agent: |
d1FTeqsvFiqlEWM5cxm8Remove the OIDC cognito changes made to the eks/main.tf file and re-run terraform init, plan and apply to recreate the old OIDC managed by AWS in eks module and then run the same for eks-services module so new eks module outputs are propagated.
Remove the OIDC cognito changes made to the eks/main.tf file and re-run terraform init, plan and apply to recreate the old OIDC managed by AWS in eks module and then run the same for eks-services module so new eks module outputs are propagated.
There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.
This is basically reverting back to old AWS managed OIDC provider otherwise we face authentication issues for OIDC related roles like, efs-csi, alb-ingress, cluster-autoscaler etc.
inputs
outputs
terraform init \
-backend-config=<backend_s3_bucket> \
-backend-config=<dynamo_db_lock_name> \
-backend-config=<statefile_key> \
-backend-config="encrypt=true" \
-backend-config="region=us-east-2"
terraform apply \
-var environment=<env_name> \
-var aws_region=<region_name> \
-var remote_state_bucket=<backend_s3_bucket> \
-var remote_state_region=<backend_region>
# Same apply usage for plan as well
copied