Created
December 8, 2016 03:02
-
-
Save anxiousmodernman/04467ac64dbaeeea067bc10a9d7c7d11 to your computer and use it in GitHub Desktop.
terraform-error-1481165731.log
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
5 error(s) occurred: | |
* plan operation: Real and shadow states do not match! Real state: | |
<no state> | |
module.child: | |
<no state> | |
Outputs: | |
received = 1GB | |
module.instances: | |
aws_eip.zk.0: | |
ID = eipalloc-3eb04400 | |
association_id = eipassoc-b5def18a | |
domain = vpc | |
instance = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
network_interface = eni-a3aae15d | |
private_ip = 10.0.1.231 | |
public_ip = 34.194.147.231 | |
vpc = true | |
Dependencies: | |
aws_instance.zk_node | |
aws_instance.priv_networktest: | |
ID = i-6ec81f79 | |
ami = ami-02417f15 | |
associate_public_ip_address = false | |
availability_zone = us-east-1b | |
disable_api_termination = false | |
ebs_block_device.# = 0 | |
ebs_optimized = false | |
ephemeral_block_device.# = 0 | |
iam_instance_profile = | |
instance_state = running | |
instance_type = t2.micro | |
key_name = test-infrastructure | |
monitoring = false | |
network_interface_id = eni-bba9e245 | |
private_dns = ip-10-0-1-46.ec2.internal | |
private_ip = 10.0.1.46 | |
public_dns = | |
public_ip = | |
root_block_device.# = 1 | |
root_block_device.0.delete_on_termination = true | |
root_block_device.0.iops = 100 | |
root_block_device.0.volume_size = 8 | |
root_block_device.0.volume_type = gp2 | |
security_groups.# = 0 | |
source_dest_check = true | |
subnet_id = subnet-7d992750 | |
tags.% = 1 | |
tags.Name = priv_networktest | |
tenancy = default | |
vpc_security_group_ids.# = 1 | |
vpc_security_group_ids.699898438 = sg-f7470d8a | |
Dependencies: | |
aws_security_group.pub_networktest_sg | |
aws_instance.pub_networktest: | |
ID = i-69c81f7e | |
ami = ami-02417f15 | |
associate_public_ip_address = true | |
availability_zone = us-east-1b | |
disable_api_termination = false | |
ebs_block_device.# = 0 | |
ebs_optimized = false | |
ephemeral_block_device.# = 0 | |
iam_instance_profile = | |
instance_state = running | |
instance_type = t2.micro | |
key_name = test-infrastructure | |
monitoring = false | |
network_interface_id = eni-8fade671 | |
private_dns = ip-10-0-0-61.ec2.internal | |
private_ip = 10.0.0.61 | |
public_dns = ec2-54-90-79-184.compute-1.amazonaws.com | |
public_ip = 54.90.79.184 | |
root_block_device.# = 1 | |
root_block_device.0.delete_on_termination = true | |
root_block_device.0.iops = 100 | |
root_block_device.0.volume_size = 8 | |
root_block_device.0.volume_type = gp2 | |
security_groups.# = 0 | |
source_dest_check = true | |
subnet_id = subnet-6299274f | |
tags.% = 1 | |
tags.Name = pub_networktest | |
tenancy = default | |
vpc_security_group_ids.# = 1 | |
vpc_security_group_ids.699898438 = sg-f7470d8a | |
Dependencies: | |
aws_security_group.pub_networktest_sg | |
aws_instance.pub_odrive: | |
ID = i-c634fdd1 | |
ami = ami-bcd0d7ab | |
associate_public_ip_address = true | |
availability_zone = us-east-1b | |
disable_api_termination = false | |
ebs_block_device.# = 0 | |
ebs_optimized = false | |
ephemeral_block_device.# = 0 | |
iam_instance_profile = | |
instance_state = running | |
instance_type = t2.micro | |
key_name = test-infrastructure | |
monitoring = false | |
network_interface_id = eni-118df1ef | |
private_dns = ip-10-0-0-22.ec2.internal | |
private_ip = 10.0.0.22 | |
public_dns = ec2-107-21-158-0.compute-1.amazonaws.com | |
public_ip = 107.21.158.0 | |
root_block_device.# = 1 | |
root_block_device.0.delete_on_termination = false | |
root_block_device.0.iops = 0 | |
root_block_device.0.volume_size = 8 | |
root_block_device.0.volume_type = standard | |
security_groups.# = 0 | |
source_dest_check = true | |
subnet_id = subnet-6299274f | |
tags.% = 1 | |
tags.Name = pub_odrive | |
tenancy = default | |
vpc_security_group_ids.# = 1 | |
vpc_security_group_ids.1135247480 = sg-185e1d65 | |
Dependencies: | |
aws_security_group.odrive_microservices_sg | |
aws_instance.zk_node.0: | |
ID = i-68c81f7f | |
ami = ami-97a7a180 | |
associate_public_ip_address = true | |
availability_zone = us-east-1b | |
disable_api_termination = false | |
ebs_block_device.# = 0 | |
ebs_optimized = false | |
ephemeral_block_device.# = 0 | |
iam_instance_profile = | |
instance_state = running | |
instance_type = t2.micro | |
key_name = test-infrastructure | |
monitoring = false | |
network_interface_id = eni-a3aae15d | |
private_dns = ip-10-0-1-231.ec2.internal | |
private_ip = 10.0.1.231 | |
public_dns = ec2-34-194-147-231.compute-1.amazonaws.com | |
public_ip = 34.194.147.231 | |
root_block_device.# = 1 | |
root_block_device.0.delete_on_termination = true | |
root_block_device.0.iops = 100 | |
root_block_device.0.volume_size = 8 | |
root_block_device.0.volume_type = gp2 | |
security_groups.# = 0 | |
source_dest_check = true | |
subnet_id = subnet-7d992750 | |
tags.% = 1 | |
tags.Name = zk_node | |
tenancy = default | |
vpc_security_group_ids.# = 1 | |
vpc_security_group_ids.2112837917 = sg-f4470d89 | |
Dependencies: | |
aws_security_group.zk_sg | |
aws_security_group.odrive_microservices_sg: | |
ID = sg-185e1d65 | |
description = Required open ports for object-drive and other microservices | |
egress.# = 1 | |
egress.482069346.cidr_blocks.# = 1 | |
egress.482069346.cidr_blocks.0 = 0.0.0.0/0 | |
egress.482069346.from_port = 0 | |
egress.482069346.prefix_list_ids.# = 0 | |
egress.482069346.protocol = -1 | |
egress.482069346.security_groups.# = 0 | |
egress.482069346.self = false | |
egress.482069346.to_port = 0 | |
ingress.# = 5 | |
ingress.1203902316.cidr_blocks.# = 1 | |
ingress.1203902316.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.1203902316.from_port = 4430 | |
ingress.1203902316.protocol = tcp | |
ingress.1203902316.security_groups.# = 0 | |
ingress.1203902316.self = false | |
ingress.1203902316.to_port = 4430 | |
ingress.1799340084.cidr_blocks.# = 1 | |
ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.1799340084.from_port = -1 | |
ingress.1799340084.protocol = icmp | |
ingress.1799340084.security_groups.# = 0 | |
ingress.1799340084.self = false | |
ingress.1799340084.to_port = -1 | |
ingress.2172623744.cidr_blocks.# = 1 | |
ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2172623744.from_port = 9999 | |
ingress.2172623744.protocol = tcp | |
ingress.2172623744.security_groups.# = 0 | |
ingress.2172623744.self = false | |
ingress.2172623744.to_port = 9999 | |
ingress.2541437006.cidr_blocks.# = 1 | |
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2541437006.from_port = 22 | |
ingress.2541437006.protocol = tcp | |
ingress.2541437006.security_groups.# = 0 | |
ingress.2541437006.self = false | |
ingress.2541437006.to_port = 22 | |
ingress.2617001939.cidr_blocks.# = 1 | |
ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2617001939.from_port = 443 | |
ingress.2617001939.protocol = tcp | |
ingress.2617001939.security_groups.# = 0 | |
ingress.2617001939.self = false | |
ingress.2617001939.to_port = 443 | |
name = odrive_microservices_sg | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = odrive_sg | |
vpc_id = vpc-50fe0336 | |
aws_security_group.pub_networktest_sg: | |
ID = sg-f7470d8a | |
description = Allow traffic to pass from the private subnet to the internet | |
egress.# = 1 | |
egress.482069346.cidr_blocks.# = 1 | |
egress.482069346.cidr_blocks.0 = 0.0.0.0/0 | |
egress.482069346.from_port = 0 | |
egress.482069346.prefix_list_ids.# = 0 | |
egress.482069346.protocol = -1 | |
egress.482069346.security_groups.# = 0 | |
egress.482069346.self = false | |
egress.482069346.to_port = 0 | |
ingress.# = 6 | |
ingress.1799340084.cidr_blocks.# = 1 | |
ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.1799340084.from_port = -1 | |
ingress.1799340084.protocol = icmp | |
ingress.1799340084.security_groups.# = 0 | |
ingress.1799340084.self = false | |
ingress.1799340084.to_port = -1 | |
ingress.2172623744.cidr_blocks.# = 1 | |
ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2172623744.from_port = 9999 | |
ingress.2172623744.protocol = tcp | |
ingress.2172623744.security_groups.# = 0 | |
ingress.2172623744.self = false | |
ingress.2172623744.to_port = 9999 | |
ingress.2214680975.cidr_blocks.# = 1 | |
ingress.2214680975.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2214680975.from_port = 80 | |
ingress.2214680975.protocol = tcp | |
ingress.2214680975.security_groups.# = 0 | |
ingress.2214680975.self = false | |
ingress.2214680975.to_port = 80 | |
ingress.2541437006.cidr_blocks.# = 1 | |
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2541437006.from_port = 22 | |
ingress.2541437006.protocol = tcp | |
ingress.2541437006.security_groups.# = 0 | |
ingress.2541437006.self = false | |
ingress.2541437006.to_port = 22 | |
ingress.2617001939.cidr_blocks.# = 1 | |
ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2617001939.from_port = 443 | |
ingress.2617001939.protocol = tcp | |
ingress.2617001939.security_groups.# = 0 | |
ingress.2617001939.self = false | |
ingress.2617001939.to_port = 443 | |
ingress.516175195.cidr_blocks.# = 1 | |
ingress.516175195.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.516175195.from_port = 8080 | |
ingress.516175195.protocol = tcp | |
ingress.516175195.security_groups.# = 0 | |
ingress.516175195.self = false | |
ingress.516175195.to_port = 8080 | |
name = pub_networktest_sg | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = terraform | |
vpc_id = vpc-50fe0336 | |
aws_security_group.zk_sg: | |
ID = sg-f4470d89 | |
description = Zookeeper ports | |
egress.# = 1 | |
egress.482069346.cidr_blocks.# = 1 | |
egress.482069346.cidr_blocks.0 = 0.0.0.0/0 | |
egress.482069346.from_port = 0 | |
egress.482069346.prefix_list_ids.# = 0 | |
egress.482069346.protocol = -1 | |
egress.482069346.security_groups.# = 0 | |
egress.482069346.self = false | |
egress.482069346.to_port = 0 | |
ingress.# = 3 | |
ingress.1799340084.cidr_blocks.# = 1 | |
ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.1799340084.from_port = -1 | |
ingress.1799340084.protocol = icmp | |
ingress.1799340084.security_groups.# = 0 | |
ingress.1799340084.self = false | |
ingress.1799340084.to_port = -1 | |
ingress.2541437006.cidr_blocks.# = 1 | |
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2541437006.from_port = 22 | |
ingress.2541437006.protocol = tcp | |
ingress.2541437006.security_groups.# = 0 | |
ingress.2541437006.self = false | |
ingress.2541437006.to_port = 22 | |
ingress.4023360382.cidr_blocks.# = 1 | |
ingress.4023360382.cidr_blocks.0 = 10.0.0.0/16 | |
ingress.4023360382.from_port = 2181 | |
ingress.4023360382.protocol = tcp | |
ingress.4023360382.security_groups.# = 0 | |
ingress.4023360382.self = false | |
ingress.4023360382.to_port = 2181 | |
name = zk_sg | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = zk_sg | |
vpc_id = vpc-50fe0336 | |
Outputs: | |
odrive_microservices_sg = sg-185e1d65 | |
pub_networktest_sg = sg-f7470d8a | |
zk_sg = sg-f4470d89 | |
module.rds: | |
aws_db_instance.odrive: | |
ID = tf-20161207154908631239504b4t | |
address = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com | |
allocated_storage = 10 | |
apply_immediately = true | |
arn = arn:aws:rds:us-east-1:706634194319:db:tf-20161207154908631239504b4t | |
auto_minor_version_upgrade = true | |
availability_zone = us-east-1b | |
backup_retention_period = 0 | |
backup_window = 07:37-08:07 | |
copy_tags_to_snapshot = false | |
db_subnet_group_name = main | |
endpoint = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com:3306 | |
engine = mysql | |
engine_version = 5.6.27 | |
hosted_zone_id = Z2R2ITUGPM61AM | |
identifier = tf-20161207154908631239504b4t | |
instance_class = db.t2.micro | |
iops = 0 | |
kms_key_id = | |
license_model = general-public-license | |
maintenance_window = mon:10:19-mon:10:49 | |
monitoring_interval = 0 | |
multi_az = false | |
name = metadatadb | |
option_group_name = default:mysql-5-6 | |
parameter_group_name = odrive-pg | |
password = dbRootPassword | |
port = 3306 | |
publicly_accessible = true | |
replicas.# = 0 | |
replicate_source_db = | |
security_group_names.# = 0 | |
skip_final_snapshot = true | |
status = available | |
storage_encrypted = false | |
storage_type = standard | |
tags.% = 0 | |
username = dbRootUser | |
vpc_security_group_ids.# = 1 | |
vpc_security_group_ids.955802421 = sg-76b5ca0b | |
Dependencies: | |
aws_db_subnet_group.main | |
aws_db_parameter_group.odrive_pg | |
aws_db_parameter_group.odrive_pg: | |
ID = odrive-pg | |
arn = arn:aws:rds:us-east-1:706634194319:pg:odrive-pg | |
description = Custom Parameter Group for Object Drive | |
family = mysql5.6 | |
name = odrive-pg | |
parameter.# = 1 | |
parameter.950177639.apply_method = immediate | |
parameter.950177639.name = log_bin_trust_function_creators | |
parameter.950177639.value = 1 | |
tags.% = 0 | |
aws_db_subnet_group.main: | |
ID = main | |
arn = arn:aws:rds:us-east-1:706634194319:subgrp:main | |
description = Managed by Terraform | |
name = main | |
subnet_ids.# = 3 | |
subnet_ids.2727810170 = subnet-72bac73b | |
subnet_ids.741755728 = subnet-7d992750 | |
subnet_ids.998920899 = subnet-6299274f | |
tags.% = 1 | |
tags.Name = terraform_db_subnet_group | |
module.vpc: | |
aws_eip.nat: | |
ID = eipalloc-c15748fe | |
association_id = eipassoc-56c7e869 | |
domain = vpc | |
instance = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
network_interface = eni-73c78c8d | |
private_ip = 10.0.0.34 | |
public_ip = 34.193.25.59 | |
vpc = true | |
Dependencies: | |
aws_instance.nat | |
aws_instance.nat: | |
ID = i-e8fe29ff | |
ami = ami-0dd7e61a | |
associate_public_ip_address = true | |
availability_zone = us-east-1b | |
disable_api_termination = false | |
ebs_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
ebs_optimized = false | |
ephemeral_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
iam_instance_profile = | |
instance_state = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
instance_type = t2.small | |
key_name = test-infrastructure | |
monitoring = false | |
network_interface_id = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
placement_group = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
private_dns = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
private_ip = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
public_dns = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
public_ip = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
root_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
root_block_device.0.delete_on_termination = true | |
root_block_device.0.iops = 100 | |
root_block_device.0.volume_size = 8 | |
root_block_device.0.volume_type = gp2 | |
security_groups.# = 2 | |
security_groups.2513725979 = sg-79119b04 | |
security_groups.955802421 = sg-76b5ca0b | |
source_dest_check = false | |
subnet_id = subnet-6299274f | |
tags.% = 1 | |
tags.Name = terraform_nat_instance | |
tenancy = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
vpc_security_group_ids.# = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
vpc_security_group_ids.2513725979 = sg-79119b04 | |
vpc_security_group_ids.955802421 = sg-76b5ca0b | |
Dependencies: | |
aws_security_group.rds_mysql_sg | |
aws_subnet.decipher_public | |
aws_security_group.nat | |
aws_internet_gateway.default: | |
ID = igw-51883236 | |
tags.% = 1 | |
tags.Name = terraform_igw | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_route_table.decipher_private: | |
ID = rtb-6afddf0c | |
propagating_vgws.# = 0 | |
route.# = 1 | |
route.~2469360411.cidr_block = 0.0.0.0/0 | |
route.~2469360411.gateway_id = | |
route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
route.~2469360411.nat_gateway_id = | |
route.~2469360411.network_interface_id = | |
route.~2469360411.vpc_peering_connection_id = | |
tags.% = 1 | |
tags.Name = terraform_private_subnet_route_table | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_instance.nat | |
aws_route_table.decipher_private_2: | |
ID = rtb-56a39130 | |
propagating_vgws.# = 0 | |
route.# = 1 | |
route.~2469360411.cidr_block = 0.0.0.0/0 | |
route.~2469360411.gateway_id = | |
route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
route.~2469360411.nat_gateway_id = | |
route.~2469360411.network_interface_id = | |
route.~2469360411.vpc_peering_connection_id = | |
tags.% = 1 | |
tags.Name = terraform_private_subnet_2_route_table | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_instance.nat | |
aws_vpc.default | |
aws_route_table.decipher_public: | |
ID = rtb-8efedce8 | |
propagating_vgws.# = 0 | |
route.# = 1 | |
route.3761165403.cidr_block = 0.0.0.0/0 | |
route.3761165403.gateway_id = igw-51883236 | |
route.3761165403.instance_id = | |
route.3761165403.nat_gateway_id = | |
route.3761165403.network_interface_id = | |
route.3761165403.vpc_peering_connection_id = | |
tags.% = 1 | |
tags.Name = terraform_public_subnet_route_table | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_internet_gateway.default | |
aws_route_table_association.decipher_private: | |
ID = rtbassoc-b8c0f5c1 | |
route_table_id = rtb-6afddf0c | |
subnet_id = subnet-7d992750 | |
Dependencies: | |
aws_subnet.decipher_private | |
aws_route_table.decipher_private | |
aws_route_table_association.decipher_private_2: | |
ID = rtbassoc-c0e4e5b9 | |
route_table_id = rtb-56a39130 | |
subnet_id = subnet-72bac73b | |
Dependencies: | |
aws_route_table.decipher_private_2 | |
aws_subnet.decipher_private_2 | |
aws_route_table_association.decipher_public: | |
ID = rtbassoc-29c6f350 | |
route_table_id = rtb-8efedce8 | |
subnet_id = subnet-6299274f | |
Dependencies: | |
aws_subnet.decipher_public | |
aws_route_table.decipher_public | |
aws_security_group.bastion_ssh_sg: | |
ID = sg-78119b05 | |
description = Allow SSH to Bastion host from approved ranges | |
egress.# = 1 | |
egress.482069346.cidr_blocks.# = 1 | |
egress.482069346.cidr_blocks.0 = 0.0.0.0/0 | |
egress.482069346.from_port = 0 | |
egress.482069346.prefix_list_ids.# = 0 | |
egress.482069346.protocol = -1 | |
egress.482069346.security_groups.# = 0 | |
egress.482069346.self = false | |
egress.482069346.to_port = 0 | |
ingress.# = 1 | |
ingress.2541437006.cidr_blocks.# = 1 | |
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2541437006.from_port = 22 | |
ingress.2541437006.protocol = tcp | |
ingress.2541437006.security_groups.# = 0 | |
ingress.2541437006.self = false | |
ingress.2541437006.to_port = 22 | |
name = bastion_ssh | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = terraform_bastion_ssh | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_security_group.nat: | |
ID = sg-79119b04 | |
description = Allow traffic to pass from the private subnet to the internet | |
egress.# = 1 | |
egress.482069346.cidr_blocks.# = 1 | |
egress.482069346.cidr_blocks.0 = 0.0.0.0/0 | |
egress.482069346.from_port = 0 | |
egress.482069346.prefix_list_ids.# = 0 | |
egress.482069346.protocol = -1 | |
egress.482069346.security_groups.# = 0 | |
egress.482069346.self = false | |
egress.482069346.to_port = 0 | |
ingress.# = 3 | |
ingress.2582209309.cidr_blocks.# = 1 | |
ingress.2582209309.cidr_blocks.0 = 10.0.1.0/24 | |
ingress.2582209309.from_port = -1 | |
ingress.2582209309.protocol = icmp | |
ingress.2582209309.security_groups.# = 0 | |
ingress.2582209309.self = false | |
ingress.2582209309.to_port = -1 | |
ingress.386650288.cidr_blocks.# = 1 | |
ingress.386650288.cidr_blocks.0 = 10.0.1.0/24 | |
ingress.386650288.from_port = 80 | |
ingress.386650288.protocol = tcp | |
ingress.386650288.security_groups.# = 0 | |
ingress.386650288.self = false | |
ingress.386650288.to_port = 80 | |
ingress.4211794038.cidr_blocks.# = 1 | |
ingress.4211794038.cidr_blocks.0 = 10.0.1.0/24 | |
ingress.4211794038.from_port = 443 | |
ingress.4211794038.protocol = tcp | |
ingress.4211794038.security_groups.# = 0 | |
ingress.4211794038.self = false | |
ingress.4211794038.to_port = 443 | |
name = vpc_nat | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = terraform | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_security_group.rds_mysql_sg: | |
ID = sg-76b5ca0b | |
description = Allow traffic to pass from internet to RDS MySQL | |
egress.# = 1 | |
egress.482069346.cidr_blocks.# = 1 | |
egress.482069346.cidr_blocks.0 = 0.0.0.0/0 | |
egress.482069346.from_port = 0 | |
egress.482069346.prefix_list_ids.# = 0 | |
egress.482069346.protocol = -1 | |
egress.482069346.security_groups.# = 0 | |
egress.482069346.self = false | |
egress.482069346.to_port = 0 | |
ingress.# = 1 | |
ingress.1163740523.cidr_blocks.# = 1 | |
ingress.1163740523.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.1163740523.from_port = 3306 | |
ingress.1163740523.protocol = tcp | |
ingress.1163740523.security_groups.# = 0 | |
ingress.1163740523.self = false | |
ingress.1163740523.to_port = 3306 | |
name = rds_mysql | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = terraform | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_security_group.ssh_from_bastion_sg: | |
ID = sg-72119b0f | |
description = Allow SSH from Bastion host(s) | |
egress.# = 0 | |
ingress.# = 1 | |
ingress.3517505807.cidr_blocks.# = 0 | |
ingress.3517505807.from_port = 22 | |
ingress.3517505807.protocol = tcp | |
ingress.3517505807.security_groups.# = 2 | |
ingress.3517505807.security_groups.1151619385 = sg-78119b05 | |
ingress.3517505807.security_groups.2513725979 = sg-79119b04 | |
ingress.3517505807.self = false | |
ingress.3517505807.to_port = 22 | |
name = ssh_from_bastion | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = terraform_ssh_from_bastion | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_security_group.bastion_ssh_sg | |
aws_security_group.nat | |
aws_vpc.default | |
aws_security_group.web_access_from_nat_sg: | |
ID = sg-70119b0d | |
description = Allow web access to the private subnet from the public subnet (via NAT instance) | |
egress.# = 1 | |
egress.482069346.cidr_blocks.# = 1 | |
egress.482069346.cidr_blocks.0 = 0.0.0.0/0 | |
egress.482069346.from_port = 0 | |
egress.482069346.prefix_list_ids.# = 0 | |
egress.482069346.protocol = -1 | |
egress.482069346.security_groups.# = 0 | |
egress.482069346.self = false | |
egress.482069346.to_port = 0 | |
ingress.# = 3 | |
ingress.1067346089.cidr_blocks.# = 1 | |
ingress.1067346089.cidr_blocks.0 = 10.0.0.0/24 | |
ingress.1067346089.from_port = -1 | |
ingress.1067346089.protocol = icmp | |
ingress.1067346089.security_groups.# = 0 | |
ingress.1067346089.self = false | |
ingress.1067346089.to_port = -1 | |
ingress.1568533442.cidr_blocks.# = 1 | |
ingress.1568533442.cidr_blocks.0 = 10.0.0.0/24 | |
ingress.1568533442.from_port = 443 | |
ingress.1568533442.protocol = tcp | |
ingress.1568533442.security_groups.# = 0 | |
ingress.1568533442.self = false | |
ingress.1568533442.to_port = 443 | |
ingress.2977749764.cidr_blocks.# = 1 | |
ingress.2977749764.cidr_blocks.0 = 10.0.0.0/24 | |
ingress.2977749764.from_port = 80 | |
ingress.2977749764.protocol = tcp | |
ingress.2977749764.security_groups.# = 0 | |
ingress.2977749764.self = false | |
ingress.2977749764.to_port = 80 | |
name = private_subnet_web_access | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = terraform | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_subnet.decipher_public | |
aws_subnet.decipher_private: | |
ID = subnet-7d992750 | |
availability_zone = us-east-1b | |
cidr_block = 10.0.1.0/24 | |
map_public_ip_on_launch = false | |
tags.% = 1 | |
tags.Name = terraform_private_subnet | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_subnet.decipher_private_2: | |
ID = subnet-72bac73b | |
availability_zone = us-east-1c | |
cidr_block = 10.0.2.0/24 | |
map_public_ip_on_launch = false | |
tags.% = 1 | |
tags.Name = terraform_private_subnet_2 | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_subnet.decipher_public: | |
ID = subnet-6299274f | |
availability_zone = us-east-1b | |
cidr_block = 10.0.0.0/24 | |
map_public_ip_on_launch = false | |
tags.% = 1 | |
tags.Name = terraform_public_subnet | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_vpc.default: | |
ID = vpc-50fe0336 | |
cidr_block = 10.0.0.0/16 | |
default_network_acl_id = acl-c18d31a7 | |
default_route_table_id = rtb-82fedce4 | |
default_security_group_id = sg-7d119b00 | |
dhcp_options_id = dopt-857b9be0 | |
enable_classiclink = false | |
enable_dns_hostnames = true | |
enable_dns_support = true | |
instance_tenancy = default | |
main_route_table_id = rtb-82fedce4 | |
tags.% = 1 | |
tags.Name = terraform_vpc | |
Outputs: | |
bastion_ssh_sg_id = sg-78119b05 | |
nat_sg_id = sg-79119b04 | |
private_subnet_2_id = subnet-72bac73b | |
private_subnet_id = subnet-7d992750 | |
public_subnet_id = subnet-6299274f | |
rds_mysql_sg = sg-76b5ca0b | |
ssh_from_bastion_sg_id = sg-72119b0f | |
vpc_id = vpc-50fe0336 | |
web_access_from_nat_sg_id = sg-70119b0d | |
Shadow state: | |
<no state> | |
module.child: | |
<no state> | |
Outputs: | |
received = 1GB | |
module.instances: | |
aws_eip.zk.0: | |
ID = eipalloc-3eb04400 | |
association_id = eipassoc-b5def18a | |
domain = vpc | |
instance = i-68c81f7f | |
network_interface = eni-a3aae15d | |
private_ip = 10.0.1.231 | |
public_ip = 34.194.147.231 | |
vpc = true | |
Dependencies: | |
aws_instance.zk_node | |
aws_instance.priv_networktest: | |
ID = i-6ec81f79 | |
ami = ami-02417f15 | |
associate_public_ip_address = false | |
availability_zone = us-east-1b | |
disable_api_termination = false | |
ebs_block_device.# = 0 | |
ebs_optimized = false | |
ephemeral_block_device.# = 0 | |
iam_instance_profile = | |
instance_state = running | |
instance_type = t2.micro | |
key_name = test-infrastructure | |
monitoring = false | |
network_interface_id = eni-bba9e245 | |
private_dns = ip-10-0-1-46.ec2.internal | |
private_ip = 10.0.1.46 | |
public_dns = | |
public_ip = | |
root_block_device.# = 1 | |
root_block_device.0.delete_on_termination = true | |
root_block_device.0.iops = 100 | |
root_block_device.0.volume_size = 8 | |
root_block_device.0.volume_type = gp2 | |
security_groups.# = 0 | |
source_dest_check = true | |
subnet_id = subnet-7d992750 | |
tags.% = 1 | |
tags.Name = priv_networktest | |
tenancy = default | |
vpc_security_group_ids.# = 1 | |
vpc_security_group_ids.699898438 = sg-f7470d8a | |
Dependencies: | |
aws_security_group.pub_networktest_sg | |
aws_instance.pub_networktest: | |
ID = i-69c81f7e | |
ami = ami-02417f15 | |
associate_public_ip_address = true | |
availability_zone = us-east-1b | |
disable_api_termination = false | |
ebs_block_device.# = 0 | |
ebs_optimized = false | |
ephemeral_block_device.# = 0 | |
iam_instance_profile = | |
instance_state = running | |
instance_type = t2.micro | |
key_name = test-infrastructure | |
monitoring = false | |
network_interface_id = eni-8fade671 | |
private_dns = ip-10-0-0-61.ec2.internal | |
private_ip = 10.0.0.61 | |
public_dns = ec2-54-90-79-184.compute-1.amazonaws.com | |
public_ip = 54.90.79.184 | |
root_block_device.# = 1 | |
root_block_device.0.delete_on_termination = true | |
root_block_device.0.iops = 100 | |
root_block_device.0.volume_size = 8 | |
root_block_device.0.volume_type = gp2 | |
security_groups.# = 0 | |
source_dest_check = true | |
subnet_id = subnet-6299274f | |
tags.% = 1 | |
tags.Name = pub_networktest | |
tenancy = default | |
vpc_security_group_ids.# = 1 | |
vpc_security_group_ids.699898438 = sg-f7470d8a | |
Dependencies: | |
aws_security_group.pub_networktest_sg | |
aws_instance.pub_odrive: | |
ID = i-c634fdd1 | |
ami = ami-bcd0d7ab | |
associate_public_ip_address = true | |
availability_zone = us-east-1b | |
disable_api_termination = false | |
ebs_block_device.# = 0 | |
ebs_optimized = false | |
ephemeral_block_device.# = 0 | |
iam_instance_profile = | |
instance_state = running | |
instance_type = t2.micro | |
key_name = test-infrastructure | |
monitoring = false | |
network_interface_id = eni-118df1ef | |
private_dns = ip-10-0-0-22.ec2.internal | |
private_ip = 10.0.0.22 | |
public_dns = ec2-107-21-158-0.compute-1.amazonaws.com | |
public_ip = 107.21.158.0 | |
root_block_device.# = 1 | |
root_block_device.0.delete_on_termination = false | |
root_block_device.0.iops = 0 | |
root_block_device.0.volume_size = 8 | |
root_block_device.0.volume_type = standard | |
security_groups.# = 0 | |
source_dest_check = true | |
subnet_id = subnet-6299274f | |
tags.% = 1 | |
tags.Name = pub_odrive | |
tenancy = default | |
vpc_security_group_ids.# = 1 | |
vpc_security_group_ids.1135247480 = sg-185e1d65 | |
Dependencies: | |
aws_security_group.odrive_microservices_sg | |
aws_instance.zk_node.0: | |
ID = i-68c81f7f | |
ami = ami-97a7a180 | |
associate_public_ip_address = true | |
availability_zone = us-east-1b | |
disable_api_termination = false | |
ebs_block_device.# = 0 | |
ebs_optimized = false | |
ephemeral_block_device.# = 0 | |
iam_instance_profile = | |
instance_state = running | |
instance_type = t2.micro | |
key_name = test-infrastructure | |
monitoring = false | |
network_interface_id = eni-a3aae15d | |
private_dns = ip-10-0-1-231.ec2.internal | |
private_ip = 10.0.1.231 | |
public_dns = ec2-34-194-147-231.compute-1.amazonaws.com | |
public_ip = 34.194.147.231 | |
root_block_device.# = 1 | |
root_block_device.0.delete_on_termination = true | |
root_block_device.0.iops = 100 | |
root_block_device.0.volume_size = 8 | |
root_block_device.0.volume_type = gp2 | |
security_groups.# = 0 | |
source_dest_check = true | |
subnet_id = subnet-7d992750 | |
tags.% = 1 | |
tags.Name = zk_node | |
tenancy = default | |
vpc_security_group_ids.# = 1 | |
vpc_security_group_ids.2112837917 = sg-f4470d89 | |
Dependencies: | |
aws_security_group.zk_sg | |
aws_security_group.odrive_microservices_sg: | |
ID = sg-185e1d65 | |
description = Required open ports for object-drive and other microservices | |
egress.# = 1 | |
egress.482069346.cidr_blocks.# = 1 | |
egress.482069346.cidr_blocks.0 = 0.0.0.0/0 | |
egress.482069346.from_port = 0 | |
egress.482069346.prefix_list_ids.# = 0 | |
egress.482069346.protocol = -1 | |
egress.482069346.security_groups.# = 0 | |
egress.482069346.self = false | |
egress.482069346.to_port = 0 | |
ingress.# = 5 | |
ingress.1203902316.cidr_blocks.# = 1 | |
ingress.1203902316.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.1203902316.from_port = 4430 | |
ingress.1203902316.protocol = tcp | |
ingress.1203902316.security_groups.# = 0 | |
ingress.1203902316.self = false | |
ingress.1203902316.to_port = 4430 | |
ingress.1799340084.cidr_blocks.# = 1 | |
ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.1799340084.from_port = -1 | |
ingress.1799340084.protocol = icmp | |
ingress.1799340084.security_groups.# = 0 | |
ingress.1799340084.self = false | |
ingress.1799340084.to_port = -1 | |
ingress.2172623744.cidr_blocks.# = 1 | |
ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2172623744.from_port = 9999 | |
ingress.2172623744.protocol = tcp | |
ingress.2172623744.security_groups.# = 0 | |
ingress.2172623744.self = false | |
ingress.2172623744.to_port = 9999 | |
ingress.2541437006.cidr_blocks.# = 1 | |
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2541437006.from_port = 22 | |
ingress.2541437006.protocol = tcp | |
ingress.2541437006.security_groups.# = 0 | |
ingress.2541437006.self = false | |
ingress.2541437006.to_port = 22 | |
ingress.2617001939.cidr_blocks.# = 1 | |
ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2617001939.from_port = 443 | |
ingress.2617001939.protocol = tcp | |
ingress.2617001939.security_groups.# = 0 | |
ingress.2617001939.self = false | |
ingress.2617001939.to_port = 443 | |
name = odrive_microservices_sg | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = odrive_sg | |
vpc_id = vpc-50fe0336 | |
aws_security_group.pub_networktest_sg: | |
ID = sg-f7470d8a | |
description = Allow traffic to pass from the private subnet to the internet | |
egress.# = 1 | |
egress.482069346.cidr_blocks.# = 1 | |
egress.482069346.cidr_blocks.0 = 0.0.0.0/0 | |
egress.482069346.from_port = 0 | |
egress.482069346.prefix_list_ids.# = 0 | |
egress.482069346.protocol = -1 | |
egress.482069346.security_groups.# = 0 | |
egress.482069346.self = false | |
egress.482069346.to_port = 0 | |
ingress.# = 6 | |
ingress.1799340084.cidr_blocks.# = 1 | |
ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.1799340084.from_port = -1 | |
ingress.1799340084.protocol = icmp | |
ingress.1799340084.security_groups.# = 0 | |
ingress.1799340084.self = false | |
ingress.1799340084.to_port = -1 | |
ingress.2172623744.cidr_blocks.# = 1 | |
ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2172623744.from_port = 9999 | |
ingress.2172623744.protocol = tcp | |
ingress.2172623744.security_groups.# = 0 | |
ingress.2172623744.self = false | |
ingress.2172623744.to_port = 9999 | |
ingress.2214680975.cidr_blocks.# = 1 | |
ingress.2214680975.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2214680975.from_port = 80 | |
ingress.2214680975.protocol = tcp | |
ingress.2214680975.security_groups.# = 0 | |
ingress.2214680975.self = false | |
ingress.2214680975.to_port = 80 | |
ingress.2541437006.cidr_blocks.# = 1 | |
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2541437006.from_port = 22 | |
ingress.2541437006.protocol = tcp | |
ingress.2541437006.security_groups.# = 0 | |
ingress.2541437006.self = false | |
ingress.2541437006.to_port = 22 | |
ingress.2617001939.cidr_blocks.# = 1 | |
ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2617001939.from_port = 443 | |
ingress.2617001939.protocol = tcp | |
ingress.2617001939.security_groups.# = 0 | |
ingress.2617001939.self = false | |
ingress.2617001939.to_port = 443 | |
ingress.516175195.cidr_blocks.# = 1 | |
ingress.516175195.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.516175195.from_port = 8080 | |
ingress.516175195.protocol = tcp | |
ingress.516175195.security_groups.# = 0 | |
ingress.516175195.self = false | |
ingress.516175195.to_port = 8080 | |
name = pub_networktest_sg | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = terraform | |
vpc_id = vpc-50fe0336 | |
aws_security_group.zk_sg: | |
ID = sg-f4470d89 | |
description = Zookeeper ports | |
egress.# = 1 | |
egress.482069346.cidr_blocks.# = 1 | |
egress.482069346.cidr_blocks.0 = 0.0.0.0/0 | |
egress.482069346.from_port = 0 | |
egress.482069346.prefix_list_ids.# = 0 | |
egress.482069346.protocol = -1 | |
egress.482069346.security_groups.# = 0 | |
egress.482069346.self = false | |
egress.482069346.to_port = 0 | |
ingress.# = 3 | |
ingress.1799340084.cidr_blocks.# = 1 | |
ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.1799340084.from_port = -1 | |
ingress.1799340084.protocol = icmp | |
ingress.1799340084.security_groups.# = 0 | |
ingress.1799340084.self = false | |
ingress.1799340084.to_port = -1 | |
ingress.2541437006.cidr_blocks.# = 1 | |
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2541437006.from_port = 22 | |
ingress.2541437006.protocol = tcp | |
ingress.2541437006.security_groups.# = 0 | |
ingress.2541437006.self = false | |
ingress.2541437006.to_port = 22 | |
ingress.4023360382.cidr_blocks.# = 1 | |
ingress.4023360382.cidr_blocks.0 = 10.0.0.0/16 | |
ingress.4023360382.from_port = 2181 | |
ingress.4023360382.protocol = tcp | |
ingress.4023360382.security_groups.# = 0 | |
ingress.4023360382.self = false | |
ingress.4023360382.to_port = 2181 | |
name = zk_sg | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = zk_sg | |
vpc_id = vpc-50fe0336 | |
Outputs: | |
odrive_microservices_sg = sg-185e1d65 | |
pub_networktest_sg = sg-f7470d8a | |
zk_sg = sg-f4470d89 | |
module.rds: | |
aws_db_instance.odrive: | |
ID = tf-20161207154908631239504b4t | |
address = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com | |
allocated_storage = 10 | |
apply_immediately = true | |
arn = arn:aws:rds:us-east-1:706634194319:db:tf-20161207154908631239504b4t | |
auto_minor_version_upgrade = true | |
availability_zone = us-east-1b | |
backup_retention_period = 0 | |
backup_window = 07:37-08:07 | |
copy_tags_to_snapshot = false | |
db_subnet_group_name = main | |
endpoint = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com:3306 | |
engine = mysql | |
engine_version = 5.6.27 | |
hosted_zone_id = Z2R2ITUGPM61AM | |
identifier = tf-20161207154908631239504b4t | |
instance_class = db.t2.micro | |
iops = 0 | |
kms_key_id = | |
license_model = general-public-license | |
maintenance_window = mon:10:19-mon:10:49 | |
monitoring_interval = 0 | |
multi_az = false | |
name = metadatadb | |
option_group_name = default:mysql-5-6 | |
parameter_group_name = odrive-pg | |
password = dbRootPassword | |
port = 3306 | |
publicly_accessible = true | |
replicas.# = 0 | |
replicate_source_db = | |
security_group_names.# = 0 | |
skip_final_snapshot = true | |
status = available | |
storage_encrypted = false | |
storage_type = standard | |
tags.% = 0 | |
username = dbRootUser | |
vpc_security_group_ids.# = 1 | |
vpc_security_group_ids.955802421 = sg-76b5ca0b | |
Dependencies: | |
aws_db_subnet_group.main | |
aws_db_parameter_group.odrive_pg | |
aws_db_parameter_group.odrive_pg: | |
ID = odrive-pg | |
arn = arn:aws:rds:us-east-1:706634194319:pg:odrive-pg | |
description = Custom Parameter Group for Object Drive | |
family = mysql5.6 | |
name = odrive-pg | |
parameter.# = 1 | |
parameter.950177639.apply_method = immediate | |
parameter.950177639.name = log_bin_trust_function_creators | |
parameter.950177639.value = 1 | |
tags.% = 0 | |
aws_db_subnet_group.main: | |
ID = main | |
arn = arn:aws:rds:us-east-1:706634194319:subgrp:main | |
description = Managed by Terraform | |
name = main | |
subnet_ids.# = 3 | |
subnet_ids.2727810170 = subnet-72bac73b | |
subnet_ids.741755728 = subnet-7d992750 | |
subnet_ids.998920899 = subnet-6299274f | |
tags.% = 1 | |
tags.Name = terraform_db_subnet_group | |
module.vpc: | |
aws_eip.nat: | |
ID = eipalloc-c15748fe | |
association_id = eipassoc-56c7e869 | |
domain = vpc | |
instance = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
network_interface = eni-73c78c8d | |
private_ip = 10.0.0.34 | |
public_ip = 34.193.25.59 | |
vpc = true | |
Dependencies: | |
aws_instance.nat | |
aws_instance.nat: | |
ID = i-e8fe29ff | |
ami = ami-0dd7e61a | |
associate_public_ip_address = true | |
availability_zone = us-east-1b | |
disable_api_termination = false | |
ebs_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
ebs_optimized = false | |
ephemeral_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
iam_instance_profile = | |
instance_state = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
instance_type = t2.small | |
key_name = test-infrastructure | |
monitoring = false | |
network_interface_id = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
placement_group = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
private_dns = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
private_ip = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
public_dns = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
public_ip = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
root_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
root_block_device.0.delete_on_termination = true | |
root_block_device.0.iops = 100 | |
root_block_device.0.volume_size = 8 | |
root_block_device.0.volume_type = gp2 | |
security_groups.# = 2 | |
security_groups.2513725979 = sg-79119b04 | |
security_groups.955802421 = sg-76b5ca0b | |
source_dest_check = false | |
subnet_id = subnet-6299274f | |
tags.% = 1 | |
tags.Name = terraform_nat_instance | |
tenancy = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
vpc_security_group_ids.# = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
vpc_security_group_ids.2513725979 = sg-79119b04 | |
vpc_security_group_ids.955802421 = sg-76b5ca0b | |
Dependencies: | |
aws_security_group.rds_mysql_sg | |
aws_subnet.decipher_public | |
aws_security_group.nat | |
aws_internet_gateway.default: | |
ID = igw-51883236 | |
tags.% = 1 | |
tags.Name = terraform_igw | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_route_table.decipher_private: | |
ID = rtb-6afddf0c | |
propagating_vgws.# = 0 | |
route.# = 1 | |
route.~2469360411.cidr_block = 0.0.0.0/0 | |
route.~2469360411.gateway_id = | |
route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
route.~2469360411.nat_gateway_id = | |
route.~2469360411.network_interface_id = | |
route.~2469360411.vpc_peering_connection_id = | |
tags.% = 1 | |
tags.Name = terraform_private_subnet_route_table | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_instance.nat | |
aws_route_table.decipher_private_2: | |
ID = rtb-56a39130 | |
propagating_vgws.# = 0 | |
route.# = 1 | |
route.~2469360411.cidr_block = 0.0.0.0/0 | |
route.~2469360411.gateway_id = | |
route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66 | |
route.~2469360411.nat_gateway_id = | |
route.~2469360411.network_interface_id = | |
route.~2469360411.vpc_peering_connection_id = | |
tags.% = 1 | |
tags.Name = terraform_private_subnet_2_route_table | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_instance.nat | |
aws_vpc.default | |
aws_route_table.decipher_public: | |
ID = rtb-8efedce8 | |
propagating_vgws.# = 0 | |
route.# = 1 | |
route.3761165403.cidr_block = 0.0.0.0/0 | |
route.3761165403.gateway_id = igw-51883236 | |
route.3761165403.instance_id = | |
route.3761165403.nat_gateway_id = | |
route.3761165403.network_interface_id = | |
route.3761165403.vpc_peering_connection_id = | |
tags.% = 1 | |
tags.Name = terraform_public_subnet_route_table | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_internet_gateway.default | |
aws_route_table_association.decipher_private: | |
ID = rtbassoc-b8c0f5c1 | |
route_table_id = rtb-6afddf0c | |
subnet_id = subnet-7d992750 | |
Dependencies: | |
aws_subnet.decipher_private | |
aws_route_table.decipher_private | |
aws_route_table_association.decipher_private_2: | |
ID = rtbassoc-c0e4e5b9 | |
route_table_id = rtb-56a39130 | |
subnet_id = subnet-72bac73b | |
Dependencies: | |
aws_subnet.decipher_private_2 | |
aws_route_table.decipher_private_2 | |
aws_route_table_association.decipher_public: | |
ID = rtbassoc-29c6f350 | |
route_table_id = rtb-8efedce8 | |
subnet_id = subnet-6299274f | |
Dependencies: | |
aws_subnet.decipher_public | |
aws_route_table.decipher_public | |
aws_security_group.bastion_ssh_sg: | |
ID = sg-78119b05 | |
description = Allow SSH to Bastion host from approved ranges | |
egress.# = 1 | |
egress.482069346.cidr_blocks.# = 1 | |
egress.482069346.cidr_blocks.0 = 0.0.0.0/0 | |
egress.482069346.from_port = 0 | |
egress.482069346.prefix_list_ids.# = 0 | |
egress.482069346.protocol = -1 | |
egress.482069346.security_groups.# = 0 | |
egress.482069346.self = false | |
egress.482069346.to_port = 0 | |
ingress.# = 1 | |
ingress.2541437006.cidr_blocks.# = 1 | |
ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.2541437006.from_port = 22 | |
ingress.2541437006.protocol = tcp | |
ingress.2541437006.security_groups.# = 0 | |
ingress.2541437006.self = false | |
ingress.2541437006.to_port = 22 | |
name = bastion_ssh | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = terraform_bastion_ssh | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_security_group.nat: | |
ID = sg-79119b04 | |
description = Allow traffic to pass from the private subnet to the internet | |
egress.# = 1 | |
egress.482069346.cidr_blocks.# = 1 | |
egress.482069346.cidr_blocks.0 = 0.0.0.0/0 | |
egress.482069346.from_port = 0 | |
egress.482069346.prefix_list_ids.# = 0 | |
egress.482069346.protocol = -1 | |
egress.482069346.security_groups.# = 0 | |
egress.482069346.self = false | |
egress.482069346.to_port = 0 | |
ingress.# = 3 | |
ingress.2582209309.cidr_blocks.# = 1 | |
ingress.2582209309.cidr_blocks.0 = 10.0.1.0/24 | |
ingress.2582209309.from_port = -1 | |
ingress.2582209309.protocol = icmp | |
ingress.2582209309.security_groups.# = 0 | |
ingress.2582209309.self = false | |
ingress.2582209309.to_port = -1 | |
ingress.386650288.cidr_blocks.# = 1 | |
ingress.386650288.cidr_blocks.0 = 10.0.1.0/24 | |
ingress.386650288.from_port = 80 | |
ingress.386650288.protocol = tcp | |
ingress.386650288.security_groups.# = 0 | |
ingress.386650288.self = false | |
ingress.386650288.to_port = 80 | |
ingress.4211794038.cidr_blocks.# = 1 | |
ingress.4211794038.cidr_blocks.0 = 10.0.1.0/24 | |
ingress.4211794038.from_port = 443 | |
ingress.4211794038.protocol = tcp | |
ingress.4211794038.security_groups.# = 0 | |
ingress.4211794038.self = false | |
ingress.4211794038.to_port = 443 | |
name = vpc_nat | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = terraform | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_security_group.rds_mysql_sg: | |
ID = sg-76b5ca0b | |
description = Allow traffic to pass from internet to RDS MySQL | |
egress.# = 1 | |
egress.482069346.cidr_blocks.# = 1 | |
egress.482069346.cidr_blocks.0 = 0.0.0.0/0 | |
egress.482069346.from_port = 0 | |
egress.482069346.prefix_list_ids.# = 0 | |
egress.482069346.protocol = -1 | |
egress.482069346.security_groups.# = 0 | |
egress.482069346.self = false | |
egress.482069346.to_port = 0 | |
ingress.# = 1 | |
ingress.1163740523.cidr_blocks.# = 1 | |
ingress.1163740523.cidr_blocks.0 = 0.0.0.0/0 | |
ingress.1163740523.from_port = 3306 | |
ingress.1163740523.protocol = tcp | |
ingress.1163740523.security_groups.# = 0 | |
ingress.1163740523.self = false | |
ingress.1163740523.to_port = 3306 | |
name = rds_mysql | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = terraform | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_security_group.ssh_from_bastion_sg: | |
ID = sg-72119b0f | |
description = Allow SSH from Bastion host(s) | |
egress.# = 0 | |
ingress.# = 1 | |
ingress.3517505807.cidr_blocks.# = 0 | |
ingress.3517505807.from_port = 22 | |
ingress.3517505807.protocol = tcp | |
ingress.3517505807.security_groups.# = 2 | |
ingress.3517505807.security_groups.1151619385 = sg-78119b05 | |
ingress.3517505807.security_groups.2513725979 = sg-79119b04 | |
ingress.3517505807.self = false | |
ingress.3517505807.to_port = 22 | |
name = ssh_from_bastion | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = terraform_ssh_from_bastion | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_security_group.bastion_ssh_sg | |
aws_security_group.nat | |
aws_vpc.default | |
aws_security_group.web_access_from_nat_sg: | |
ID = sg-70119b0d | |
description = Allow web access to the private subnet from the public subnet (via NAT instance) | |
egress.# = 1 | |
egress.482069346.cidr_blocks.# = 1 | |
egress.482069346.cidr_blocks.0 = 0.0.0.0/0 | |
egress.482069346.from_port = 0 | |
egress.482069346.prefix_list_ids.# = 0 | |
egress.482069346.protocol = -1 | |
egress.482069346.security_groups.# = 0 | |
egress.482069346.self = false | |
egress.482069346.to_port = 0 | |
ingress.# = 3 | |
ingress.1067346089.cidr_blocks.# = 1 | |
ingress.1067346089.cidr_blocks.0 = 10.0.0.0/24 | |
ingress.1067346089.from_port = -1 | |
ingress.1067346089.protocol = icmp | |
ingress.1067346089.security_groups.# = 0 | |
ingress.1067346089.self = false | |
ingress.1067346089.to_port = -1 | |
ingress.1568533442.cidr_blocks.# = 1 | |
ingress.1568533442.cidr_blocks.0 = 10.0.0.0/24 | |
ingress.1568533442.from_port = 443 | |
ingress.1568533442.protocol = tcp | |
ingress.1568533442.security_groups.# = 0 | |
ingress.1568533442.self = false | |
ingress.1568533442.to_port = 443 | |
ingress.2977749764.cidr_blocks.# = 1 | |
ingress.2977749764.cidr_blocks.0 = 10.0.0.0/24 | |
ingress.2977749764.from_port = 80 | |
ingress.2977749764.protocol = tcp | |
ingress.2977749764.security_groups.# = 0 | |
ingress.2977749764.self = false | |
ingress.2977749764.to_port = 80 | |
name = private_subnet_web_access | |
owner_id = 706634194319 | |
tags.% = 1 | |
tags.Name = terraform | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_subnet.decipher_public | |
aws_subnet.decipher_private: | |
ID = subnet-7d992750 | |
availability_zone = us-east-1b | |
cidr_block = 10.0.1.0/24 | |
map_public_ip_on_launch = false | |
tags.% = 1 | |
tags.Name = terraform_private_subnet | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_subnet.decipher_private_2: | |
ID = subnet-72bac73b | |
availability_zone = us-east-1c | |
cidr_block = 10.0.2.0/24 | |
map_public_ip_on_launch = false | |
tags.% = 1 | |
tags.Name = terraform_private_subnet_2 | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_subnet.decipher_public: | |
ID = subnet-6299274f | |
availability_zone = us-east-1b | |
cidr_block = 10.0.0.0/24 | |
map_public_ip_on_launch = false | |
tags.% = 1 | |
tags.Name = terraform_public_subnet | |
vpc_id = vpc-50fe0336 | |
Dependencies: | |
aws_vpc.default | |
aws_vpc.default: | |
ID = vpc-50fe0336 | |
cidr_block = 10.0.0.0/16 | |
default_network_acl_id = acl-c18d31a7 | |
default_route_table_id = rtb-82fedce4 | |
default_security_group_id = sg-7d119b00 | |
dhcp_options_id = dopt-857b9be0 | |
enable_classiclink = false | |
enable_dns_hostnames = true | |
enable_dns_support = true | |
instance_tenancy = default | |
main_route_table_id = rtb-82fedce4 | |
tags.% = 1 | |
tags.Name = terraform_vpc | |
Outputs: | |
bastion_ssh_sg_id = sg-78119b05 | |
nat_sg_id = sg-79119b04 | |
private_subnet_2_id = subnet-72bac73b | |
private_subnet_id = subnet-7d992750 | |
public_subnet_id = subnet-6299274f | |
rds_mysql_sg = sg-76b5ca0b | |
ssh_from_bastion_sg_id = sg-72119b0f | |
vpc_id = vpc-50fe0336 | |
web_access_from_nat_sg_id = sg-70119b0d | |
* plan operation: Real and shadow diffs do not match! Real diff: | |
module.instances: | |
UPDATE: aws_eip.zk.0 | |
instance: "i-68c81f7f" => "<computed>" | |
CREATE: aws_eip.zk.1 | |
allocation_id: "" => "<computed>" | |
association_id: "" => "<computed>" | |
domain: "" => "<computed>" | |
instance: "" => "<computed>" | |
network_interface: "" => "<computed>" | |
private_ip: "" => "<computed>" | |
public_ip: "" => "<computed>" | |
vpc: "" => "true" (forces new resource) | |
CREATE: aws_eip.zk.2 | |
allocation_id: "" => "<computed>" | |
association_id: "" => "<computed>" | |
domain: "" => "<computed>" | |
instance: "" => "<computed>" | |
network_interface: "" => "<computed>" | |
private_ip: "" => "<computed>" | |
public_ip: "" => "<computed>" | |
vpc: "" => "true" (forces new resource) | |
CREATE: aws_instance.zk_node.1 | |
ami: "" => "ami-97a7a180" (forces new resource) | |
associate_public_ip_address: "" => "true" (forces new resource) | |
availability_zone: "" => "us-east-1b" (forces new resource) | |
ebs_block_device.#: "" => "<computed>" | |
ephemeral_block_device.#: "" => "<computed>" (forces new resource) | |
instance_state: "" => "<computed>" | |
instance_type: "" => "t2.micro" (forces new resource) | |
key_name: "" => "test-infrastructure" (forces new resource) | |
network_interface_id: "" => "<computed>" | |
placement_group: "" => "<computed>" (forces new resource) | |
private_dns: "" => "<computed>" | |
private_ip: "" => "<computed>" (forces new resource) | |
public_dns: "" => "<computed>" | |
public_ip: "" => "<computed>" | |
root_block_device.#: "" => "<computed>" | |
security_groups.#: "" => "<computed>" (forces new resource) | |
source_dest_check: "" => "true" | |
subnet_id: "" => "subnet-7d992750" (forces new resource) | |
tags.%: "" => "1" | |
tags.Name: "" => "zk_node" | |
tenancy: "" => "<computed>" (forces new resource) | |
vpc_security_group_ids.#: "" => "1" | |
vpc_security_group_ids.2112837917: "" => "sg-f4470d89" | |
CREATE: aws_instance.zk_node.2 | |
ami: "" => "ami-97a7a180" (forces new resource) | |
associate_public_ip_address: "" => "true" (forces new resource) | |
availability_zone: "" => "us-east-1b" (forces new resource) | |
ebs_block_device.#: "" => "<computed>" | |
ephemeral_block_device.#: "" => "<computed>" (forces new resource) | |
instance_state: "" => "<computed>" | |
instance_type: "" => "t2.micro" (forces new resource) | |
key_name: "" => "test-infrastructure" (forces new resource) | |
network_interface_id: "" => "<computed>" | |
placement_group: "" => "<computed>" (forces new resource) | |
private_dns: "" => "<computed>" | |
private_ip: "" => "<computed>" (forces new resource) | |
public_dns: "" => "<computed>" | |
public_ip: "" => "<computed>" | |
root_block_device.#: "" => "<computed>" | |
security_groups.#: "" => "<computed>" (forces new resource) | |
source_dest_check: "" => "true" | |
subnet_id: "" => "subnet-7d992750" (forces new resource) | |
tags.%: "" => "1" | |
tags.Name: "" => "zk_node" | |
tenancy: "" => "<computed>" (forces new resource) | |
vpc_security_group_ids.#: "" => "1" | |
vpc_security_group_ids.2112837917: "" => "sg-f4470d89" | |
module.rds: | |
module.vpc: | |
UPDATE: aws_eip.nat | |
instance: "i-e8fe29ff" => "<computed>" | |
DESTROY/CREATE: aws_instance.nat | |
ami: "ami-0dd7e61a" => "ami-0dd7e61a" | |
associate_public_ip_address: "true" => "true" | |
availability_zone: "us-east-1b" => "us-east-1b" | |
ebs_block_device.#: "0" => "<computed>" | |
ephemeral_block_device.#: "0" => "<computed>" | |
instance_state: "running" => "<computed>" | |
instance_type: "t2.small" => "t2.small" | |
key_name: "test-infrastructure" => "test-infrastructure" | |
network_interface_id: "eni-73c78c8d" => "<computed>" | |
placement_group: "" => "<computed>" | |
private_dns: "ip-10-0-0-34.ec2.internal" => "<computed>" | |
private_ip: "10.0.0.34" => "<computed>" | |
public_dns: "ec2-34-193-25-59.compute-1.amazonaws.com" => "<computed>" | |
public_ip: "34.193.25.59" => "<computed>" | |
root_block_device.#: "1" => "<computed>" | |
security_groups.#: "0" => "2" (forces new resource) | |
security_groups.2513725979: "" => "sg-79119b04" (forces new resource) | |
security_groups.955802421: "" => "sg-76b5ca0b" (forces new resource) | |
source_dest_check: "false" => "false" | |
subnet_id: "subnet-6299274f" => "subnet-6299274f" | |
tags.%: "1" => "1" | |
tags.Name: "terraform_nat_instance" => "terraform_nat_instance" | |
tenancy: "default" => "<computed>" | |
vpc_security_group_ids.#: "2" => "<computed>" | |
UPDATE: aws_route_table.decipher_private | |
route.924992980.cidr_block: "0.0.0.0/0" => "" | |
route.924992980.gateway_id: "" => "" | |
route.924992980.instance_id: "i-e8fe29ff" => "" | |
route.924992980.nat_gateway_id: "" => "" | |
route.924992980.network_interface_id: "eni-73c78c8d" => "" | |
route.924992980.vpc_peering_connection_id: "" => "" | |
route.~2469360411.cidr_block: "" => "0.0.0.0/0" | |
route.~2469360411.gateway_id: "" => "" | |
route.~2469360411.instance_id: "" => "<computed>" | |
route.~2469360411.nat_gateway_id: "" => "" | |
route.~2469360411.network_interface_id: "" => "" | |
route.~2469360411.vpc_peering_connection_id: "" => "" | |
UPDATE: aws_route_table.decipher_private_2 | |
route.924992980.cidr_block: "0.0.0.0/0" => "" | |
route.924992980.gateway_id: "" => "" | |
route.924992980.instance_id: "i-e8fe29ff" => "" | |
route.924992980.nat_gateway_id: "" => "" | |
route.924992980.network_interface_id: "eni-73c78c8d" => "" | |
route.924992980.vpc_peering_connection_id: "" => "" | |
route.~2469360411.cidr_block: "" => "0.0.0.0/0" | |
route.~2469360411.gateway_id: "" => "" | |
route.~2469360411.instance_id: "" => "<computed>" | |
route.~2469360411.nat_gateway_id: "" => "" | |
route.~2469360411.network_interface_id: "" => "" | |
route.~2469360411.vpc_peering_connection_id: "" => "" | |
Shadow diff: | |
module.instances: | |
CREATE: aws_instance.zk_node.1 | |
ami: "" => "ami-97a7a180" (forces new resource) | |
associate_public_ip_address: "" => "true" (forces new resource) | |
availability_zone: "" => "us-east-1b" (forces new resource) | |
ebs_block_device.#: "" => "<computed>" | |
ephemeral_block_device.#: "" => "<computed>" (forces new resource) | |
instance_state: "" => "<computed>" | |
instance_type: "" => "t2.micro" (forces new resource) | |
key_name: "" => "test-infrastructure" (forces new resource) | |
network_interface_id: "" => "<computed>" | |
placement_group: "" => "<computed>" (forces new resource) | |
private_dns: "" => "<computed>" | |
private_ip: "" => "<computed>" (forces new resource) | |
public_dns: "" => "<computed>" | |
public_ip: "" => "<computed>" | |
root_block_device.#: "" => "<computed>" | |
security_groups.#: "" => "<computed>" (forces new resource) | |
source_dest_check: "" => "true" | |
subnet_id: "" => "subnet-7d992750" (forces new resource) | |
tags.%: "" => "1" | |
tags.Name: "" => "zk_node" | |
tenancy: "" => "<computed>" (forces new resource) | |
vpc_security_group_ids.#: "" => "1" | |
vpc_security_group_ids.2112837917: "" => "sg-f4470d89" | |
CREATE: aws_instance.zk_node.2 | |
ami: "" => "ami-97a7a180" (forces new resource) | |
associate_public_ip_address: "" => "true" (forces new resource) | |
availability_zone: "" => "us-east-1b" (forces new resource) | |
ebs_block_device.#: "" => "<computed>" | |
ephemeral_block_device.#: "" => "<computed>" (forces new resource) | |
instance_state: "" => "<computed>" | |
instance_type: "" => "t2.micro" (forces new resource) | |
key_name: "" => "test-infrastructure" (forces new resource) | |
network_interface_id: "" => "<computed>" | |
placement_group: "" => "<computed>" (forces new resource) | |
private_dns: "" => "<computed>" | |
private_ip: "" => "<computed>" (forces new resource) | |
public_dns: "" => "<computed>" | |
public_ip: "" => "<computed>" | |
root_block_device.#: "" => "<computed>" | |
security_groups.#: "" => "<computed>" (forces new resource) | |
source_dest_check: "" => "true" | |
subnet_id: "" => "subnet-7d992750" (forces new resource) | |
tags.%: "" => "1" | |
tags.Name: "" => "zk_node" | |
tenancy: "" => "<computed>" (forces new resource) | |
vpc_security_group_ids.#: "" => "1" | |
vpc_security_group_ids.2112837917: "" => "sg-f4470d89" | |
module.rds: | |
module.vpc: | |
UPDATE: aws_eip.nat | |
instance: "i-e8fe29ff" => "<computed>" | |
DESTROY/CREATE: aws_instance.nat | |
ami: "ami-0dd7e61a" => "ami-0dd7e61a" | |
associate_public_ip_address: "true" => "true" | |
availability_zone: "us-east-1b" => "us-east-1b" | |
ebs_block_device.#: "0" => "<computed>" | |
ephemeral_block_device.#: "0" => "<computed>" | |
instance_state: "running" => "<computed>" | |
instance_type: "t2.small" => "t2.small" | |
key_name: "test-infrastructure" => "test-infrastructure" | |
network_interface_id: "eni-73c78c8d" => "<computed>" | |
placement_group: "" => "<computed>" | |
private_dns: "ip-10-0-0-34.ec2.internal" => "<computed>" | |
private_ip: "10.0.0.34" => "<computed>" | |
public_dns: "ec2-34-193-25-59.compute-1.amazonaws.com" => "<computed>" | |
public_ip: "34.193.25.59" => "<computed>" | |
root_block_device.#: "1" => "<computed>" | |
security_groups.#: "0" => "2" (forces new resource) | |
security_groups.2513725979: "" => "sg-79119b04" (forces new resource) | |
security_groups.955802421: "" => "sg-76b5ca0b" (forces new resource) | |
source_dest_check: "false" => "false" | |
subnet_id: "subnet-6299274f" => "subnet-6299274f" | |
tags.%: "1" => "1" | |
tags.Name: "terraform_nat_instance" => "terraform_nat_instance" | |
tenancy: "default" => "<computed>" | |
vpc_security_group_ids.#: "2" => "<computed>" | |
UPDATE: aws_route_table.decipher_private | |
route.924992980.cidr_block: "0.0.0.0/0" => "" | |
route.924992980.gateway_id: "" => "" | |
route.924992980.instance_id: "i-e8fe29ff" => "" | |
route.924992980.nat_gateway_id: "" => "" | |
route.924992980.network_interface_id: "eni-73c78c8d" => "" | |
route.924992980.vpc_peering_connection_id: "" => "" | |
route.~2469360411.cidr_block: "" => "0.0.0.0/0" | |
route.~2469360411.gateway_id: "" => "" | |
route.~2469360411.instance_id: "" => "<computed>" | |
route.~2469360411.nat_gateway_id: "" => "" | |
route.~2469360411.network_interface_id: "" => "" | |
route.~2469360411.vpc_peering_connection_id: "" => "" | |
UPDATE: aws_route_table.decipher_private_2 | |
route.924992980.cidr_block: "0.0.0.0/0" => "" | |
route.924992980.gateway_id: "" => "" | |
route.924992980.instance_id: "i-e8fe29ff" => "" | |
route.924992980.nat_gateway_id: "" => "" | |
route.924992980.network_interface_id: "eni-73c78c8d" => "" | |
route.924992980.vpc_peering_connection_id: "" => "" | |
route.~2469360411.cidr_block: "" => "0.0.0.0/0" | |
route.~2469360411.gateway_id: "" => "" | |
route.~2469360411.instance_id: "" => "<computed>" | |
route.~2469360411.nat_gateway_id: "" => "" | |
route.~2469360411.network_interface_id: "" => "" | |
route.~2469360411.vpc_peering_connection_id: "" => "" | |
* plan operation: Resource 'aws_instance.zk_node.1' does not have attribute 'id' for variable 'aws_instance.zk_node.1.id' | |
* plan operation: Resource 'aws_instance.zk_node.1' does not have attribute 'id' for variable 'aws_instance.zk_node.1.id' | |
* plan operation: Resource 'aws_instance.zk_node.1' does not have attribute 'id' for variable 'aws_instance.zk_node.1.id' |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment