Created
March 9, 2023 15:46
-
-
Save Rajaneeshs/3fc45748b6121aa20b6f44a0261fcc0e to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#terraform plan -destroy -refresh=true -no-color -var-file var.tfvars -out plan | |
Acquiring state lock. This may take a few moments... | |
data.terraform_remote_state.shared: Reading... | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.external_dns_policy[0]: Reading... | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cloudwatch-agent-policy[0]: Reading... | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cluster_autoscaler_policy: Reading... | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.external_dns_policy[0]: Read complete after 0s [id=*] | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.lb_controller_policy: Reading... | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cloudwatch-agent-policy[0]: Read complete after 0s [id=*] | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cluster_autoscaler_policy: Read complete after 0s [id=*] | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.lb_controller_policy: Read complete after 0s [id=*] | |
data.terraform_remote_state.shared: Read complete after 7s | |
data.aws_eks_cluster.default: Reading... | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cluster_autoscaler_assume_role_policy: Reading... | |
data.aws_eks_cluster_auth.default: Reading... | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cloudwatch_agent_assume_role_policy[0]: Reading... | |
data.aws_eks_cluster_auth.default: Read complete after 0s [id=*-*] | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cluster_autoscaler_assume_role_policy: Read complete after 0s [id=*] | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.lb_controller_assume_role_policy: Reading... | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.external_dns_assume_role_policy[0]: Reading... | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.lb_controller_assume_role_policy: Read complete after 0s [id=*] | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cloudwatch_agent_assume_role_policy[0]: Read complete after 0s [id=*] | |
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.external_dns_assume_role_policy[0]: Read complete after 0s [id=*] | |
module.iam_roles_for_serviceaccount.aws_iam_role.cluster_autoscaler[0]: Refreshing state... [id=*] | |
module.iam_roles_for_serviceaccount.aws_iam_role.cloudwatch_agent[0]: Refreshing state... [id=*] | |
module.iam_roles_for_serviceaccount.aws_iam_role.lb_controller[0]: Refreshing state... [id=*] | |
module.iam_roles_for_serviceaccount.aws_iam_role.external_dns[0]: Refreshing state... [id=*] | |
data.aws_eks_cluster.default: Read complete after 1s [id=ztnaaas-ac201416c990e418] | |
module.metrics_server.data.kubectl_path_documents.manifests: Reading... | |
module.metrics_server.data.kubectl_path_documents.manifests: Read complete after 0s [id=*] | |
module.metrics_server.kubectl_manifest.metrics_server[2]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/system:metrics-server] | |
module.metrics_server.kubectl_manifest.metrics_server[5]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:metrics-server] | |
module.metrics_server.kubectl_manifest.metrics_server[3]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/rolebindings/metrics-server-auth-reader] | |
module.metrics_server.kubectl_manifest.metrics_server[8]: Refreshing state... [id=/apis/apiregistration.k8s.io/v1/apiservices/v1beta1.metrics.k8s.io] | |
module.metrics_server.kubectl_manifest.metrics_server[6]: Refreshing state... [id=/api/v1/namespaces/kube-system/services/metrics-server] | |
module.metrics_server.kubectl_manifest.metrics_server[7]: Refreshing state... [id=/apis/apps/v1/namespaces/kube-system/deployments/metrics-server] | |
module.metrics_server.kubectl_manifest.metrics_server[1]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/system:aggregated-metrics-reader] | |
module.metrics_server.kubectl_manifest.metrics_server[4]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/metrics-server:system:auth-delegator] | |
module.metrics_server.kubectl_manifest.metrics_server[0]: Refreshing state... [id=/api/v1/namespaces/kube-system/serviceaccounts/metrics-server] | |
kubernetes_namespace.cwagent_namespace[0]: Refreshing state... [id=amazon-cloudwatch] | |
kubernetes_namespace.grafana_cloud_namespace[0]: Refreshing state... [id=grafana-cloud] | |
kubernetes_namespace.namespace: Refreshing state... [id=tigera-operator] | |
kubernetes_namespace.logz_io_namespace[0]: Refreshing state... [id=logz-io] | |
module.iam_roles_for_serviceaccount.aws_iam_role_policy.external_dns[0]: Refreshing state... [id=external-dns-eu-west-1:external-dns-eu-west-1] | |
module.iam_roles_for_serviceaccount.aws_iam_role_policy.lb_controller[0]: Refreshing state... [id=EksLbController-eu-west-1:lb_controller-eu-west-1] | |
module.iam_roles_for_serviceaccount.aws_iam_role_policy.cluster_autoscaler[0]: Refreshing state... [id=EksClusterAutoscaler-eu-west-1:cluster_autoscaler-eu-west-1] | |
module.iam_roles_for_serviceaccount.aws_iam_role_policy.cwagent_policy[0]: Refreshing state... [id=cwagent-eu-west-1:cloudwatch-agent-eu-west-1] | |
module.external_dns.data.kubectl_path_documents.manifests[0]: Reading... | |
module.external_dns.data.kubectl_path_documents.manifests[0]: Read complete after 0s [id=*] | |
module.lb_controller.kubectl_manifest.sa: Refreshing state... [id=/api/v1/namespaces/kube-system/serviceaccounts/aws-load-balancer-controller] | |
module.external_dns.kubectl_manifest.external_dns[3]: Refreshing state... [id=/apis/apps/v1/namespaces/kube-system/deployments/external-dns] | |
module.external_dns.kubectl_manifest.external_dns[0]: Refreshing state... [id=/api/v1/namespaces/kube-system/serviceaccounts/external-dns] | |
module.external_dns.kubectl_manifest.external_dns[1]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/external-dns] | |
module.external_dns.kubectl_manifest.external_dns[2]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/external-dns-viewer] | |
Releasing state lock. This may take a few moments... | |
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!! | |
Terraform crashed! This is always indicative of a bug within Terraform. | |
Please report the crash with Terraform[1] so that we can fix this. | |
When reporting bugs, please include your terraform version, the stack trace | |
shown below, and any additional information which may help replicate the issue. | |
[1]: https://github.com/hashicorp/terraform/issues | |
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!! | |
runtime error: invalid memory address or nil pointer dereference | |
goroutine 31 [running]: | |
runtime/debug.Stack() | |
/snap/go/10053/src/runtime/debug/stack.go:24 +0x64 | |
runtime/debug.PrintStack() | |
/snap/go/10053/src/runtime/debug/stack.go:16 +0x1c | |
github.com/hashicorp/terraform/internal/logging.PanicHandler() | |
/build/snapcraft-terraform-00d25aad70fc9371b21424630507d11c/parts/terraform/build/internal/logging/panic.go:55 +0x170 | |
panic({0x1cd2f00, 0x3a0a730}) | |
/snap/go/10053/src/runtime/panic.go:884 +0x20c | |
github.com/hashicorp/terraform/internal/plans.(*Plan).CanApply(0x0?) | |
/build/snapcraft-terraform-00d25aad70fc9371b21424630507d11c/parts/terraform/build/internal/plans/plan.go:100 +0x18 | |
github.com/hashicorp/terraform/internal/backend/local.(*Local).opPlan(0x4000a32fa0, {0x2663198, 0x400072f880}, {0x2663198, 0x400072f8c0}, 0x40007b7680, 0x400072e8c0) | |
/build/snapcraft-terraform-00d25aad70fc9371b21424630507d11c/parts/terraform/build/internal/backend/local/backend_plan.go:104 +0x4dc | |
github.com/hashicorp/terraform/internal/backend/local.(*Local).Operation.func1() | |
/build/snapcraft-terraform-00d25aad70fc9371b21424630507d11c/parts/terraform/build/internal/backend/local/backend.go:323 +0xd8 | |
created by github.com/hashicorp/terraform/internal/backend/local.(*Local).Operation | |
/build/snapcraft-terraform-00d25aad70fc9371b21424630507d11c/parts/terraform/build/internal/backend/local/backend.go:316 +0x444 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment