random_string", "name": "server", "provider": "provider[\"registry.terraform.io/hashicorp/random\"]", "instances": [ { "schema_version": 1, "attributes": { "id": "ufb", "keepers": { "name": "clank-control-plane-nbg1" }, "length": 3, "lower": true, "min_lower": 0, "min_numeric": 0, "min_special": 0, "min_upper": 0, "number": false, "override_special": null, "result": "ufb", "special": false, "upper": false }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane" ] } ] }, { "module": "module.kube-hetzner.module.control_planes[\"2-0-control-plane-hel1\"]", "mode": "data", "type": "cloudinit_config", "name": "config", "provider": "provider[\"registry.terraform.io/hashicorp/cloudinit\"]", "instances": [ { "schema_version": 0, "attributes": { "base64_encode": true, "boundary": "MIMEBOUNDARY", "gzip": true, "id": "3940300695", "part": [ { "content": "#cloud-config\n\nwrite_files:\n\n# Configure the private network interface\n- content: |\n BOOTPROTO='dhcp'\n STARTMODE='auto'\n path: /etc/sysconfig/network/ifcfg-eth1\n\n# Disable ssh password authentication\n- content: |\n PasswordAuthentication no\n X11Forwarding no\n MaxAuthTries 2\n AllowTcpForwarding no\n AllowAgentForwarding no\n AuthorizedKeysFile .ssh/authorized_keys\n path: /etc/ssh/sshd_config.d/kube-hetzner.conf\n\n# Set reboot method as \"kured\"\n- content: |\n REBOOT_METHOD=kured\n path: /etc/transactional-update.conf\n\n# Create Rancher repo config\n- content: |\n [rancher-k3s-common-stable]\n name=Rancher K3s Common (stable)\n baseurl=https://rpm.rancher.io/k3s/stable/common/microos/noarch\n enabled=1\n gpgcheck=1\n repo_gpgcheck=0\n gpgkey=https://rpm.rancher.io/public.key\n path: /etc/zypp/repos.d/rancher-k3s-common.repo\n\n# Add ssh authorized keys\nssh_authorized_keys:\n - ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOmlyNDEGxQxnXOLGMn80DwjPt+CqCy17UaW9MSBphOy contact@kjuulh.io\n\n\n# Resize /var, not /, as that's the last partition in MicroOS image.\ngrowpart:\n devices: [\"/var\"]\n\n# Make sure the hostname is set correctly\nhostname: clank-control-plane-hel1-usi\npreserve_hostname: true\n\nruncmd:\n\n# As above, make sure the hostname is not reset\n- [sed, '-i', 's/NETCONFIG_NIS_SETDOMAINNAME=\"yes\"/NETCONFIG_NIS_SETDOMAINNAME=\"no\"/g', /etc/sysconfig/network/config]\n- [sed, '-i', 's/DHCLIENT_SET_HOSTNAME=\"yes\"/DHCLIENT_SET_HOSTNAME=\"no\"/g', /etc/sysconfig/network/dhcp]\n\n# We set Cloudflare DNS servers, followed by Google as a backup\n- [sed, '-i', 's/NETCONFIG_DNS_STATIC_SERVERS=\"\"/NETCONFIG_DNS_STATIC_SERVERS=\"1.1.1.1 1.0.0.1 8.8.8.8\"/g', /etc/sysconfig/network/config]\n\n# Bounds the amount of logs that can survive on the system\n- [sed, '-i', 's/#SystemMaxUse=/SystemMaxUse=3G/g', /etc/systemd/journald.conf]\n- [sed, '-i', 's/#MaxRetentionSec=/MaxRetentionSec=1week/g', /etc/systemd/journald.conf]\n\n# Reduces the default number of snapshots from 2-10 number limit, to 4 and from 4-10 number limit important, to 2\n- [sed, '-i', 's/NUMBER_LIMIT=\"2-10\"/NUMBER_LIMIT=\"4\"/g', /etc/snapper/configs/root]\n- [sed, '-i', 's/NUMBER_LIMIT_IMPORTANT=\"4-10\"/NUMBER_LIMIT_IMPORTANT=\"3\"/g', /etc/snapper/configs/root]\n\n# Disables unneeded services\n- [systemctl, disable, '--now', 'rebootmgr.service']\n", "content_type": "text/cloud-config", "filename": "init.cfg", "merge_type": "" } ], "rendered": "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" }, "sensitive_attributes": [] } ] }, { "module": "module.kube-hetzner.module.control_planes[\"2-0-control-plane-hel1\"]", "mode": "managed", "type": "hcloud_server", "name": "server", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "schema_version": 0, "attributes": { "backup_window": "", "backups": false, "datacenter": "hel1-dc2", "delete_protection": false, "firewall_ids": [ 412602 ], "id": "21030910", "ignore_remote_firewall_ids": false, "image": "ubuntu-20.04", "ipv4_address": "65.108.211.112", "ipv6_address": "2a01:4f9:c012:5e83::1", "ipv6_network": "2a01:4f9:c012:5e83::/64", "iso": null, "keep_disk": false, "labels": { "engine": "k3s", "provisioner": "terraform" }, "location": "hel1", "name": "clank-control-plane-hel1-usi", "network": [], "placement_group_id": 47147, "rebuild_protection": false, "rescue": "linux64", "server_type": "cpx11", "ssh_keys": [ "6654542" ], "status": "running", "timeouts": null, "user_data": "FKe0xQSfj1rSDb7agkYKOs0W6QQ=" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo1NDAwMDAwMDAwMDAwfX0=", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server" ] } ] }, { "module": "module.kube-hetzner.module.control_planes[\"2-0-control-plane-hel1\"]", "mode": "managed", "type": "hcloud_server_network", "name": "server", "provider": "provider[\"registry.terraform.io/hetznercloud/hcloud\"]", "instances": [ { "schema_version": 0, "attributes": { "alias_ips": null, "id": "21030910-1711263", "ip": "10.253.0.101", "mac_address": "86:00:00:12:fa:77", "network_id": null, "server_id": 21030910, "subnet_id": "1711263-10.253.0.0/16" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.kube-hetzner.hcloud_firewall.k3s", "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane", "module.kube-hetzner.hcloud_placement_group.control_plane", "module.kube-hetzner.hcloud_ssh_key.k3s", "module.kube-hetzner.module.control_planes.data.cloudinit_config.config", "module.kube-hetzner.module.control_planes.hcloud_server.server", "module.kube-hetzner.module.control_planes.random_string.identity_file", "module.kube-hetzner.module.control_planes.random_string.server" ] } ] }, { "module": "module.kube-hetzner.module.control_planes[\"2-0-control-plane-hel1\"]", "mode": "managed", "type": "random_string", "name": "identity_file", "provider": "provider[\"registry.terraform.io/hashicorp/random\"]", "instances": [ { "schema_version": 1, "attributes": { "id": "z6vtb8sffl78k7n3iogk", "keepers": null, "length": 20, "lower": true, "min_lower": 0, "min_numeric": 0, "min_special": 0, "min_upper": 0, "number": true, "override_special": null, "result": "z6vtb8sffl78k7n3iogk", "special": false, "upper": false }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane" ] } ] }, { "module": "module.kube-hetzner.module.control_planes[\"2-0-control-plane-hel1\"]", "mode": "managed", "type": "random_string", "name": "server", "provider": "provider[\"registry.terraform.io/hashicorp/random\"]", "instances": [ { "schema_version": 1, "attributes": { "id": "usi", "keepers": { "name": "clank-control-plane-hel1" }, "length": 3, "lower": true, "min_lower": 0, "min_numeric": 0, "min_special": 0, "min_upper": 0, "number": false, "override_special": null, "result": "usi", "special": false, "upper": false }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "dependencies": [ "module.kube-hetzner.hcloud_network.k3s", "module.kube-hetzner.hcloud_network_subnet.control_plane" ] } ] } ] }