Skip to content

Instantly share code, notes, and snippets.

@Rajaneeshs
Created March 9, 2023 15:46
Show Gist options
  • Save Rajaneeshs/3fc45748b6121aa20b6f44a0261fcc0e to your computer and use it in GitHub Desktop.
Save Rajaneeshs/3fc45748b6121aa20b6f44a0261fcc0e to your computer and use it in GitHub Desktop.
#terraform plan -destroy -refresh=true -no-color -var-file var.tfvars -out plan
Acquiring state lock. This may take a few moments...
data.terraform_remote_state.shared: Reading...
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.external_dns_policy[0]: Reading...
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cloudwatch-agent-policy[0]: Reading...
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cluster_autoscaler_policy: Reading...
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.external_dns_policy[0]: Read complete after 0s [id=*]
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.lb_controller_policy: Reading...
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cloudwatch-agent-policy[0]: Read complete after 0s [id=*]
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cluster_autoscaler_policy: Read complete after 0s [id=*]
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.lb_controller_policy: Read complete after 0s [id=*]
data.terraform_remote_state.shared: Read complete after 7s
data.aws_eks_cluster.default: Reading...
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cluster_autoscaler_assume_role_policy: Reading...
data.aws_eks_cluster_auth.default: Reading...
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cloudwatch_agent_assume_role_policy[0]: Reading...
data.aws_eks_cluster_auth.default: Read complete after 0s [id=*-*]
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cluster_autoscaler_assume_role_policy: Read complete after 0s [id=*]
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.lb_controller_assume_role_policy: Reading...
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.external_dns_assume_role_policy[0]: Reading...
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.lb_controller_assume_role_policy: Read complete after 0s [id=*]
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.cloudwatch_agent_assume_role_policy[0]: Read complete after 0s [id=*]
module.iam_roles_for_serviceaccount.data.aws_iam_policy_document.external_dns_assume_role_policy[0]: Read complete after 0s [id=*]
module.iam_roles_for_serviceaccount.aws_iam_role.cluster_autoscaler[0]: Refreshing state... [id=*]
module.iam_roles_for_serviceaccount.aws_iam_role.cloudwatch_agent[0]: Refreshing state... [id=*]
module.iam_roles_for_serviceaccount.aws_iam_role.lb_controller[0]: Refreshing state... [id=*]
module.iam_roles_for_serviceaccount.aws_iam_role.external_dns[0]: Refreshing state... [id=*]
data.aws_eks_cluster.default: Read complete after 1s [id=ztnaaas-ac201416c990e418]
module.metrics_server.data.kubectl_path_documents.manifests: Reading...
module.metrics_server.data.kubectl_path_documents.manifests: Read complete after 0s [id=*]
module.metrics_server.kubectl_manifest.metrics_server[2]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/system:metrics-server]
module.metrics_server.kubectl_manifest.metrics_server[5]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:metrics-server]
module.metrics_server.kubectl_manifest.metrics_server[3]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/rolebindings/metrics-server-auth-reader]
module.metrics_server.kubectl_manifest.metrics_server[8]: Refreshing state... [id=/apis/apiregistration.k8s.io/v1/apiservices/v1beta1.metrics.k8s.io]
module.metrics_server.kubectl_manifest.metrics_server[6]: Refreshing state... [id=/api/v1/namespaces/kube-system/services/metrics-server]
module.metrics_server.kubectl_manifest.metrics_server[7]: Refreshing state... [id=/apis/apps/v1/namespaces/kube-system/deployments/metrics-server]
module.metrics_server.kubectl_manifest.metrics_server[1]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/system:aggregated-metrics-reader]
module.metrics_server.kubectl_manifest.metrics_server[4]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/metrics-server:system:auth-delegator]
module.metrics_server.kubectl_manifest.metrics_server[0]: Refreshing state... [id=/api/v1/namespaces/kube-system/serviceaccounts/metrics-server]
kubernetes_namespace.cwagent_namespace[0]: Refreshing state... [id=amazon-cloudwatch]
kubernetes_namespace.grafana_cloud_namespace[0]: Refreshing state... [id=grafana-cloud]
kubernetes_namespace.namespace: Refreshing state... [id=tigera-operator]
kubernetes_namespace.logz_io_namespace[0]: Refreshing state... [id=logz-io]
module.iam_roles_for_serviceaccount.aws_iam_role_policy.external_dns[0]: Refreshing state... [id=external-dns-eu-west-1:external-dns-eu-west-1]
module.iam_roles_for_serviceaccount.aws_iam_role_policy.lb_controller[0]: Refreshing state... [id=EksLbController-eu-west-1:lb_controller-eu-west-1]
module.iam_roles_for_serviceaccount.aws_iam_role_policy.cluster_autoscaler[0]: Refreshing state... [id=EksClusterAutoscaler-eu-west-1:cluster_autoscaler-eu-west-1]
module.iam_roles_for_serviceaccount.aws_iam_role_policy.cwagent_policy[0]: Refreshing state... [id=cwagent-eu-west-1:cloudwatch-agent-eu-west-1]
module.external_dns.data.kubectl_path_documents.manifests[0]: Reading...
module.external_dns.data.kubectl_path_documents.manifests[0]: Read complete after 0s [id=*]
module.lb_controller.kubectl_manifest.sa: Refreshing state... [id=/api/v1/namespaces/kube-system/serviceaccounts/aws-load-balancer-controller]
module.external_dns.kubectl_manifest.external_dns[3]: Refreshing state... [id=/apis/apps/v1/namespaces/kube-system/deployments/external-dns]
module.external_dns.kubectl_manifest.external_dns[0]: Refreshing state... [id=/api/v1/namespaces/kube-system/serviceaccounts/external-dns]
module.external_dns.kubectl_manifest.external_dns[1]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/external-dns]
module.external_dns.kubectl_manifest.external_dns[2]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/external-dns-viewer]
Releasing state lock. This may take a few moments...
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!
Terraform crashed! This is always indicative of a bug within Terraform.
Please report the crash with Terraform[1] so that we can fix this.
When reporting bugs, please include your terraform version, the stack trace
shown below, and any additional information which may help replicate the issue.
[1]: https://github.com/hashicorp/terraform/issues
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!
runtime error: invalid memory address or nil pointer dereference
goroutine 31 [running]:
runtime/debug.Stack()
/snap/go/10053/src/runtime/debug/stack.go:24 +0x64
runtime/debug.PrintStack()
/snap/go/10053/src/runtime/debug/stack.go:16 +0x1c
github.com/hashicorp/terraform/internal/logging.PanicHandler()
/build/snapcraft-terraform-00d25aad70fc9371b21424630507d11c/parts/terraform/build/internal/logging/panic.go:55 +0x170
panic({0x1cd2f00, 0x3a0a730})
/snap/go/10053/src/runtime/panic.go:884 +0x20c
github.com/hashicorp/terraform/internal/plans.(*Plan).CanApply(0x0?)
/build/snapcraft-terraform-00d25aad70fc9371b21424630507d11c/parts/terraform/build/internal/plans/plan.go:100 +0x18
github.com/hashicorp/terraform/internal/backend/local.(*Local).opPlan(0x4000a32fa0, {0x2663198, 0x400072f880}, {0x2663198, 0x400072f8c0}, 0x40007b7680, 0x400072e8c0)
/build/snapcraft-terraform-00d25aad70fc9371b21424630507d11c/parts/terraform/build/internal/backend/local/backend_plan.go:104 +0x4dc
github.com/hashicorp/terraform/internal/backend/local.(*Local).Operation.func1()
/build/snapcraft-terraform-00d25aad70fc9371b21424630507d11c/parts/terraform/build/internal/backend/local/backend.go:323 +0xd8
created by github.com/hashicorp/terraform/internal/backend/local.(*Local).Operation
/build/snapcraft-terraform-00d25aad70fc9371b21424630507d11c/parts/terraform/build/internal/backend/local/backend.go:316 +0x444
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment