Skip to content

Conversation

@ameukam
Copy link
Member

@ameukam ameukam commented Oct 23, 2025

Unused for more than 365 days and owners are no longer involved in the
project contribution

Signed-off-by: Arnaud Meukam [email protected]

Unused for more than 365 days and owners are no longer involved in the
project contribution

Signed-off-by: Arnaud Meukam <[email protected]>
Signed-off-by: Arnaud Meukam <[email protected]>
@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. area/infra Infrastructure management, infrastructure design, code in infra/ area/infra/aws Issues or PRs related to Kubernetes AWS infrastructure labels Oct 23, 2025
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: ameukam

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added sig/k8s-infra Categorizes an issue or PR as relevant to SIG K8s Infra. approved Indicates a PR has been approved by an approver from all required OWNERS files. labels Oct 23, 2025
@k8s-ci-robot k8s-ci-robot added the size/S Denotes a PR that changes 10-29 lines, ignoring generated files. label Oct 23, 2025
@ameukam
Copy link
Member Author

ameukam commented Oct 23, 2025

/label tide/merge-method-squash

@k8s-ci-robot k8s-ci-robot added the tide/merge-method-squash Denotes a PR that should be squashed by tide when it merges. label Oct 23, 2025
@k8s-infra-ci-robot

This comment has been minimized.

@ameukam
Copy link
Member Author

ameukam commented Oct 23, 2025

/hold
@upodroid looks like some resources are not pushed ?

@k8s-ci-robot k8s-ci-robot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Oct 23, 2025
@upodroid
Copy link
Member

yes, 8686 should fix it

@upodroid
Copy link
Member

atlantis unlock

@k8s-infra-ci-robot

This comment has been minimized.

@upodroid
Copy link
Member

atlantis plan

@k8s-infra-ci-robot
Copy link
Contributor

Ran Plan for dir: infra/aws/terraform/management-account workspace: default

Show Output
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
- destroy

Terraform will perform the following actions:

  # module.windows_operational_readiness.aws_organizations_account.this will be destroyed
  # (because aws_organizations_account.this is not in configuration)
- resource "aws_organizations_account" "this" {
      - arn                        = "arn:aws:organizations::348685125169:account/o-kz4vlkihvy/610906833592" -> null
      - close_on_deletion          = false -> null
      - create_govcloud            = false -> null
      - email                      = "[email protected]" -> null
      - iam_user_access_to_billing = "DENY" -> null
      - id                         = "610906833592" -> null
      - joined_method              = "CREATED" -> null
      - joined_timestamp           = "2023-09-20T17:05:40Z" -> null
      - name                       = "windows_operational_readiness" -> null
      - parent_id                  = "ou-unv1-0h3hebxm" -> null
      - status                     = "ACTIVE" -> null
      - tags                       = {
          - "group"      = "sig-windows"
          - "owners"     = "jayunit100"
          - "production" = "false"
        } -> null
      - tags_all                   = {
          - "group"      = "sig-windows"
          - "owners"     = "jayunit100"
          - "production" = "false"
        } -> null
        # (1 unchanged attribute hidden)
    }

  # module.windows_operational_readiness.aws_ssoadmin_account_assignment.this["aws-readonly.ReadOnlyAccess"] will be destroyed
  # (because aws_ssoadmin_account_assignment.this is not in configuration)
- resource "aws_ssoadmin_account_assignment" "this" {
      - id                 = "04882488-a021-7066-420c-a0255a95800e,GROUP,610906833592,AWS_ACCOUNT,arn:aws:sso:::permissionSet/ssoins-7223259e1ca869d2/ps-ba93849a881f98a6,arn:aws:sso:::instance/ssoins-7223259e1ca869d2" -> null
      - instance_arn       = "arn:aws:sso:::instance/ssoins-7223259e1ca869d2" -> null
      - permission_set_arn = "arn:aws:sso:::permissionSet/ssoins-7223259e1ca869d2/ps-ba93849a881f98a6" -> null
      - principal_id       = "04882488-a021-7066-420c-a0255a95800e" -> null
      - principal_type     = "GROUP" -> null
      - region             = "us-east-1" -> null
      - target_id          = "610906833592" -> null
      - target_type        = "AWS_ACCOUNT" -> null
    }

  # module.windows_operational_readiness.aws_ssoadmin_account_assignment.this["sig-k8s-infra-leads.AdministratorAccess"] will be destroyed
  # (because aws_ssoadmin_account_assignment.this is not in configuration)
- resource "aws_ssoadmin_account_assignment" "this" {
      - id                 = "246874d8-4001-705b-f43f-b9c52840da03,GROUP,610906833592,AWS_ACCOUNT,arn:aws:sso:::permissionSet/ssoins-7223259e1ca869d2/ps-ead9194c16498408,arn:aws:sso:::instance/ssoins-7223259e1ca869d2" -> null
      - instance_arn       = "arn:aws:sso:::instance/ssoins-7223259e1ca869d2" -> null
      - permission_set_arn = "arn:aws:sso:::permissionSet/ssoins-7223259e1ca869d2/ps-ead9194c16498408" -> null
      - principal_id       = "246874d8-4001-705b-f43f-b9c52840da03" -> null
      - principal_type     = "GROUP" -> null
      - region             = "us-east-1" -> null
      - target_id          = "610906833592" -> null
      - target_type        = "AWS_ACCOUNT" -> null
    }

Plan: 0 to add, 0 to change, 3 to destroy.
  • ▶️ To apply this plan, comment:
    atlantis apply -d infra/aws/terraform/management-account
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -d infra/aws/terraform/management-account

Plan: 0 to add, 0 to change, 3 to destroy.
🔀 Upstream was modified, a new merge was performed.


  • ⏩ To apply all unapplied plans from this Pull Request, comment:
    atlantis apply
  • 🚮 To delete all plans and locks from this Pull Request, comment:
    atlantis unlock

@upodroid
Copy link
Member

atlantis apply

@k8s-infra-ci-robot
Copy link
Contributor

Ran Apply for dir: infra/aws/terraform/management-account workspace: default

Apply Error

Show Output
running 'sh -c' '/atlantis/bin/terraform1.13.4 apply -input=false "/atlantis/repos/kubernetes/k8s.io/8685/default/infra/aws/terraform/management-account/default.tfplan"' in '/atlantis/repos/kubernetes/k8s.io/8685/default/infra/aws/terraform/management-account': exit status 1
module.windows_operational_readiness.aws_ssoadmin_account_assignment.this["sig-k8s-infra-leads.AdministratorAccess"]: Destroying... [id=246874d8-4001-705b-f43f-b9c52840da03,GROUP,610906833592,AWS_ACCOUNT,arn:aws:sso:::permissionSet/ssoins-7223259e1ca869d2/ps-ead9194c16498408,arn:aws:sso:::instance/ssoins-7223259e1ca869d2]
module.windows_operational_readiness.aws_ssoadmin_account_assignment.this["aws-readonly.ReadOnlyAccess"]: Destroying... [id=04882488-a021-7066-420c-a0255a95800e,GROUP,610906833592,AWS_ACCOUNT,arn:aws:sso:::permissionSet/ssoins-7223259e1ca869d2/ps-ba93849a881f98a6,arn:aws:sso:::instance/ssoins-7223259e1ca869d2]
module.windows_operational_readiness.aws_ssoadmin_account_assignment.this["sig-k8s-infra-leads.AdministratorAccess"]: Still destroying... [id=246874d8-4001-705b-f43f-b9c52840da03,GR...sso:::instance/ssoins-7223259e1ca869d2, 00m10s elapsed]
module.windows_operational_readiness.aws_ssoadmin_account_assignment.this["aws-readonly.ReadOnlyAccess"]: Still destroying... [id=04882488-a021-7066-420c-a0255a95800e,GR...sso:::instance/ssoins-7223259e1ca869d2, 00m10s elapsed]
module.windows_operational_readiness.aws_ssoadmin_account_assignment.this["sig-k8s-infra-leads.AdministratorAccess"]: Destruction complete after 10s
module.windows_operational_readiness.aws_ssoadmin_account_assignment.this["aws-readonly.ReadOnlyAccess"]: Destruction complete after 10s
module.windows_operational_readiness.aws_organizations_account.this: Destroying... [id=610906833592]
╷
│ Error: deleting AWS Organizations Account (610906833592): operation error Organizations: RemoveAccountFromOrganization, https response error StatusCode: 400, RequestID: 67030c65-a006-411a-8e54-1f266f0577b2, ConstraintViolationException: The member account is missing one or more of the prerequisites required to operate as a standalone account. To add what is missing, sign-in to the member account using the AWS Organizations console, then select to leave the organization. You will then be prompted to enter any missing information.
│ 
│ 
╵

@upodroid
Copy link
Member

I'll delete the account via the console.

@upodroid upodroid merged commit e1793e4 into kubernetes:main Oct 26, 2025
5 of 8 checks passed
@k8s-ci-robot k8s-ci-robot added this to the v1.35 milestone Oct 26, 2025
@k8s-infra-ci-robot
Copy link
Contributor

Locks and plans deleted for the projects and workspaces modified in this pull request:

  • dir: infra/aws/terraform/management-account workspace: default

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. area/infra/aws Issues or PRs related to Kubernetes AWS infrastructure area/infra Infrastructure management, infrastructure design, code in infra/ cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. sig/k8s-infra Categorizes an issue or PR as relevant to SIG K8s Infra. size/S Denotes a PR that changes 10-29 lines, ignoring generated files. tide/merge-method-squash Denotes a PR that should be squashed by tide when it merges.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants