Created
January 2, 2019 19:50
-
-
Save bernadinm/52a62dff96fcefb630a7736a15847f3f to your computer and use it in GitHub Desktop.
terraform plan | terraform-aws-provider GH issue
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ terraform plan | |
Refreshing Terraform state in-memory prior to plan... | |
The refreshed state will be used to calculate this plan, but will not be | |
persisted to local or remote state storage. | |
------------------------------------------------------------------------ | |
An execution plan has been generated and is shown below. | |
Resource actions are indicated with the following symbols: | |
+ create | |
~ update in-place | |
Terraform will perform the following actions: | |
~ data.aws_security_group.peer | |
id: "" => <computed> | |
arn: "" => <computed> | |
description: "" => <computed> | |
filter.#: "0" => "2" | |
filter.3852289641.name: "" => "group-name" | |
filter.3852289641.values.#: "0" => "1" | |
filter.3852289641.values.1089655979: "" => "*internal-firewall*" | |
filter.~1869655805.name: "" => "vpc-id" | |
filter.~1869655805.values.#: "" => <computed> | |
name: "" => <computed> | |
tags.%: "" => <computed> | |
vpc_id: "" => <computed> | |
~ data.aws_security_group.this | |
id: "" => <computed> | |
arn: "" => <computed> | |
description: "" => <computed> | |
filter.#: "0" => "2" | |
filter.3852289641.name: "" => "group-name" | |
filter.3852289641.values.#: "0" => "1" | |
filter.3852289641.values.1089655979: "" => "*internal-firewall*" | |
filter.~1869655805.name: "" => "vpc-id" | |
filter.~1869655805.values.#: "" => <computed> | |
name: "" => <computed> | |
tags.%: "" => <computed> | |
vpc_id: "" => <computed> | |
+ aws_security_group.peer | |
id: <computed> | |
arn: <computed> | |
description: "Allow all inbound traffic" | |
egress.#: <computed> | |
ingress.#: "1" | |
ingress.482069346.cidr_blocks.#: "1" | |
ingress.482069346.cidr_blocks.0: "0.0.0.0/0" | |
ingress.482069346.description: "" | |
ingress.482069346.from_port: "0" | |
ingress.482069346.ipv6_cidr_blocks.#: "0" | |
ingress.482069346.prefix_list_ids.#: "0" | |
ingress.482069346.protocol: "-1" | |
ingress.482069346.security_groups.#: "0" | |
ingress.482069346.self: "false" | |
ingress.482069346.to_port: "0" | |
name: "test-internal-firewall" | |
owner_id: <computed> | |
revoke_rules_on_delete: "false" | |
vpc_id: "${aws_vpc.region2.id}" | |
+ aws_security_group.this | |
id: <computed> | |
arn: <computed> | |
description: "Allow all inbound traffic" | |
egress.#: <computed> | |
ingress.#: "1" | |
ingress.482069346.cidr_blocks.#: "1" | |
ingress.482069346.cidr_blocks.0: "0.0.0.0/0" | |
ingress.482069346.description: "" | |
ingress.482069346.from_port: "0" | |
ingress.482069346.ipv6_cidr_blocks.#: "0" | |
ingress.482069346.prefix_list_ids.#: "0" | |
ingress.482069346.protocol: "-1" | |
ingress.482069346.security_groups.#: "0" | |
ingress.482069346.self: "false" | |
ingress.482069346.to_port: "0" | |
name: "test-internal-firewall" | |
owner_id: <computed> | |
revoke_rules_on_delete: "false" | |
vpc_id: "${aws_vpc.region1.id}" | |
+ aws_vpc.region1 | |
id: <computed> | |
arn: <computed> | |
assign_generated_ipv6_cidr_block: "false" | |
cidr_block: "10.1.0.0/16" | |
default_network_acl_id: <computed> | |
default_route_table_id: <computed> | |
default_security_group_id: <computed> | |
dhcp_options_id: <computed> | |
enable_classiclink: <computed> | |
enable_classiclink_dns_support: <computed> | |
enable_dns_hostnames: <computed> | |
enable_dns_support: "true" | |
instance_tenancy: "default" | |
ipv6_association_id: <computed> | |
ipv6_cidr_block: <computed> | |
main_route_table_id: <computed> | |
owner_id: <computed> | |
+ aws_vpc.region2 | |
id: <computed> | |
arn: <computed> | |
assign_generated_ipv6_cidr_block: "false" | |
cidr_block: "10.2.0.0/16" | |
default_network_acl_id: <computed> | |
default_route_table_id: <computed> | |
default_security_group_id: <computed> | |
dhcp_options_id: <computed> | |
enable_classiclink: <computed> | |
enable_classiclink_dns_support: <computed> | |
enable_dns_hostnames: <computed> | |
enable_dns_support: "true" | |
instance_tenancy: "default" | |
ipv6_association_id: <computed> | |
ipv6_cidr_block: <computed> | |
main_route_table_id: <computed> | |
owner_id: <computed> | |
Plan: 4 to add, 2 to change, 0 to destroy. | |
------------------------------------------------------------------------ | |
Note: You didn't specify an "-out" parameter to save this plan, so Terraform | |
can't guarantee that exactly these actions will be performed if | |
"terraform apply" is subsequently run. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment