Skip to content

Instantly share code, notes, and snippets.

@anxiousmodernman
Created December 8, 2016 03:02
Show Gist options
  • Save anxiousmodernman/04467ac64dbaeeea067bc10a9d7c7d11 to your computer and use it in GitHub Desktop.
Save anxiousmodernman/04467ac64dbaeeea067bc10a9d7c7d11 to your computer and use it in GitHub Desktop.
terraform-error-1481165731.log
5 error(s) occurred:
* plan operation: Real and shadow states do not match! Real state:
<no state>
module.child:
<no state>
Outputs:
received = 1GB
module.instances:
aws_eip.zk.0:
ID = eipalloc-3eb04400
association_id = eipassoc-b5def18a
domain = vpc
instance = 74D93920-ED26-11E3-AC10-0800200C9A66
network_interface = eni-a3aae15d
private_ip = 10.0.1.231
public_ip = 34.194.147.231
vpc = true
Dependencies:
aws_instance.zk_node
aws_instance.priv_networktest:
ID = i-6ec81f79
ami = ami-02417f15
associate_public_ip_address = false
availability_zone = us-east-1b
disable_api_termination = false
ebs_block_device.# = 0
ebs_optimized = false
ephemeral_block_device.# = 0
iam_instance_profile =
instance_state = running
instance_type = t2.micro
key_name = test-infrastructure
monitoring = false
network_interface_id = eni-bba9e245
private_dns = ip-10-0-1-46.ec2.internal
private_ip = 10.0.1.46
public_dns =
public_ip =
root_block_device.# = 1
root_block_device.0.delete_on_termination = true
root_block_device.0.iops = 100
root_block_device.0.volume_size = 8
root_block_device.0.volume_type = gp2
security_groups.# = 0
source_dest_check = true
subnet_id = subnet-7d992750
tags.% = 1
tags.Name = priv_networktest
tenancy = default
vpc_security_group_ids.# = 1
vpc_security_group_ids.699898438 = sg-f7470d8a
Dependencies:
aws_security_group.pub_networktest_sg
aws_instance.pub_networktest:
ID = i-69c81f7e
ami = ami-02417f15
associate_public_ip_address = true
availability_zone = us-east-1b
disable_api_termination = false
ebs_block_device.# = 0
ebs_optimized = false
ephemeral_block_device.# = 0
iam_instance_profile =
instance_state = running
instance_type = t2.micro
key_name = test-infrastructure
monitoring = false
network_interface_id = eni-8fade671
private_dns = ip-10-0-0-61.ec2.internal
private_ip = 10.0.0.61
public_dns = ec2-54-90-79-184.compute-1.amazonaws.com
public_ip = 54.90.79.184
root_block_device.# = 1
root_block_device.0.delete_on_termination = true
root_block_device.0.iops = 100
root_block_device.0.volume_size = 8
root_block_device.0.volume_type = gp2
security_groups.# = 0
source_dest_check = true
subnet_id = subnet-6299274f
tags.% = 1
tags.Name = pub_networktest
tenancy = default
vpc_security_group_ids.# = 1
vpc_security_group_ids.699898438 = sg-f7470d8a
Dependencies:
aws_security_group.pub_networktest_sg
aws_instance.pub_odrive:
ID = i-c634fdd1
ami = ami-bcd0d7ab
associate_public_ip_address = true
availability_zone = us-east-1b
disable_api_termination = false
ebs_block_device.# = 0
ebs_optimized = false
ephemeral_block_device.# = 0
iam_instance_profile =
instance_state = running
instance_type = t2.micro
key_name = test-infrastructure
monitoring = false
network_interface_id = eni-118df1ef
private_dns = ip-10-0-0-22.ec2.internal
private_ip = 10.0.0.22
public_dns = ec2-107-21-158-0.compute-1.amazonaws.com
public_ip = 107.21.158.0
root_block_device.# = 1
root_block_device.0.delete_on_termination = false
root_block_device.0.iops = 0
root_block_device.0.volume_size = 8
root_block_device.0.volume_type = standard
security_groups.# = 0
source_dest_check = true
subnet_id = subnet-6299274f
tags.% = 1
tags.Name = pub_odrive
tenancy = default
vpc_security_group_ids.# = 1
vpc_security_group_ids.1135247480 = sg-185e1d65
Dependencies:
aws_security_group.odrive_microservices_sg
aws_instance.zk_node.0:
ID = i-68c81f7f
ami = ami-97a7a180
associate_public_ip_address = true
availability_zone = us-east-1b
disable_api_termination = false
ebs_block_device.# = 0
ebs_optimized = false
ephemeral_block_device.# = 0
iam_instance_profile =
instance_state = running
instance_type = t2.micro
key_name = test-infrastructure
monitoring = false
network_interface_id = eni-a3aae15d
private_dns = ip-10-0-1-231.ec2.internal
private_ip = 10.0.1.231
public_dns = ec2-34-194-147-231.compute-1.amazonaws.com
public_ip = 34.194.147.231
root_block_device.# = 1
root_block_device.0.delete_on_termination = true
root_block_device.0.iops = 100
root_block_device.0.volume_size = 8
root_block_device.0.volume_type = gp2
security_groups.# = 0
source_dest_check = true
subnet_id = subnet-7d992750
tags.% = 1
tags.Name = zk_node
tenancy = default
vpc_security_group_ids.# = 1
vpc_security_group_ids.2112837917 = sg-f4470d89
Dependencies:
aws_security_group.zk_sg
aws_security_group.odrive_microservices_sg:
ID = sg-185e1d65
description = Required open ports for object-drive and other microservices
egress.# = 1
egress.482069346.cidr_blocks.# = 1
egress.482069346.cidr_blocks.0 = 0.0.0.0/0
egress.482069346.from_port = 0
egress.482069346.prefix_list_ids.# = 0
egress.482069346.protocol = -1
egress.482069346.security_groups.# = 0
egress.482069346.self = false
egress.482069346.to_port = 0
ingress.# = 5
ingress.1203902316.cidr_blocks.# = 1
ingress.1203902316.cidr_blocks.0 = 0.0.0.0/0
ingress.1203902316.from_port = 4430
ingress.1203902316.protocol = tcp
ingress.1203902316.security_groups.# = 0
ingress.1203902316.self = false
ingress.1203902316.to_port = 4430
ingress.1799340084.cidr_blocks.# = 1
ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
ingress.1799340084.from_port = -1
ingress.1799340084.protocol = icmp
ingress.1799340084.security_groups.# = 0
ingress.1799340084.self = false
ingress.1799340084.to_port = -1
ingress.2172623744.cidr_blocks.# = 1
ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0
ingress.2172623744.from_port = 9999
ingress.2172623744.protocol = tcp
ingress.2172623744.security_groups.# = 0
ingress.2172623744.self = false
ingress.2172623744.to_port = 9999
ingress.2541437006.cidr_blocks.# = 1
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
ingress.2541437006.from_port = 22
ingress.2541437006.protocol = tcp
ingress.2541437006.security_groups.# = 0
ingress.2541437006.self = false
ingress.2541437006.to_port = 22
ingress.2617001939.cidr_blocks.# = 1
ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0
ingress.2617001939.from_port = 443
ingress.2617001939.protocol = tcp
ingress.2617001939.security_groups.# = 0
ingress.2617001939.self = false
ingress.2617001939.to_port = 443
name = odrive_microservices_sg
owner_id = 706634194319
tags.% = 1
tags.Name = odrive_sg
vpc_id = vpc-50fe0336
aws_security_group.pub_networktest_sg:
ID = sg-f7470d8a
description = Allow traffic to pass from the private subnet to the internet
egress.# = 1
egress.482069346.cidr_blocks.# = 1
egress.482069346.cidr_blocks.0 = 0.0.0.0/0
egress.482069346.from_port = 0
egress.482069346.prefix_list_ids.# = 0
egress.482069346.protocol = -1
egress.482069346.security_groups.# = 0
egress.482069346.self = false
egress.482069346.to_port = 0
ingress.# = 6
ingress.1799340084.cidr_blocks.# = 1
ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
ingress.1799340084.from_port = -1
ingress.1799340084.protocol = icmp
ingress.1799340084.security_groups.# = 0
ingress.1799340084.self = false
ingress.1799340084.to_port = -1
ingress.2172623744.cidr_blocks.# = 1
ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0
ingress.2172623744.from_port = 9999
ingress.2172623744.protocol = tcp
ingress.2172623744.security_groups.# = 0
ingress.2172623744.self = false
ingress.2172623744.to_port = 9999
ingress.2214680975.cidr_blocks.# = 1
ingress.2214680975.cidr_blocks.0 = 0.0.0.0/0
ingress.2214680975.from_port = 80
ingress.2214680975.protocol = tcp
ingress.2214680975.security_groups.# = 0
ingress.2214680975.self = false
ingress.2214680975.to_port = 80
ingress.2541437006.cidr_blocks.# = 1
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
ingress.2541437006.from_port = 22
ingress.2541437006.protocol = tcp
ingress.2541437006.security_groups.# = 0
ingress.2541437006.self = false
ingress.2541437006.to_port = 22
ingress.2617001939.cidr_blocks.# = 1
ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0
ingress.2617001939.from_port = 443
ingress.2617001939.protocol = tcp
ingress.2617001939.security_groups.# = 0
ingress.2617001939.self = false
ingress.2617001939.to_port = 443
ingress.516175195.cidr_blocks.# = 1
ingress.516175195.cidr_blocks.0 = 0.0.0.0/0
ingress.516175195.from_port = 8080
ingress.516175195.protocol = tcp
ingress.516175195.security_groups.# = 0
ingress.516175195.self = false
ingress.516175195.to_port = 8080
name = pub_networktest_sg
owner_id = 706634194319
tags.% = 1
tags.Name = terraform
vpc_id = vpc-50fe0336
aws_security_group.zk_sg:
ID = sg-f4470d89
description = Zookeeper ports
egress.# = 1
egress.482069346.cidr_blocks.# = 1
egress.482069346.cidr_blocks.0 = 0.0.0.0/0
egress.482069346.from_port = 0
egress.482069346.prefix_list_ids.# = 0
egress.482069346.protocol = -1
egress.482069346.security_groups.# = 0
egress.482069346.self = false
egress.482069346.to_port = 0
ingress.# = 3
ingress.1799340084.cidr_blocks.# = 1
ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
ingress.1799340084.from_port = -1
ingress.1799340084.protocol = icmp
ingress.1799340084.security_groups.# = 0
ingress.1799340084.self = false
ingress.1799340084.to_port = -1
ingress.2541437006.cidr_blocks.# = 1
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
ingress.2541437006.from_port = 22
ingress.2541437006.protocol = tcp
ingress.2541437006.security_groups.# = 0
ingress.2541437006.self = false
ingress.2541437006.to_port = 22
ingress.4023360382.cidr_blocks.# = 1
ingress.4023360382.cidr_blocks.0 = 10.0.0.0/16
ingress.4023360382.from_port = 2181
ingress.4023360382.protocol = tcp
ingress.4023360382.security_groups.# = 0
ingress.4023360382.self = false
ingress.4023360382.to_port = 2181
name = zk_sg
owner_id = 706634194319
tags.% = 1
tags.Name = zk_sg
vpc_id = vpc-50fe0336
Outputs:
odrive_microservices_sg = sg-185e1d65
pub_networktest_sg = sg-f7470d8a
zk_sg = sg-f4470d89
module.rds:
aws_db_instance.odrive:
ID = tf-20161207154908631239504b4t
address = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com
allocated_storage = 10
apply_immediately = true
arn = arn:aws:rds:us-east-1:706634194319:db:tf-20161207154908631239504b4t
auto_minor_version_upgrade = true
availability_zone = us-east-1b
backup_retention_period = 0
backup_window = 07:37-08:07
copy_tags_to_snapshot = false
db_subnet_group_name = main
endpoint = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com:3306
engine = mysql
engine_version = 5.6.27
hosted_zone_id = Z2R2ITUGPM61AM
identifier = tf-20161207154908631239504b4t
instance_class = db.t2.micro
iops = 0
kms_key_id =
license_model = general-public-license
maintenance_window = mon:10:19-mon:10:49
monitoring_interval = 0
multi_az = false
name = metadatadb
option_group_name = default:mysql-5-6
parameter_group_name = odrive-pg
password = dbRootPassword
port = 3306
publicly_accessible = true
replicas.# = 0
replicate_source_db =
security_group_names.# = 0
skip_final_snapshot = true
status = available
storage_encrypted = false
storage_type = standard
tags.% = 0
username = dbRootUser
vpc_security_group_ids.# = 1
vpc_security_group_ids.955802421 = sg-76b5ca0b
Dependencies:
aws_db_subnet_group.main
aws_db_parameter_group.odrive_pg
aws_db_parameter_group.odrive_pg:
ID = odrive-pg
arn = arn:aws:rds:us-east-1:706634194319:pg:odrive-pg
description = Custom Parameter Group for Object Drive
family = mysql5.6
name = odrive-pg
parameter.# = 1
parameter.950177639.apply_method = immediate
parameter.950177639.name = log_bin_trust_function_creators
parameter.950177639.value = 1
tags.% = 0
aws_db_subnet_group.main:
ID = main
arn = arn:aws:rds:us-east-1:706634194319:subgrp:main
description = Managed by Terraform
name = main
subnet_ids.# = 3
subnet_ids.2727810170 = subnet-72bac73b
subnet_ids.741755728 = subnet-7d992750
subnet_ids.998920899 = subnet-6299274f
tags.% = 1
tags.Name = terraform_db_subnet_group
module.vpc:
aws_eip.nat:
ID = eipalloc-c15748fe
association_id = eipassoc-56c7e869
domain = vpc
instance = 74D93920-ED26-11E3-AC10-0800200C9A66
network_interface = eni-73c78c8d
private_ip = 10.0.0.34
public_ip = 34.193.25.59
vpc = true
Dependencies:
aws_instance.nat
aws_instance.nat:
ID = i-e8fe29ff
ami = ami-0dd7e61a
associate_public_ip_address = true
availability_zone = us-east-1b
disable_api_termination = false
ebs_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
ebs_optimized = false
ephemeral_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
iam_instance_profile =
instance_state = 74D93920-ED26-11E3-AC10-0800200C9A66
instance_type = t2.small
key_name = test-infrastructure
monitoring = false
network_interface_id = 74D93920-ED26-11E3-AC10-0800200C9A66
placement_group = 74D93920-ED26-11E3-AC10-0800200C9A66
private_dns = 74D93920-ED26-11E3-AC10-0800200C9A66
private_ip = 74D93920-ED26-11E3-AC10-0800200C9A66
public_dns = 74D93920-ED26-11E3-AC10-0800200C9A66
public_ip = 74D93920-ED26-11E3-AC10-0800200C9A66
root_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
root_block_device.0.delete_on_termination = true
root_block_device.0.iops = 100
root_block_device.0.volume_size = 8
root_block_device.0.volume_type = gp2
security_groups.# = 2
security_groups.2513725979 = sg-79119b04
security_groups.955802421 = sg-76b5ca0b
source_dest_check = false
subnet_id = subnet-6299274f
tags.% = 1
tags.Name = terraform_nat_instance
tenancy = 74D93920-ED26-11E3-AC10-0800200C9A66
vpc_security_group_ids.# = 74D93920-ED26-11E3-AC10-0800200C9A66
vpc_security_group_ids.2513725979 = sg-79119b04
vpc_security_group_ids.955802421 = sg-76b5ca0b
Dependencies:
aws_security_group.rds_mysql_sg
aws_subnet.decipher_public
aws_security_group.nat
aws_internet_gateway.default:
ID = igw-51883236
tags.% = 1
tags.Name = terraform_igw
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_route_table.decipher_private:
ID = rtb-6afddf0c
propagating_vgws.# = 0
route.# = 1
route.~2469360411.cidr_block = 0.0.0.0/0
route.~2469360411.gateway_id =
route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66
route.~2469360411.nat_gateway_id =
route.~2469360411.network_interface_id =
route.~2469360411.vpc_peering_connection_id =
tags.% = 1
tags.Name = terraform_private_subnet_route_table
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_instance.nat
aws_route_table.decipher_private_2:
ID = rtb-56a39130
propagating_vgws.# = 0
route.# = 1
route.~2469360411.cidr_block = 0.0.0.0/0
route.~2469360411.gateway_id =
route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66
route.~2469360411.nat_gateway_id =
route.~2469360411.network_interface_id =
route.~2469360411.vpc_peering_connection_id =
tags.% = 1
tags.Name = terraform_private_subnet_2_route_table
vpc_id = vpc-50fe0336
Dependencies:
aws_instance.nat
aws_vpc.default
aws_route_table.decipher_public:
ID = rtb-8efedce8
propagating_vgws.# = 0
route.# = 1
route.3761165403.cidr_block = 0.0.0.0/0
route.3761165403.gateway_id = igw-51883236
route.3761165403.instance_id =
route.3761165403.nat_gateway_id =
route.3761165403.network_interface_id =
route.3761165403.vpc_peering_connection_id =
tags.% = 1
tags.Name = terraform_public_subnet_route_table
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_internet_gateway.default
aws_route_table_association.decipher_private:
ID = rtbassoc-b8c0f5c1
route_table_id = rtb-6afddf0c
subnet_id = subnet-7d992750
Dependencies:
aws_subnet.decipher_private
aws_route_table.decipher_private
aws_route_table_association.decipher_private_2:
ID = rtbassoc-c0e4e5b9
route_table_id = rtb-56a39130
subnet_id = subnet-72bac73b
Dependencies:
aws_route_table.decipher_private_2
aws_subnet.decipher_private_2
aws_route_table_association.decipher_public:
ID = rtbassoc-29c6f350
route_table_id = rtb-8efedce8
subnet_id = subnet-6299274f
Dependencies:
aws_subnet.decipher_public
aws_route_table.decipher_public
aws_security_group.bastion_ssh_sg:
ID = sg-78119b05
description = Allow SSH to Bastion host from approved ranges
egress.# = 1
egress.482069346.cidr_blocks.# = 1
egress.482069346.cidr_blocks.0 = 0.0.0.0/0
egress.482069346.from_port = 0
egress.482069346.prefix_list_ids.# = 0
egress.482069346.protocol = -1
egress.482069346.security_groups.# = 0
egress.482069346.self = false
egress.482069346.to_port = 0
ingress.# = 1
ingress.2541437006.cidr_blocks.# = 1
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
ingress.2541437006.from_port = 22
ingress.2541437006.protocol = tcp
ingress.2541437006.security_groups.# = 0
ingress.2541437006.self = false
ingress.2541437006.to_port = 22
name = bastion_ssh
owner_id = 706634194319
tags.% = 1
tags.Name = terraform_bastion_ssh
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_security_group.nat:
ID = sg-79119b04
description = Allow traffic to pass from the private subnet to the internet
egress.# = 1
egress.482069346.cidr_blocks.# = 1
egress.482069346.cidr_blocks.0 = 0.0.0.0/0
egress.482069346.from_port = 0
egress.482069346.prefix_list_ids.# = 0
egress.482069346.protocol = -1
egress.482069346.security_groups.# = 0
egress.482069346.self = false
egress.482069346.to_port = 0
ingress.# = 3
ingress.2582209309.cidr_blocks.# = 1
ingress.2582209309.cidr_blocks.0 = 10.0.1.0/24
ingress.2582209309.from_port = -1
ingress.2582209309.protocol = icmp
ingress.2582209309.security_groups.# = 0
ingress.2582209309.self = false
ingress.2582209309.to_port = -1
ingress.386650288.cidr_blocks.# = 1
ingress.386650288.cidr_blocks.0 = 10.0.1.0/24
ingress.386650288.from_port = 80
ingress.386650288.protocol = tcp
ingress.386650288.security_groups.# = 0
ingress.386650288.self = false
ingress.386650288.to_port = 80
ingress.4211794038.cidr_blocks.# = 1
ingress.4211794038.cidr_blocks.0 = 10.0.1.0/24
ingress.4211794038.from_port = 443
ingress.4211794038.protocol = tcp
ingress.4211794038.security_groups.# = 0
ingress.4211794038.self = false
ingress.4211794038.to_port = 443
name = vpc_nat
owner_id = 706634194319
tags.% = 1
tags.Name = terraform
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_security_group.rds_mysql_sg:
ID = sg-76b5ca0b
description = Allow traffic to pass from internet to RDS MySQL
egress.# = 1
egress.482069346.cidr_blocks.# = 1
egress.482069346.cidr_blocks.0 = 0.0.0.0/0
egress.482069346.from_port = 0
egress.482069346.prefix_list_ids.# = 0
egress.482069346.protocol = -1
egress.482069346.security_groups.# = 0
egress.482069346.self = false
egress.482069346.to_port = 0
ingress.# = 1
ingress.1163740523.cidr_blocks.# = 1
ingress.1163740523.cidr_blocks.0 = 0.0.0.0/0
ingress.1163740523.from_port = 3306
ingress.1163740523.protocol = tcp
ingress.1163740523.security_groups.# = 0
ingress.1163740523.self = false
ingress.1163740523.to_port = 3306
name = rds_mysql
owner_id = 706634194319
tags.% = 1
tags.Name = terraform
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_security_group.ssh_from_bastion_sg:
ID = sg-72119b0f
description = Allow SSH from Bastion host(s)
egress.# = 0
ingress.# = 1
ingress.3517505807.cidr_blocks.# = 0
ingress.3517505807.from_port = 22
ingress.3517505807.protocol = tcp
ingress.3517505807.security_groups.# = 2
ingress.3517505807.security_groups.1151619385 = sg-78119b05
ingress.3517505807.security_groups.2513725979 = sg-79119b04
ingress.3517505807.self = false
ingress.3517505807.to_port = 22
name = ssh_from_bastion
owner_id = 706634194319
tags.% = 1
tags.Name = terraform_ssh_from_bastion
vpc_id = vpc-50fe0336
Dependencies:
aws_security_group.bastion_ssh_sg
aws_security_group.nat
aws_vpc.default
aws_security_group.web_access_from_nat_sg:
ID = sg-70119b0d
description = Allow web access to the private subnet from the public subnet (via NAT instance)
egress.# = 1
egress.482069346.cidr_blocks.# = 1
egress.482069346.cidr_blocks.0 = 0.0.0.0/0
egress.482069346.from_port = 0
egress.482069346.prefix_list_ids.# = 0
egress.482069346.protocol = -1
egress.482069346.security_groups.# = 0
egress.482069346.self = false
egress.482069346.to_port = 0
ingress.# = 3
ingress.1067346089.cidr_blocks.# = 1
ingress.1067346089.cidr_blocks.0 = 10.0.0.0/24
ingress.1067346089.from_port = -1
ingress.1067346089.protocol = icmp
ingress.1067346089.security_groups.# = 0
ingress.1067346089.self = false
ingress.1067346089.to_port = -1
ingress.1568533442.cidr_blocks.# = 1
ingress.1568533442.cidr_blocks.0 = 10.0.0.0/24
ingress.1568533442.from_port = 443
ingress.1568533442.protocol = tcp
ingress.1568533442.security_groups.# = 0
ingress.1568533442.self = false
ingress.1568533442.to_port = 443
ingress.2977749764.cidr_blocks.# = 1
ingress.2977749764.cidr_blocks.0 = 10.0.0.0/24
ingress.2977749764.from_port = 80
ingress.2977749764.protocol = tcp
ingress.2977749764.security_groups.# = 0
ingress.2977749764.self = false
ingress.2977749764.to_port = 80
name = private_subnet_web_access
owner_id = 706634194319
tags.% = 1
tags.Name = terraform
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_subnet.decipher_public
aws_subnet.decipher_private:
ID = subnet-7d992750
availability_zone = us-east-1b
cidr_block = 10.0.1.0/24
map_public_ip_on_launch = false
tags.% = 1
tags.Name = terraform_private_subnet
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_subnet.decipher_private_2:
ID = subnet-72bac73b
availability_zone = us-east-1c
cidr_block = 10.0.2.0/24
map_public_ip_on_launch = false
tags.% = 1
tags.Name = terraform_private_subnet_2
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_subnet.decipher_public:
ID = subnet-6299274f
availability_zone = us-east-1b
cidr_block = 10.0.0.0/24
map_public_ip_on_launch = false
tags.% = 1
tags.Name = terraform_public_subnet
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_vpc.default:
ID = vpc-50fe0336
cidr_block = 10.0.0.0/16
default_network_acl_id = acl-c18d31a7
default_route_table_id = rtb-82fedce4
default_security_group_id = sg-7d119b00
dhcp_options_id = dopt-857b9be0
enable_classiclink = false
enable_dns_hostnames = true
enable_dns_support = true
instance_tenancy = default
main_route_table_id = rtb-82fedce4
tags.% = 1
tags.Name = terraform_vpc
Outputs:
bastion_ssh_sg_id = sg-78119b05
nat_sg_id = sg-79119b04
private_subnet_2_id = subnet-72bac73b
private_subnet_id = subnet-7d992750
public_subnet_id = subnet-6299274f
rds_mysql_sg = sg-76b5ca0b
ssh_from_bastion_sg_id = sg-72119b0f
vpc_id = vpc-50fe0336
web_access_from_nat_sg_id = sg-70119b0d
Shadow state:
<no state>
module.child:
<no state>
Outputs:
received = 1GB
module.instances:
aws_eip.zk.0:
ID = eipalloc-3eb04400
association_id = eipassoc-b5def18a
domain = vpc
instance = i-68c81f7f
network_interface = eni-a3aae15d
private_ip = 10.0.1.231
public_ip = 34.194.147.231
vpc = true
Dependencies:
aws_instance.zk_node
aws_instance.priv_networktest:
ID = i-6ec81f79
ami = ami-02417f15
associate_public_ip_address = false
availability_zone = us-east-1b
disable_api_termination = false
ebs_block_device.# = 0
ebs_optimized = false
ephemeral_block_device.# = 0
iam_instance_profile =
instance_state = running
instance_type = t2.micro
key_name = test-infrastructure
monitoring = false
network_interface_id = eni-bba9e245
private_dns = ip-10-0-1-46.ec2.internal
private_ip = 10.0.1.46
public_dns =
public_ip =
root_block_device.# = 1
root_block_device.0.delete_on_termination = true
root_block_device.0.iops = 100
root_block_device.0.volume_size = 8
root_block_device.0.volume_type = gp2
security_groups.# = 0
source_dest_check = true
subnet_id = subnet-7d992750
tags.% = 1
tags.Name = priv_networktest
tenancy = default
vpc_security_group_ids.# = 1
vpc_security_group_ids.699898438 = sg-f7470d8a
Dependencies:
aws_security_group.pub_networktest_sg
aws_instance.pub_networktest:
ID = i-69c81f7e
ami = ami-02417f15
associate_public_ip_address = true
availability_zone = us-east-1b
disable_api_termination = false
ebs_block_device.# = 0
ebs_optimized = false
ephemeral_block_device.# = 0
iam_instance_profile =
instance_state = running
instance_type = t2.micro
key_name = test-infrastructure
monitoring = false
network_interface_id = eni-8fade671
private_dns = ip-10-0-0-61.ec2.internal
private_ip = 10.0.0.61
public_dns = ec2-54-90-79-184.compute-1.amazonaws.com
public_ip = 54.90.79.184
root_block_device.# = 1
root_block_device.0.delete_on_termination = true
root_block_device.0.iops = 100
root_block_device.0.volume_size = 8
root_block_device.0.volume_type = gp2
security_groups.# = 0
source_dest_check = true
subnet_id = subnet-6299274f
tags.% = 1
tags.Name = pub_networktest
tenancy = default
vpc_security_group_ids.# = 1
vpc_security_group_ids.699898438 = sg-f7470d8a
Dependencies:
aws_security_group.pub_networktest_sg
aws_instance.pub_odrive:
ID = i-c634fdd1
ami = ami-bcd0d7ab
associate_public_ip_address = true
availability_zone = us-east-1b
disable_api_termination = false
ebs_block_device.# = 0
ebs_optimized = false
ephemeral_block_device.# = 0
iam_instance_profile =
instance_state = running
instance_type = t2.micro
key_name = test-infrastructure
monitoring = false
network_interface_id = eni-118df1ef
private_dns = ip-10-0-0-22.ec2.internal
private_ip = 10.0.0.22
public_dns = ec2-107-21-158-0.compute-1.amazonaws.com
public_ip = 107.21.158.0
root_block_device.# = 1
root_block_device.0.delete_on_termination = false
root_block_device.0.iops = 0
root_block_device.0.volume_size = 8
root_block_device.0.volume_type = standard
security_groups.# = 0
source_dest_check = true
subnet_id = subnet-6299274f
tags.% = 1
tags.Name = pub_odrive
tenancy = default
vpc_security_group_ids.# = 1
vpc_security_group_ids.1135247480 = sg-185e1d65
Dependencies:
aws_security_group.odrive_microservices_sg
aws_instance.zk_node.0:
ID = i-68c81f7f
ami = ami-97a7a180
associate_public_ip_address = true
availability_zone = us-east-1b
disable_api_termination = false
ebs_block_device.# = 0
ebs_optimized = false
ephemeral_block_device.# = 0
iam_instance_profile =
instance_state = running
instance_type = t2.micro
key_name = test-infrastructure
monitoring = false
network_interface_id = eni-a3aae15d
private_dns = ip-10-0-1-231.ec2.internal
private_ip = 10.0.1.231
public_dns = ec2-34-194-147-231.compute-1.amazonaws.com
public_ip = 34.194.147.231
root_block_device.# = 1
root_block_device.0.delete_on_termination = true
root_block_device.0.iops = 100
root_block_device.0.volume_size = 8
root_block_device.0.volume_type = gp2
security_groups.# = 0
source_dest_check = true
subnet_id = subnet-7d992750
tags.% = 1
tags.Name = zk_node
tenancy = default
vpc_security_group_ids.# = 1
vpc_security_group_ids.2112837917 = sg-f4470d89
Dependencies:
aws_security_group.zk_sg
aws_security_group.odrive_microservices_sg:
ID = sg-185e1d65
description = Required open ports for object-drive and other microservices
egress.# = 1
egress.482069346.cidr_blocks.# = 1
egress.482069346.cidr_blocks.0 = 0.0.0.0/0
egress.482069346.from_port = 0
egress.482069346.prefix_list_ids.# = 0
egress.482069346.protocol = -1
egress.482069346.security_groups.# = 0
egress.482069346.self = false
egress.482069346.to_port = 0
ingress.# = 5
ingress.1203902316.cidr_blocks.# = 1
ingress.1203902316.cidr_blocks.0 = 0.0.0.0/0
ingress.1203902316.from_port = 4430
ingress.1203902316.protocol = tcp
ingress.1203902316.security_groups.# = 0
ingress.1203902316.self = false
ingress.1203902316.to_port = 4430
ingress.1799340084.cidr_blocks.# = 1
ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
ingress.1799340084.from_port = -1
ingress.1799340084.protocol = icmp
ingress.1799340084.security_groups.# = 0
ingress.1799340084.self = false
ingress.1799340084.to_port = -1
ingress.2172623744.cidr_blocks.# = 1
ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0
ingress.2172623744.from_port = 9999
ingress.2172623744.protocol = tcp
ingress.2172623744.security_groups.# = 0
ingress.2172623744.self = false
ingress.2172623744.to_port = 9999
ingress.2541437006.cidr_blocks.# = 1
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
ingress.2541437006.from_port = 22
ingress.2541437006.protocol = tcp
ingress.2541437006.security_groups.# = 0
ingress.2541437006.self = false
ingress.2541437006.to_port = 22
ingress.2617001939.cidr_blocks.# = 1
ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0
ingress.2617001939.from_port = 443
ingress.2617001939.protocol = tcp
ingress.2617001939.security_groups.# = 0
ingress.2617001939.self = false
ingress.2617001939.to_port = 443
name = odrive_microservices_sg
owner_id = 706634194319
tags.% = 1
tags.Name = odrive_sg
vpc_id = vpc-50fe0336
aws_security_group.pub_networktest_sg:
ID = sg-f7470d8a
description = Allow traffic to pass from the private subnet to the internet
egress.# = 1
egress.482069346.cidr_blocks.# = 1
egress.482069346.cidr_blocks.0 = 0.0.0.0/0
egress.482069346.from_port = 0
egress.482069346.prefix_list_ids.# = 0
egress.482069346.protocol = -1
egress.482069346.security_groups.# = 0
egress.482069346.self = false
egress.482069346.to_port = 0
ingress.# = 6
ingress.1799340084.cidr_blocks.# = 1
ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
ingress.1799340084.from_port = -1
ingress.1799340084.protocol = icmp
ingress.1799340084.security_groups.# = 0
ingress.1799340084.self = false
ingress.1799340084.to_port = -1
ingress.2172623744.cidr_blocks.# = 1
ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0
ingress.2172623744.from_port = 9999
ingress.2172623744.protocol = tcp
ingress.2172623744.security_groups.# = 0
ingress.2172623744.self = false
ingress.2172623744.to_port = 9999
ingress.2214680975.cidr_blocks.# = 1
ingress.2214680975.cidr_blocks.0 = 0.0.0.0/0
ingress.2214680975.from_port = 80
ingress.2214680975.protocol = tcp
ingress.2214680975.security_groups.# = 0
ingress.2214680975.self = false
ingress.2214680975.to_port = 80
ingress.2541437006.cidr_blocks.# = 1
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
ingress.2541437006.from_port = 22
ingress.2541437006.protocol = tcp
ingress.2541437006.security_groups.# = 0
ingress.2541437006.self = false
ingress.2541437006.to_port = 22
ingress.2617001939.cidr_blocks.# = 1
ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0
ingress.2617001939.from_port = 443
ingress.2617001939.protocol = tcp
ingress.2617001939.security_groups.# = 0
ingress.2617001939.self = false
ingress.2617001939.to_port = 443
ingress.516175195.cidr_blocks.# = 1
ingress.516175195.cidr_blocks.0 = 0.0.0.0/0
ingress.516175195.from_port = 8080
ingress.516175195.protocol = tcp
ingress.516175195.security_groups.# = 0
ingress.516175195.self = false
ingress.516175195.to_port = 8080
name = pub_networktest_sg
owner_id = 706634194319
tags.% = 1
tags.Name = terraform
vpc_id = vpc-50fe0336
aws_security_group.zk_sg:
ID = sg-f4470d89
description = Zookeeper ports
egress.# = 1
egress.482069346.cidr_blocks.# = 1
egress.482069346.cidr_blocks.0 = 0.0.0.0/0
egress.482069346.from_port = 0
egress.482069346.prefix_list_ids.# = 0
egress.482069346.protocol = -1
egress.482069346.security_groups.# = 0
egress.482069346.self = false
egress.482069346.to_port = 0
ingress.# = 3
ingress.1799340084.cidr_blocks.# = 1
ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
ingress.1799340084.from_port = -1
ingress.1799340084.protocol = icmp
ingress.1799340084.security_groups.# = 0
ingress.1799340084.self = false
ingress.1799340084.to_port = -1
ingress.2541437006.cidr_blocks.# = 1
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
ingress.2541437006.from_port = 22
ingress.2541437006.protocol = tcp
ingress.2541437006.security_groups.# = 0
ingress.2541437006.self = false
ingress.2541437006.to_port = 22
ingress.4023360382.cidr_blocks.# = 1
ingress.4023360382.cidr_blocks.0 = 10.0.0.0/16
ingress.4023360382.from_port = 2181
ingress.4023360382.protocol = tcp
ingress.4023360382.security_groups.# = 0
ingress.4023360382.self = false
ingress.4023360382.to_port = 2181
name = zk_sg
owner_id = 706634194319
tags.% = 1
tags.Name = zk_sg
vpc_id = vpc-50fe0336
Outputs:
odrive_microservices_sg = sg-185e1d65
pub_networktest_sg = sg-f7470d8a
zk_sg = sg-f4470d89
module.rds:
aws_db_instance.odrive:
ID = tf-20161207154908631239504b4t
address = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com
allocated_storage = 10
apply_immediately = true
arn = arn:aws:rds:us-east-1:706634194319:db:tf-20161207154908631239504b4t
auto_minor_version_upgrade = true
availability_zone = us-east-1b
backup_retention_period = 0
backup_window = 07:37-08:07
copy_tags_to_snapshot = false
db_subnet_group_name = main
endpoint = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com:3306
engine = mysql
engine_version = 5.6.27
hosted_zone_id = Z2R2ITUGPM61AM
identifier = tf-20161207154908631239504b4t
instance_class = db.t2.micro
iops = 0
kms_key_id =
license_model = general-public-license
maintenance_window = mon:10:19-mon:10:49
monitoring_interval = 0
multi_az = false
name = metadatadb
option_group_name = default:mysql-5-6
parameter_group_name = odrive-pg
password = dbRootPassword
port = 3306
publicly_accessible = true
replicas.# = 0
replicate_source_db =
security_group_names.# = 0
skip_final_snapshot = true
status = available
storage_encrypted = false
storage_type = standard
tags.% = 0
username = dbRootUser
vpc_security_group_ids.# = 1
vpc_security_group_ids.955802421 = sg-76b5ca0b
Dependencies:
aws_db_subnet_group.main
aws_db_parameter_group.odrive_pg
aws_db_parameter_group.odrive_pg:
ID = odrive-pg
arn = arn:aws:rds:us-east-1:706634194319:pg:odrive-pg
description = Custom Parameter Group for Object Drive
family = mysql5.6
name = odrive-pg
parameter.# = 1
parameter.950177639.apply_method = immediate
parameter.950177639.name = log_bin_trust_function_creators
parameter.950177639.value = 1
tags.% = 0
aws_db_subnet_group.main:
ID = main
arn = arn:aws:rds:us-east-1:706634194319:subgrp:main
description = Managed by Terraform
name = main
subnet_ids.# = 3
subnet_ids.2727810170 = subnet-72bac73b
subnet_ids.741755728 = subnet-7d992750
subnet_ids.998920899 = subnet-6299274f
tags.% = 1
tags.Name = terraform_db_subnet_group
module.vpc:
aws_eip.nat:
ID = eipalloc-c15748fe
association_id = eipassoc-56c7e869
domain = vpc
instance = 74D93920-ED26-11E3-AC10-0800200C9A66
network_interface = eni-73c78c8d
private_ip = 10.0.0.34
public_ip = 34.193.25.59
vpc = true
Dependencies:
aws_instance.nat
aws_instance.nat:
ID = i-e8fe29ff
ami = ami-0dd7e61a
associate_public_ip_address = true
availability_zone = us-east-1b
disable_api_termination = false
ebs_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
ebs_optimized = false
ephemeral_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
iam_instance_profile =
instance_state = 74D93920-ED26-11E3-AC10-0800200C9A66
instance_type = t2.small
key_name = test-infrastructure
monitoring = false
network_interface_id = 74D93920-ED26-11E3-AC10-0800200C9A66
placement_group = 74D93920-ED26-11E3-AC10-0800200C9A66
private_dns = 74D93920-ED26-11E3-AC10-0800200C9A66
private_ip = 74D93920-ED26-11E3-AC10-0800200C9A66
public_dns = 74D93920-ED26-11E3-AC10-0800200C9A66
public_ip = 74D93920-ED26-11E3-AC10-0800200C9A66
root_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
root_block_device.0.delete_on_termination = true
root_block_device.0.iops = 100
root_block_device.0.volume_size = 8
root_block_device.0.volume_type = gp2
security_groups.# = 2
security_groups.2513725979 = sg-79119b04
security_groups.955802421 = sg-76b5ca0b
source_dest_check = false
subnet_id = subnet-6299274f
tags.% = 1
tags.Name = terraform_nat_instance
tenancy = 74D93920-ED26-11E3-AC10-0800200C9A66
vpc_security_group_ids.# = 74D93920-ED26-11E3-AC10-0800200C9A66
vpc_security_group_ids.2513725979 = sg-79119b04
vpc_security_group_ids.955802421 = sg-76b5ca0b
Dependencies:
aws_security_group.rds_mysql_sg
aws_subnet.decipher_public
aws_security_group.nat
aws_internet_gateway.default:
ID = igw-51883236
tags.% = 1
tags.Name = terraform_igw
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_route_table.decipher_private:
ID = rtb-6afddf0c
propagating_vgws.# = 0
route.# = 1
route.~2469360411.cidr_block = 0.0.0.0/0
route.~2469360411.gateway_id =
route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66
route.~2469360411.nat_gateway_id =
route.~2469360411.network_interface_id =
route.~2469360411.vpc_peering_connection_id =
tags.% = 1
tags.Name = terraform_private_subnet_route_table
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_instance.nat
aws_route_table.decipher_private_2:
ID = rtb-56a39130
propagating_vgws.# = 0
route.# = 1
route.~2469360411.cidr_block = 0.0.0.0/0
route.~2469360411.gateway_id =
route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66
route.~2469360411.nat_gateway_id =
route.~2469360411.network_interface_id =
route.~2469360411.vpc_peering_connection_id =
tags.% = 1
tags.Name = terraform_private_subnet_2_route_table
vpc_id = vpc-50fe0336
Dependencies:
aws_instance.nat
aws_vpc.default
aws_route_table.decipher_public:
ID = rtb-8efedce8
propagating_vgws.# = 0
route.# = 1
route.3761165403.cidr_block = 0.0.0.0/0
route.3761165403.gateway_id = igw-51883236
route.3761165403.instance_id =
route.3761165403.nat_gateway_id =
route.3761165403.network_interface_id =
route.3761165403.vpc_peering_connection_id =
tags.% = 1
tags.Name = terraform_public_subnet_route_table
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_internet_gateway.default
aws_route_table_association.decipher_private:
ID = rtbassoc-b8c0f5c1
route_table_id = rtb-6afddf0c
subnet_id = subnet-7d992750
Dependencies:
aws_subnet.decipher_private
aws_route_table.decipher_private
aws_route_table_association.decipher_private_2:
ID = rtbassoc-c0e4e5b9
route_table_id = rtb-56a39130
subnet_id = subnet-72bac73b
Dependencies:
aws_subnet.decipher_private_2
aws_route_table.decipher_private_2
aws_route_table_association.decipher_public:
ID = rtbassoc-29c6f350
route_table_id = rtb-8efedce8
subnet_id = subnet-6299274f
Dependencies:
aws_subnet.decipher_public
aws_route_table.decipher_public
aws_security_group.bastion_ssh_sg:
ID = sg-78119b05
description = Allow SSH to Bastion host from approved ranges
egress.# = 1
egress.482069346.cidr_blocks.# = 1
egress.482069346.cidr_blocks.0 = 0.0.0.0/0
egress.482069346.from_port = 0
egress.482069346.prefix_list_ids.# = 0
egress.482069346.protocol = -1
egress.482069346.security_groups.# = 0
egress.482069346.self = false
egress.482069346.to_port = 0
ingress.# = 1
ingress.2541437006.cidr_blocks.# = 1
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
ingress.2541437006.from_port = 22
ingress.2541437006.protocol = tcp
ingress.2541437006.security_groups.# = 0
ingress.2541437006.self = false
ingress.2541437006.to_port = 22
name = bastion_ssh
owner_id = 706634194319
tags.% = 1
tags.Name = terraform_bastion_ssh
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_security_group.nat:
ID = sg-79119b04
description = Allow traffic to pass from the private subnet to the internet
egress.# = 1
egress.482069346.cidr_blocks.# = 1
egress.482069346.cidr_blocks.0 = 0.0.0.0/0
egress.482069346.from_port = 0
egress.482069346.prefix_list_ids.# = 0
egress.482069346.protocol = -1
egress.482069346.security_groups.# = 0
egress.482069346.self = false
egress.482069346.to_port = 0
ingress.# = 3
ingress.2582209309.cidr_blocks.# = 1
ingress.2582209309.cidr_blocks.0 = 10.0.1.0/24
ingress.2582209309.from_port = -1
ingress.2582209309.protocol = icmp
ingress.2582209309.security_groups.# = 0
ingress.2582209309.self = false
ingress.2582209309.to_port = -1
ingress.386650288.cidr_blocks.# = 1
ingress.386650288.cidr_blocks.0 = 10.0.1.0/24
ingress.386650288.from_port = 80
ingress.386650288.protocol = tcp
ingress.386650288.security_groups.# = 0
ingress.386650288.self = false
ingress.386650288.to_port = 80
ingress.4211794038.cidr_blocks.# = 1
ingress.4211794038.cidr_blocks.0 = 10.0.1.0/24
ingress.4211794038.from_port = 443
ingress.4211794038.protocol = tcp
ingress.4211794038.security_groups.# = 0
ingress.4211794038.self = false
ingress.4211794038.to_port = 443
name = vpc_nat
owner_id = 706634194319
tags.% = 1
tags.Name = terraform
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_security_group.rds_mysql_sg:
ID = sg-76b5ca0b
description = Allow traffic to pass from internet to RDS MySQL
egress.# = 1
egress.482069346.cidr_blocks.# = 1
egress.482069346.cidr_blocks.0 = 0.0.0.0/0
egress.482069346.from_port = 0
egress.482069346.prefix_list_ids.# = 0
egress.482069346.protocol = -1
egress.482069346.security_groups.# = 0
egress.482069346.self = false
egress.482069346.to_port = 0
ingress.# = 1
ingress.1163740523.cidr_blocks.# = 1
ingress.1163740523.cidr_blocks.0 = 0.0.0.0/0
ingress.1163740523.from_port = 3306
ingress.1163740523.protocol = tcp
ingress.1163740523.security_groups.# = 0
ingress.1163740523.self = false
ingress.1163740523.to_port = 3306
name = rds_mysql
owner_id = 706634194319
tags.% = 1
tags.Name = terraform
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_security_group.ssh_from_bastion_sg:
ID = sg-72119b0f
description = Allow SSH from Bastion host(s)
egress.# = 0
ingress.# = 1
ingress.3517505807.cidr_blocks.# = 0
ingress.3517505807.from_port = 22
ingress.3517505807.protocol = tcp
ingress.3517505807.security_groups.# = 2
ingress.3517505807.security_groups.1151619385 = sg-78119b05
ingress.3517505807.security_groups.2513725979 = sg-79119b04
ingress.3517505807.self = false
ingress.3517505807.to_port = 22
name = ssh_from_bastion
owner_id = 706634194319
tags.% = 1
tags.Name = terraform_ssh_from_bastion
vpc_id = vpc-50fe0336
Dependencies:
aws_security_group.bastion_ssh_sg
aws_security_group.nat
aws_vpc.default
aws_security_group.web_access_from_nat_sg:
ID = sg-70119b0d
description = Allow web access to the private subnet from the public subnet (via NAT instance)
egress.# = 1
egress.482069346.cidr_blocks.# = 1
egress.482069346.cidr_blocks.0 = 0.0.0.0/0
egress.482069346.from_port = 0
egress.482069346.prefix_list_ids.# = 0
egress.482069346.protocol = -1
egress.482069346.security_groups.# = 0
egress.482069346.self = false
egress.482069346.to_port = 0
ingress.# = 3
ingress.1067346089.cidr_blocks.# = 1
ingress.1067346089.cidr_blocks.0 = 10.0.0.0/24
ingress.1067346089.from_port = -1
ingress.1067346089.protocol = icmp
ingress.1067346089.security_groups.# = 0
ingress.1067346089.self = false
ingress.1067346089.to_port = -1
ingress.1568533442.cidr_blocks.# = 1
ingress.1568533442.cidr_blocks.0 = 10.0.0.0/24
ingress.1568533442.from_port = 443
ingress.1568533442.protocol = tcp
ingress.1568533442.security_groups.# = 0
ingress.1568533442.self = false
ingress.1568533442.to_port = 443
ingress.2977749764.cidr_blocks.# = 1
ingress.2977749764.cidr_blocks.0 = 10.0.0.0/24
ingress.2977749764.from_port = 80
ingress.2977749764.protocol = tcp
ingress.2977749764.security_groups.# = 0
ingress.2977749764.self = false
ingress.2977749764.to_port = 80
name = private_subnet_web_access
owner_id = 706634194319
tags.% = 1
tags.Name = terraform
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_subnet.decipher_public
aws_subnet.decipher_private:
ID = subnet-7d992750
availability_zone = us-east-1b
cidr_block = 10.0.1.0/24
map_public_ip_on_launch = false
tags.% = 1
tags.Name = terraform_private_subnet
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_subnet.decipher_private_2:
ID = subnet-72bac73b
availability_zone = us-east-1c
cidr_block = 10.0.2.0/24
map_public_ip_on_launch = false
tags.% = 1
tags.Name = terraform_private_subnet_2
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_subnet.decipher_public:
ID = subnet-6299274f
availability_zone = us-east-1b
cidr_block = 10.0.0.0/24
map_public_ip_on_launch = false
tags.% = 1
tags.Name = terraform_public_subnet
vpc_id = vpc-50fe0336
Dependencies:
aws_vpc.default
aws_vpc.default:
ID = vpc-50fe0336
cidr_block = 10.0.0.0/16
default_network_acl_id = acl-c18d31a7
default_route_table_id = rtb-82fedce4
default_security_group_id = sg-7d119b00
dhcp_options_id = dopt-857b9be0
enable_classiclink = false
enable_dns_hostnames = true
enable_dns_support = true
instance_tenancy = default
main_route_table_id = rtb-82fedce4
tags.% = 1
tags.Name = terraform_vpc
Outputs:
bastion_ssh_sg_id = sg-78119b05
nat_sg_id = sg-79119b04
private_subnet_2_id = subnet-72bac73b
private_subnet_id = subnet-7d992750
public_subnet_id = subnet-6299274f
rds_mysql_sg = sg-76b5ca0b
ssh_from_bastion_sg_id = sg-72119b0f
vpc_id = vpc-50fe0336
web_access_from_nat_sg_id = sg-70119b0d
* plan operation: Real and shadow diffs do not match! Real diff:
module.instances:
UPDATE: aws_eip.zk.0
instance: "i-68c81f7f" => "<computed>"
CREATE: aws_eip.zk.1
allocation_id: "" => "<computed>"
association_id: "" => "<computed>"
domain: "" => "<computed>"
instance: "" => "<computed>"
network_interface: "" => "<computed>"
private_ip: "" => "<computed>"
public_ip: "" => "<computed>"
vpc: "" => "true" (forces new resource)
CREATE: aws_eip.zk.2
allocation_id: "" => "<computed>"
association_id: "" => "<computed>"
domain: "" => "<computed>"
instance: "" => "<computed>"
network_interface: "" => "<computed>"
private_ip: "" => "<computed>"
public_ip: "" => "<computed>"
vpc: "" => "true" (forces new resource)
CREATE: aws_instance.zk_node.1
ami: "" => "ami-97a7a180" (forces new resource)
associate_public_ip_address: "" => "true" (forces new resource)
availability_zone: "" => "us-east-1b" (forces new resource)
ebs_block_device.#: "" => "<computed>"
ephemeral_block_device.#: "" => "<computed>" (forces new resource)
instance_state: "" => "<computed>"
instance_type: "" => "t2.micro" (forces new resource)
key_name: "" => "test-infrastructure" (forces new resource)
network_interface_id: "" => "<computed>"
placement_group: "" => "<computed>" (forces new resource)
private_dns: "" => "<computed>"
private_ip: "" => "<computed>" (forces new resource)
public_dns: "" => "<computed>"
public_ip: "" => "<computed>"
root_block_device.#: "" => "<computed>"
security_groups.#: "" => "<computed>" (forces new resource)
source_dest_check: "" => "true"
subnet_id: "" => "subnet-7d992750" (forces new resource)
tags.%: "" => "1"
tags.Name: "" => "zk_node"
tenancy: "" => "<computed>" (forces new resource)
vpc_security_group_ids.#: "" => "1"
vpc_security_group_ids.2112837917: "" => "sg-f4470d89"
CREATE: aws_instance.zk_node.2
ami: "" => "ami-97a7a180" (forces new resource)
associate_public_ip_address: "" => "true" (forces new resource)
availability_zone: "" => "us-east-1b" (forces new resource)
ebs_block_device.#: "" => "<computed>"
ephemeral_block_device.#: "" => "<computed>" (forces new resource)
instance_state: "" => "<computed>"
instance_type: "" => "t2.micro" (forces new resource)
key_name: "" => "test-infrastructure" (forces new resource)
network_interface_id: "" => "<computed>"
placement_group: "" => "<computed>" (forces new resource)
private_dns: "" => "<computed>"
private_ip: "" => "<computed>" (forces new resource)
public_dns: "" => "<computed>"
public_ip: "" => "<computed>"
root_block_device.#: "" => "<computed>"
security_groups.#: "" => "<computed>" (forces new resource)
source_dest_check: "" => "true"
subnet_id: "" => "subnet-7d992750" (forces new resource)
tags.%: "" => "1"
tags.Name: "" => "zk_node"
tenancy: "" => "<computed>" (forces new resource)
vpc_security_group_ids.#: "" => "1"
vpc_security_group_ids.2112837917: "" => "sg-f4470d89"
module.rds:
module.vpc:
UPDATE: aws_eip.nat
instance: "i-e8fe29ff" => "<computed>"
DESTROY/CREATE: aws_instance.nat
ami: "ami-0dd7e61a" => "ami-0dd7e61a"
associate_public_ip_address: "true" => "true"
availability_zone: "us-east-1b" => "us-east-1b"
ebs_block_device.#: "0" => "<computed>"
ephemeral_block_device.#: "0" => "<computed>"
instance_state: "running" => "<computed>"
instance_type: "t2.small" => "t2.small"
key_name: "test-infrastructure" => "test-infrastructure"
network_interface_id: "eni-73c78c8d" => "<computed>"
placement_group: "" => "<computed>"
private_dns: "ip-10-0-0-34.ec2.internal" => "<computed>"
private_ip: "10.0.0.34" => "<computed>"
public_dns: "ec2-34-193-25-59.compute-1.amazonaws.com" => "<computed>"
public_ip: "34.193.25.59" => "<computed>"
root_block_device.#: "1" => "<computed>"
security_groups.#: "0" => "2" (forces new resource)
security_groups.2513725979: "" => "sg-79119b04" (forces new resource)
security_groups.955802421: "" => "sg-76b5ca0b" (forces new resource)
source_dest_check: "false" => "false"
subnet_id: "subnet-6299274f" => "subnet-6299274f"
tags.%: "1" => "1"
tags.Name: "terraform_nat_instance" => "terraform_nat_instance"
tenancy: "default" => "<computed>"
vpc_security_group_ids.#: "2" => "<computed>"
UPDATE: aws_route_table.decipher_private
route.924992980.cidr_block: "0.0.0.0/0" => ""
route.924992980.gateway_id: "" => ""
route.924992980.instance_id: "i-e8fe29ff" => ""
route.924992980.nat_gateway_id: "" => ""
route.924992980.network_interface_id: "eni-73c78c8d" => ""
route.924992980.vpc_peering_connection_id: "" => ""
route.~2469360411.cidr_block: "" => "0.0.0.0/0"
route.~2469360411.gateway_id: "" => ""
route.~2469360411.instance_id: "" => "<computed>"
route.~2469360411.nat_gateway_id: "" => ""
route.~2469360411.network_interface_id: "" => ""
route.~2469360411.vpc_peering_connection_id: "" => ""
UPDATE: aws_route_table.decipher_private_2
route.924992980.cidr_block: "0.0.0.0/0" => ""
route.924992980.gateway_id: "" => ""
route.924992980.instance_id: "i-e8fe29ff" => ""
route.924992980.nat_gateway_id: "" => ""
route.924992980.network_interface_id: "eni-73c78c8d" => ""
route.924992980.vpc_peering_connection_id: "" => ""
route.~2469360411.cidr_block: "" => "0.0.0.0/0"
route.~2469360411.gateway_id: "" => ""
route.~2469360411.instance_id: "" => "<computed>"
route.~2469360411.nat_gateway_id: "" => ""
route.~2469360411.network_interface_id: "" => ""
route.~2469360411.vpc_peering_connection_id: "" => ""
Shadow diff:
module.instances:
CREATE: aws_instance.zk_node.1
ami: "" => "ami-97a7a180" (forces new resource)
associate_public_ip_address: "" => "true" (forces new resource)
availability_zone: "" => "us-east-1b" (forces new resource)
ebs_block_device.#: "" => "<computed>"
ephemeral_block_device.#: "" => "<computed>" (forces new resource)
instance_state: "" => "<computed>"
instance_type: "" => "t2.micro" (forces new resource)
key_name: "" => "test-infrastructure" (forces new resource)
network_interface_id: "" => "<computed>"
placement_group: "" => "<computed>" (forces new resource)
private_dns: "" => "<computed>"
private_ip: "" => "<computed>" (forces new resource)
public_dns: "" => "<computed>"
public_ip: "" => "<computed>"
root_block_device.#: "" => "<computed>"
security_groups.#: "" => "<computed>" (forces new resource)
source_dest_check: "" => "true"
subnet_id: "" => "subnet-7d992750" (forces new resource)
tags.%: "" => "1"
tags.Name: "" => "zk_node"
tenancy: "" => "<computed>" (forces new resource)
vpc_security_group_ids.#: "" => "1"
vpc_security_group_ids.2112837917: "" => "sg-f4470d89"
CREATE: aws_instance.zk_node.2
ami: "" => "ami-97a7a180" (forces new resource)
associate_public_ip_address: "" => "true" (forces new resource)
availability_zone: "" => "us-east-1b" (forces new resource)
ebs_block_device.#: "" => "<computed>"
ephemeral_block_device.#: "" => "<computed>" (forces new resource)
instance_state: "" => "<computed>"
instance_type: "" => "t2.micro" (forces new resource)
key_name: "" => "test-infrastructure" (forces new resource)
network_interface_id: "" => "<computed>"
placement_group: "" => "<computed>" (forces new resource)
private_dns: "" => "<computed>"
private_ip: "" => "<computed>" (forces new resource)
public_dns: "" => "<computed>"
public_ip: "" => "<computed>"
root_block_device.#: "" => "<computed>"
security_groups.#: "" => "<computed>" (forces new resource)
source_dest_check: "" => "true"
subnet_id: "" => "subnet-7d992750" (forces new resource)
tags.%: "" => "1"
tags.Name: "" => "zk_node"
tenancy: "" => "<computed>" (forces new resource)
vpc_security_group_ids.#: "" => "1"
vpc_security_group_ids.2112837917: "" => "sg-f4470d89"
module.rds:
module.vpc:
UPDATE: aws_eip.nat
instance: "i-e8fe29ff" => "<computed>"
DESTROY/CREATE: aws_instance.nat
ami: "ami-0dd7e61a" => "ami-0dd7e61a"
associate_public_ip_address: "true" => "true"
availability_zone: "us-east-1b" => "us-east-1b"
ebs_block_device.#: "0" => "<computed>"
ephemeral_block_device.#: "0" => "<computed>"
instance_state: "running" => "<computed>"
instance_type: "t2.small" => "t2.small"
key_name: "test-infrastructure" => "test-infrastructure"
network_interface_id: "eni-73c78c8d" => "<computed>"
placement_group: "" => "<computed>"
private_dns: "ip-10-0-0-34.ec2.internal" => "<computed>"
private_ip: "10.0.0.34" => "<computed>"
public_dns: "ec2-34-193-25-59.compute-1.amazonaws.com" => "<computed>"
public_ip: "34.193.25.59" => "<computed>"
root_block_device.#: "1" => "<computed>"
security_groups.#: "0" => "2" (forces new resource)
security_groups.2513725979: "" => "sg-79119b04" (forces new resource)
security_groups.955802421: "" => "sg-76b5ca0b" (forces new resource)
source_dest_check: "false" => "false"
subnet_id: "subnet-6299274f" => "subnet-6299274f"
tags.%: "1" => "1"
tags.Name: "terraform_nat_instance" => "terraform_nat_instance"
tenancy: "default" => "<computed>"
vpc_security_group_ids.#: "2" => "<computed>"
UPDATE: aws_route_table.decipher_private
route.924992980.cidr_block: "0.0.0.0/0" => ""
route.924992980.gateway_id: "" => ""
route.924992980.instance_id: "i-e8fe29ff" => ""
route.924992980.nat_gateway_id: "" => ""
route.924992980.network_interface_id: "eni-73c78c8d" => ""
route.924992980.vpc_peering_connection_id: "" => ""
route.~2469360411.cidr_block: "" => "0.0.0.0/0"
route.~2469360411.gateway_id: "" => ""
route.~2469360411.instance_id: "" => "<computed>"
route.~2469360411.nat_gateway_id: "" => ""
route.~2469360411.network_interface_id: "" => ""
route.~2469360411.vpc_peering_connection_id: "" => ""
UPDATE: aws_route_table.decipher_private_2
route.924992980.cidr_block: "0.0.0.0/0" => ""
route.924992980.gateway_id: "" => ""
route.924992980.instance_id: "i-e8fe29ff" => ""
route.924992980.nat_gateway_id: "" => ""
route.924992980.network_interface_id: "eni-73c78c8d" => ""
route.924992980.vpc_peering_connection_id: "" => ""
route.~2469360411.cidr_block: "" => "0.0.0.0/0"
route.~2469360411.gateway_id: "" => ""
route.~2469360411.instance_id: "" => "<computed>"
route.~2469360411.nat_gateway_id: "" => ""
route.~2469360411.network_interface_id: "" => ""
route.~2469360411.vpc_peering_connection_id: "" => ""
* plan operation: Resource 'aws_instance.zk_node.1' does not have attribute 'id' for variable 'aws_instance.zk_node.1.id'
* plan operation: Resource 'aws_instance.zk_node.1' does not have attribute 'id' for variable 'aws_instance.zk_node.1.id'
* plan operation: Resource 'aws_instance.zk_node.1' does not have attribute 'id' for variable 'aws_instance.zk_node.1.id'
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment