diff --git a/cli/internal/terraform/terraform/aws/main.tf b/cli/internal/terraform/terraform/aws/main.tf index 303410bd0..859eca45d 100644 --- a/cli/internal/terraform/terraform/aws/main.tf +++ b/cli/internal/terraform/terraform/aws/main.tf @@ -74,6 +74,8 @@ module "public_private_subnet" { zone = var.zone zones = local.zones tags = local.tags + depends_on = [aws_vpc.vpc] + } resource "aws_eip" "lb" { @@ -81,9 +83,10 @@ resource "aws_eip" "lb" { # in a future version to support all availability zones in the chosen region # This should only be done after we migrated to DNS-based addressing for the # control-plane. - for_each = toset([var.zone]) - domain = "vpc" - tags = local.tags + for_each = toset([var.zone]) + domain = "vpc" + tags = local.tags + depends_on = [aws_vpc.vpc] } resource "aws_lb" "front_end" { @@ -196,6 +199,7 @@ module "load_balancer_target_bootstrapper" { port = local.ports_bootstrapper tags = local.tags healthcheck_protocol = "TCP" + depends_on = [aws_vpc.vpc] } module "load_balancer_target_kubernetes" { @@ -207,6 +211,7 @@ module "load_balancer_target_kubernetes" { tags = local.tags healthcheck_protocol = "HTTPS" healthcheck_path = "/readyz" + depends_on = [aws_vpc.vpc] } module "load_balancer_target_verify" { @@ -217,6 +222,7 @@ module "load_balancer_target_verify" { port = local.ports_verify tags = local.tags healthcheck_protocol = "TCP" + depends_on = [aws_vpc.vpc] } module "load_balancer_target_recovery" { @@ -227,6 +233,7 @@ module "load_balancer_target_recovery" { port = local.ports_recovery tags = local.tags healthcheck_protocol = "TCP" + depends_on = [aws_vpc.vpc] } module "load_balancer_target_debugd" { @@ -238,6 +245,7 @@ module "load_balancer_target_debugd" { port = local.ports_debugd tags = local.tags healthcheck_protocol = "TCP" + depends_on = [aws_vpc.vpc] } module "load_balancer_target_konnectivity" { @@ -248,6 +256,7 @@ module "load_balancer_target_konnectivity" { port = local.ports_konnectivity tags = local.tags healthcheck_protocol = "TCP" + depends_on = [aws_vpc.vpc] } module "instance_group" {