Created
January 2, 2019 19:52
-
-
Save bernadinm/c3bbb54e420ead2d13cbc24270b3ec09 to your computer and use it in GitHub Desktop.
terraform apply | terraform-aws-provider GH issue
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ terraform apply | |
An execution plan has been generated and is shown below. | |
Resource actions are indicated with the following symbols: | |
+ create | |
~ update in-place | |
Terraform will perform the following actions: | |
~ data.aws_security_group.peer | |
id: "" => <computed> | |
arn: "" => <computed> | |
description: "" => <computed> | |
filter.#: "0" => "2" | |
filter.3852289641.name: "" => "group-name" | |
filter.3852289641.values.#: "0" => "1" | |
filter.3852289641.values.1089655979: "" => "*internal-firewall*" | |
filter.~1869655805.name: "" => "vpc-id" | |
filter.~1869655805.values.#: "" => <computed> | |
name: "" => <computed> | |
tags.%: "" => <computed> | |
vpc_id: "" => <computed> | |
~ data.aws_security_group.this | |
id: "" => <computed> | |
arn: "" => <computed> | |
description: "" => <computed> | |
filter.#: "0" => "2" | |
filter.3852289641.name: "" => "group-name" | |
filter.3852289641.values.#: "0" => "1" | |
filter.3852289641.values.1089655979: "" => "*internal-firewall*" | |
filter.~1869655805.name: "" => "vpc-id" | |
filter.~1869655805.values.#: "" => <computed> | |
name: "" => <computed> | |
tags.%: "" => <computed> | |
vpc_id: "" => <computed> | |
+ aws_security_group.peer | |
id: <computed> | |
arn: <computed> | |
description: "Allow all inbound traffic" | |
egress.#: <computed> | |
ingress.#: "1" | |
ingress.482069346.cidr_blocks.#: "1" | |
ingress.482069346.cidr_blocks.0: "0.0.0.0/0" | |
ingress.482069346.description: "" | |
ingress.482069346.from_port: "0" | |
ingress.482069346.ipv6_cidr_blocks.#: "0" | |
ingress.482069346.prefix_list_ids.#: "0" | |
ingress.482069346.protocol: "-1" | |
ingress.482069346.security_groups.#: "0" | |
ingress.482069346.self: "false" | |
ingress.482069346.to_port: "0" | |
name: "test-internal-firewall" | |
owner_id: <computed> | |
revoke_rules_on_delete: "false" | |
vpc_id: "${aws_vpc.region2.id}" | |
+ aws_security_group.this | |
id: <computed> | |
arn: <computed> | |
description: "Allow all inbound traffic" | |
egress.#: <computed> | |
ingress.#: "1" | |
ingress.482069346.cidr_blocks.#: "1" | |
ingress.482069346.cidr_blocks.0: "0.0.0.0/0" | |
ingress.482069346.description: "" | |
ingress.482069346.from_port: "0" | |
ingress.482069346.ipv6_cidr_blocks.#: "0" | |
ingress.482069346.prefix_list_ids.#: "0" | |
ingress.482069346.protocol: "-1" | |
ingress.482069346.security_groups.#: "0" | |
ingress.482069346.self: "false" | |
ingress.482069346.to_port: "0" | |
name: "test-internal-firewall" | |
owner_id: <computed> | |
revoke_rules_on_delete: "false" | |
vpc_id: "${aws_vpc.region1.id}" | |
+ aws_vpc.region1 | |
id: <computed> | |
arn: <computed> | |
assign_generated_ipv6_cidr_block: "false" | |
cidr_block: "10.1.0.0/16" | |
default_network_acl_id: <computed> | |
default_route_table_id: <computed> | |
default_security_group_id: <computed> | |
dhcp_options_id: <computed> | |
enable_classiclink: <computed> | |
enable_classiclink_dns_support: <computed> | |
enable_dns_hostnames: <computed> | |
enable_dns_support: "true" | |
instance_tenancy: "default" | |
ipv6_association_id: <computed> | |
ipv6_cidr_block: <computed> | |
main_route_table_id: <computed> | |
owner_id: <computed> | |
+ aws_vpc.region2 | |
id: <computed> | |
arn: <computed> | |
assign_generated_ipv6_cidr_block: "false" | |
cidr_block: "10.2.0.0/16" | |
default_network_acl_id: <computed> | |
default_route_table_id: <computed> | |
default_security_group_id: <computed> | |
dhcp_options_id: <computed> | |
enable_classiclink: <computed> | |
enable_classiclink_dns_support: <computed> | |
enable_dns_hostnames: <computed> | |
enable_dns_support: "true" | |
instance_tenancy: "default" | |
ipv6_association_id: <computed> | |
ipv6_cidr_block: <computed> | |
main_route_table_id: <computed> | |
owner_id: <computed> | |
Plan: 4 to add, 2 to change, 0 to destroy. | |
Do you want to perform these actions? | |
Terraform will perform the actions described above. | |
Only 'yes' will be accepted to approve. | |
Enter a value: yes | |
aws_vpc.region2: Creating... | |
arn: "" => "<computed>" | |
assign_generated_ipv6_cidr_block: "" => "false" | |
cidr_block: "" => "10.2.0.0/16" | |
default_network_acl_id: "" => "<computed>" | |
default_route_table_id: "" => "<computed>" | |
default_security_group_id: "" => "<computed>" | |
dhcp_options_id: "" => "<computed>" | |
enable_classiclink: "" => "<computed>" | |
enable_classiclink_dns_support: "" => "<computed>" | |
enable_dns_hostnames: "" => "<computed>" | |
enable_dns_support: "" => "true" | |
instance_tenancy: "" => "default" | |
ipv6_association_id: "" => "<computed>" | |
ipv6_cidr_block: "" => "<computed>" | |
main_route_table_id: "" => "<computed>" | |
owner_id: "" => "<computed>" | |
aws_vpc.region1: Creating... | |
arn: "" => "<computed>" | |
assign_generated_ipv6_cidr_block: "" => "false" | |
cidr_block: "" => "10.1.0.0/16" | |
default_network_acl_id: "" => "<computed>" | |
default_route_table_id: "" => "<computed>" | |
default_security_group_id: "" => "<computed>" | |
dhcp_options_id: "" => "<computed>" | |
enable_classiclink: "" => "<computed>" | |
enable_classiclink_dns_support: "" => "<computed>" | |
enable_dns_hostnames: "" => "<computed>" | |
enable_dns_support: "" => "true" | |
instance_tenancy: "" => "default" | |
ipv6_association_id: "" => "<computed>" | |
ipv6_cidr_block: "" => "<computed>" | |
main_route_table_id: "" => "<computed>" | |
owner_id: "" => "<computed>" | |
aws_vpc.region2: Creation complete after 4s (ID: vpc-051f0941686fe5197) | |
data.aws_security_group.peer: Refreshing state... | |
aws_security_group.peer: Creating... | |
arn: "" => "<computed>" | |
description: "" => "Allow all inbound traffic" | |
egress.#: "" => "<computed>" | |
ingress.#: "" => "1" | |
ingress.482069346.cidr_blocks.#: "" => "1" | |
ingress.482069346.cidr_blocks.0: "" => "0.0.0.0/0" | |
ingress.482069346.description: "" => "" | |
ingress.482069346.from_port: "" => "0" | |
ingress.482069346.ipv6_cidr_blocks.#: "" => "0" | |
ingress.482069346.prefix_list_ids.#: "" => "0" | |
ingress.482069346.protocol: "" => "-1" | |
ingress.482069346.security_groups.#: "" => "0" | |
ingress.482069346.self: "" => "false" | |
ingress.482069346.to_port: "" => "0" | |
name: "" => "test-internal-firewall" | |
owner_id: "" => "<computed>" | |
revoke_rules_on_delete: "" => "false" | |
vpc_id: "" => "vpc-051f0941686fe5197" | |
aws_vpc.region1: Creation complete after 6s (ID: vpc-0ec0d04b97b77a914) | |
data.aws_security_group.this: Refreshing state... | |
aws_security_group.this: Creating... | |
arn: "" => "<computed>" | |
description: "" => "Allow all inbound traffic" | |
egress.#: "" => "<computed>" | |
ingress.#: "" => "1" | |
ingress.482069346.cidr_blocks.#: "" => "1" | |
ingress.482069346.cidr_blocks.0: "" => "0.0.0.0/0" | |
ingress.482069346.description: "" => "" | |
ingress.482069346.from_port: "" => "0" | |
ingress.482069346.ipv6_cidr_blocks.#: "" => "0" | |
ingress.482069346.prefix_list_ids.#: "" => "0" | |
ingress.482069346.protocol: "" => "-1" | |
ingress.482069346.security_groups.#: "" => "0" | |
ingress.482069346.self: "" => "false" | |
ingress.482069346.to_port: "" => "0" | |
name: "" => "test-internal-firewall" | |
owner_id: "" => "<computed>" | |
revoke_rules_on_delete: "" => "false" | |
vpc_id: "" => "vpc-0ec0d04b97b77a914" | |
aws_security_group.peer: Creation complete after 3s (ID: sg-0d9743db37c0ad705) | |
aws_security_group.this: Creation complete after 3s (ID: sg-0507283c4b326dbca) | |
Error: Error applying plan: | |
2 error(s) occurred: | |
* data.aws_security_group.peer: data.aws_security_group.peer: no matching SecurityGroup found | |
* data.aws_security_group.this: data.aws_security_group.this: no matching SecurityGroup found | |
Terraform does not automatically rollback in the face of errors. | |
Instead, your Terraform state file has been partially updated with | |
any resources that successfully completed. Please address the error | |
above and apply again to incrementally change your infrastructure. | |
mesospheres-MacBook-Pro-67:deeper_dive mbernadin$ terraform apply | |
aws_vpc.region2: Refreshing state... (ID: vpc-051f0941686fe5197) | |
aws_vpc.region1: Refreshing state... (ID: vpc-0ec0d04b97b77a914) | |
aws_security_group.this: Refreshing state... (ID: sg-0507283c4b326dbca) | |
data.aws_security_group.this: Refreshing state... | |
aws_security_group.peer: Refreshing state... (ID: sg-0d9743db37c0ad705) | |
data.aws_security_group.peer: Refreshing state... | |
Apply complete! Resources: 0 added, 0 changed, 0 destroyed. | |
Outputs: | |
sg_peer = [ | |
sg-0d9743db37c0ad705 | |
] | |
sg_this = [ | |
sg-0507283c4b326dbca | |
] | |
mesospheres-MacBook-Pro-67:deeper_dive mbernadin$ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment