-
-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Can`t create node groups #1545
Comments
issue looks to be related to missing instance type in your region. What region, which AZ and what instance type you trying to run this? You can check this also by:
(just change your region) |
the region is us-east-1 and instance type as you say t3.small |
which AZ you have subnets as in one of them AWS doesnt deliver t3 instances can you also paste a |
Sure, attached plan output
Terraform will perform the following actions: module.k8s_cluster.data.aws_eks_cluster.cluster will be read during apply(config refers to values not yet known)<= data "aws_eks_cluster" "cluster" { module.k8s_cluster.data.aws_eks_cluster_auth.cluster will be read during apply(config refers to values not yet known)<= data "aws_eks_cluster_auth" "cluster" { module.k8s_cluster.data.template_file.launch_template_boostrap will be read during apply(config refers to values not yet known)<= data "template_file" "launch_template_boostrap" {
module.k8s_cluster.aws_launch_template.default will be created
module.k8s_cluster.null_resource.updating_k8s_configuration will be created
module.rds_instance.aws_db_instance.rds will be created
module.rds_instance.aws_db_subnet_group.rds_subnet_grp will be created
module.rds_instance.aws_security_group.rds_security_group_bastion will be created
module.rds_instance.aws_security_group.rds_security_group_nodes will be created
module.rds_instance.random_password.rds_password will be created
module.rds_instance.random_string.rds_identifier will be created
module.vpc.aws_eip.nat_gw_eip will be created
module.vpc.aws_internet_gateway.k8s_igw will be created
module.vpc.aws_route_table.public_k8s_route_table will be created
module.vpc.aws_route_table_association.public-subnet-1-association will be created
module.vpc.aws_route_table_association.public-subnet-2-association will be created
module.vpc.aws_route_table_association.public-subnet-3-association will be created
module.vpc.aws_subnet.public_subnet_eks_1a will be created
module.vpc.aws_subnet.public_subnet_eks_1b will be created
module.vpc.aws_subnet.public_subnet_eks_1c will be created
module.vpc.aws_vpc.vpc_kubernetes will be created
module.k8s_cluster.module.eks.data.http.wait_for_cluster[0] will be read during apply(config refers to values not yet known)<= data "http" "wait_for_cluster" { module.k8s_cluster.module.eks.aws_eks_cluster.this[0] will be created
module.k8s_cluster.module.eks.aws_iam_policy.cluster_elb_sl_role_creation[0] will be created
module.k8s_cluster.module.eks.aws_iam_role.cluster[0] will be created
module.k8s_cluster.module.eks.aws_iam_role.workers[0] will be created
module.k8s_cluster.module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSClusterPolicy[0] will be created
module.k8s_cluster.module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSServicePolicy[0] will be created
module.k8s_cluster.module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSVPCResourceControllerPolicy[0] will be created
module.k8s_cluster.module.eks.aws_iam_role_policy_attachment.cluster_elb_sl_role_creation[0] will be created
module.k8s_cluster.module.eks.aws_iam_role_policy_attachment.workers_AmazonEC2ContainerRegistryReadOnly[0] will be created
module.k8s_cluster.module.eks.aws_iam_role_policy_attachment.workers_AmazonEKSWorkerNodePolicy[0] will be created
module.k8s_cluster.module.eks.aws_iam_role_policy_attachment.workers_AmazonEKS_CNI_Policy[0] will be created
module.k8s_cluster.module.eks.aws_security_group.cluster[0] will be created
module.k8s_cluster.module.eks.aws_security_group.workers[0] will be created
module.k8s_cluster.module.eks.aws_security_group_rule.cluster_egress_internet[0] will be created
module.k8s_cluster.module.eks.aws_security_group_rule.cluster_https_worker_ingress[0] will be created
module.k8s_cluster.module.eks.aws_security_group_rule.workers_egress_internet[0] will be created
module.k8s_cluster.module.eks.aws_security_group_rule.workers_ingress_cluster[0] will be created
module.k8s_cluster.module.eks.aws_security_group_rule.workers_ingress_cluster_https[0] will be created
module.k8s_cluster.module.eks.aws_security_group_rule.workers_ingress_self[0] will be created
module.k8s_cluster.module.eks.kubernetes_config_map.aws_auth[0] will be created
module.k8s_cluster.module.eks.local_file.kubeconfig[0] will be created
module.k8s_cluster.module.eks.module.node_groups.aws_eks_node_group.workers["node_0"] will be created
module.k8s_cluster.module.eks.module.node_groups.aws_eks_node_group.workers["node_1"] will be created
Plan: 41 to add, 0 to change, 0 to destroy. Changes to Outputs:
` |
can you properly format this as this is not readable at all |
I have a other error now, i think is related to this. |
format using markdown to have something like instead randomly styled output:
can be done using opening and closing plan via ``` |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
This issue has been automatically closed because it has not had recent activity since being marked as stale. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
I try to create EKS with this module, using with launch template and after the cluster creating successfully and starting to create nodes I am get the next error:
Error: error creating EKS Node Group (alert-app-alpha:alert-app-alpha-node20210824081946824200000001): InvalidRequestException: Cannot specify instance types in launch template and API request { RespMetadata: { StatusCode: 400, RequestID: "48d5fb36-c38f-4142-bd52-9b46317fbf45" }, ClusterName: "alert-app-alpha", Message_: "Cannot specify instance types in launch template and API request", NodegroupName: "alert-app-alpha-node20210824081946824200000001" } eks\modules\node_groups\node_groups.tf line 1, in resource "aws_eks_node_group" "workers": 1: resource "aws_eks_node_group" "workers" {
Providers required by state:
provider[registry.terraform.io/hashicorp/kubernetes]
provider[registry.terraform.io/hashicorp/aws]
provider[registry.terraform.io/hashicorp/local]
provider[registry.terraform.io/hashicorp/null]
provider[registry.terraform.io/hashicorp/random]
provider[registry.terraform.io/hashicorp/template]
provider[registry.terraform.io/terraform-aws-modules/http]
Windows 10
Terraform v0.14.3
I am take the example from this repo:
https://github.com/terraform-aws-modules/terraform-aws-eks/tree/v17.1.0/examples/launch_templates_with_managed_node_groups
The text was updated successfully, but these errors were encountered: