Skip to content

Instantly share code, notes, and snippets.

@olliebun
Last active July 4, 2019 03:50
Show Gist options
  • Save olliebun/124e267854b05d535b976494c2529ae6 to your computer and use it in GitHub Desktop.
Save olliebun/124e267854b05d535b976494c2529ae6 to your computer and use it in GitHub Desktop.
terraform crash on 2019-07-04
2019/07/04 13:45:32 [INFO] Terraform version: 0.12.3
2019/07/04 13:45:32 [INFO] Go runtime version: go1.12.4
2019/07/04 13:45:32 [INFO] CLI args: []string{"/home/cera/bin/terraform-0.12", "apply"}
2019/07/04 13:45:32 [DEBUG] Attempting to open CLI config file: /home/cera/.terraformrc
2019/07/04 13:45:32 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2019/07/04 13:45:32 [INFO] CLI command args: []string{"apply"}
2019/07/04 13:45:32 [TRACE] Meta.Backend: built configuration for "gcs" backend with hash value 1107044854
2019/07/04 13:45:32 [TRACE] Preserving existing state lineage "b41022b0-a419-6f05-ec45-2e695e7fa747"
2019/07/04 13:45:32 [TRACE] Preserving existing state lineage "b41022b0-a419-6f05-ec45-2e695e7fa747"
2019/07/04 13:45:32 [TRACE] Meta.Backend: working directory was previously initialized for "gcs" backend
2019/07/04 13:45:32 [TRACE] Meta.Backend: using already-initialized, unchanged "gcs" backend configuration
2019/07/04 13:45:32 [TRACE] Meta.Backend: instantiated backend of type *gcs.Backend
2019/07/04 13:45:32 [DEBUG] checking for provider in "."
2019/07/04 13:45:32 [DEBUG] checking for provider in "/home/cera/bin"
2019/07/04 13:45:32 [DEBUG] checking for provider in ".terraform/plugins/linux_amd64"
2019/07/04 13:45:32 [DEBUG] found provider "terraform-provider-google-beta_v2.9.1_x4"
2019/07/04 13:45:32 [DEBUG] found provider "terraform-provider-google_v2.9.1_x4"
2019/07/04 13:45:32 [DEBUG] found provider "terraform-provider-kubernetes_v1.8.0_x4"
2019/07/04 13:45:32 [DEBUG] found provider "terraform-provider-template_v2.1.2_x4"
2019/07/04 13:45:32 [DEBUG] found valid plugin: "kubernetes", "1.8.0", "/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-kubernetes_v1.8.0_x4"
2019/07/04 13:45:32 [DEBUG] found valid plugin: "template", "2.1.2", "/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-template_v2.1.2_x4"
2019/07/04 13:45:32 [DEBUG] found valid plugin: "google-beta", "2.9.1", "/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google-beta_v2.9.1_x4"
2019/07/04 13:45:32 [DEBUG] found valid plugin: "google", "2.9.1", "/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google_v2.9.1_x4"
2019/07/04 13:45:32 [DEBUG] checking for provisioner in "."
2019/07/04 13:45:32 [DEBUG] checking for provisioner in "/home/cera/bin"
2019/07/04 13:45:32 [DEBUG] checking for provisioner in ".terraform/plugins/linux_amd64"
2019/07/04 13:45:32 [TRACE] Meta.Backend: backend *gcs.Backend does not support operations, so wrapping it in a local backend
2019/07/04 13:45:32 [INFO] backend/local: starting Apply operation
2019/07/04 13:45:32 [TRACE] backend/local: requesting state manager for workspace "default"
2019/07/04 13:45:34 [TRACE] backend/local: requesting state lock for workspace "default"
2019/07/04 13:45:34 [TRACE] backend/local: reading remote state for workspace "default"
2019/07/04 13:45:34 [TRACE] backend/local: retrieving local state snapshot for workspace "default"
2019/07/04 13:45:34 [TRACE] backend/local: building context for current working directory
2019/07/04 13:45:34 [TRACE] terraform.NewContext: starting
2019/07/04 13:45:34 [TRACE] terraform.NewContext: resolving provider version selections
2019/07/04 13:45:35 [TRACE] terraform.NewContext: loading provider schemas
2019/07/04 13:45:35 [TRACE] LoadSchemas: retrieving schema for provider type "google"
2019-07-04T13:45:35.047+1000 [INFO] plugin: configuring client automatic mTLS
2019-07-04T13:45:35.072+1000 [DEBUG] plugin: starting plugin: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google_v2.9.1_x4 args=[/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google_v2.9.1_x4]
2019-07-04T13:45:35.072+1000 [DEBUG] plugin: plugin started: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google_v2.9.1_x4 pid=18821
2019-07-04T13:45:35.072+1000 [DEBUG] plugin: waiting for RPC address: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google_v2.9.1_x4
2019-07-04T13:45:35.081+1000 [INFO] plugin.terraform-provider-google_v2.9.1_x4: configuring server automatic mTLS: timestamp=2019-07-04T13:45:35.081+1000
2019-07-04T13:45:35.108+1000 [DEBUG] plugin: using plugin: version=5
2019-07-04T13:45:35.108+1000 [DEBUG] plugin.terraform-provider-google_v2.9.1_x4: plugin address: address=/tmp/plugin571695443 network=unix timestamp=2019-07-04T13:45:35.108+1000
2019/07/04 13:45:35 [TRACE] GRPCProvider: GetSchema
2019/07/04 13:45:35 [TRACE] GRPCProvider: Close
2019-07-04T13:45:35.179+1000 [DEBUG] plugin: plugin process exited: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google_v2.9.1_x4 pid=18821
2019-07-04T13:45:35.179+1000 [DEBUG] plugin: plugin exited
2019/07/04 13:45:35 [TRACE] LoadSchemas: retrieving schema for provider type "google-beta"
2019-07-04T13:45:35.179+1000 [INFO] plugin: configuring client automatic mTLS
2019-07-04T13:45:35.206+1000 [DEBUG] plugin: starting plugin: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google-beta_v2.9.1_x4 args=[/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google-beta_v2.9.1_x4]
2019-07-04T13:45:35.206+1000 [DEBUG] plugin: plugin started: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google-beta_v2.9.1_x4 pid=18838
2019-07-04T13:45:35.206+1000 [DEBUG] plugin: waiting for RPC address: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google-beta_v2.9.1_x4
2019-07-04T13:45:35.216+1000 [INFO] plugin.terraform-provider-google-beta_v2.9.1_x4: configuring server automatic mTLS: timestamp=2019-07-04T13:45:35.216+1000
2019-07-04T13:45:35.246+1000 [DEBUG] plugin.terraform-provider-google-beta_v2.9.1_x4: plugin address: address=/tmp/plugin936745219 network=unix timestamp=2019-07-04T13:45:35.246+1000
2019-07-04T13:45:35.246+1000 [DEBUG] plugin: using plugin: version=5
2019/07/04 13:45:35 [TRACE] GRPCProvider: GetSchema
2019/07/04 13:45:35 [TRACE] GRPCProvider: Close
2019-07-04T13:45:35.321+1000 [DEBUG] plugin: plugin process exited: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google-beta_v2.9.1_x4 pid=18838
2019-07-04T13:45:35.321+1000 [DEBUG] plugin: plugin exited
2019/07/04 13:45:35 [TRACE] LoadSchemas: retrieving schema for provider type "kubernetes"
2019-07-04T13:45:35.321+1000 [INFO] plugin: configuring client automatic mTLS
2019-07-04T13:45:35.348+1000 [DEBUG] plugin: starting plugin: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-kubernetes_v1.8.0_x4 args=[/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-kubernetes_v1.8.0_x4]
2019-07-04T13:45:35.349+1000 [DEBUG] plugin: plugin started: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-kubernetes_v1.8.0_x4 pid=18855
2019-07-04T13:45:35.349+1000 [DEBUG] plugin: waiting for RPC address: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-kubernetes_v1.8.0_x4
2019-07-04T13:45:35.361+1000 [INFO] plugin.terraform-provider-kubernetes_v1.8.0_x4: configuring server automatic mTLS: timestamp=2019-07-04T13:45:35.361+1000
2019-07-04T13:45:35.389+1000 [DEBUG] plugin.terraform-provider-kubernetes_v1.8.0_x4: plugin address: address=/tmp/plugin343330806 network=unix timestamp=2019-07-04T13:45:35.389+1000
2019-07-04T13:45:35.389+1000 [DEBUG] plugin: using plugin: version=5
2019/07/04 13:45:35 [TRACE] GRPCProvider: GetSchema
2019/07/04 13:45:35 [TRACE] GRPCProvider: Close
2019-07-04T13:45:35.465+1000 [DEBUG] plugin: plugin process exited: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-kubernetes_v1.8.0_x4 pid=18855
2019-07-04T13:45:35.465+1000 [DEBUG] plugin: plugin exited
2019/07/04 13:45:35 [TRACE] LoadSchemas: retrieving schema for provider type "template"
2019-07-04T13:45:35.465+1000 [INFO] plugin: configuring client automatic mTLS
2019-07-04T13:45:35.493+1000 [DEBUG] plugin: starting plugin: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-template_v2.1.2_x4 args=[/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-template_v2.1.2_x4]
2019-07-04T13:45:35.493+1000 [DEBUG] plugin: plugin started: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-template_v2.1.2_x4 pid=18871
2019-07-04T13:45:35.493+1000 [DEBUG] plugin: waiting for RPC address: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-template_v2.1.2_x4
2019-07-04T13:45:35.498+1000 [INFO] plugin.terraform-provider-template_v2.1.2_x4: configuring server automatic mTLS: timestamp=2019-07-04T13:45:35.498+1000
2019-07-04T13:45:35.526+1000 [DEBUG] plugin.terraform-provider-template_v2.1.2_x4: plugin address: address=/tmp/plugin000142163 network=unix timestamp=2019-07-04T13:45:35.526+1000
2019-07-04T13:45:35.526+1000 [DEBUG] plugin: using plugin: version=5
2019/07/04 13:45:35 [TRACE] GRPCProvider: GetSchema
2019/07/04 13:45:35 [TRACE] GRPCProvider: Close
2019-07-04T13:45:35.584+1000 [DEBUG] plugin: plugin process exited: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-template_v2.1.2_x4 pid=18871
2019-07-04T13:45:35.584+1000 [DEBUG] plugin: plugin exited
2019/07/04 13:45:35 [TRACE] LoadSchemas: retrieving schema for provisioner "local-exec"
2019-07-04T13:45:35.584+1000 [DEBUG] plugin: starting plugin: path=/home/cera/bin/terraform-0.12 args=[/home/cera/bin/terraform-0.12, internal-plugin, provisioner, local-exec]
2019-07-04T13:45:35.584+1000 [DEBUG] plugin: plugin started: path=/home/cera/bin/terraform-0.12 pid=18885
2019-07-04T13:45:35.584+1000 [DEBUG] plugin: waiting for RPC address: path=/home/cera/bin/terraform-0.12
2019-07-04T13:45:35.592+1000 [DEBUG] plugin.terraform-0.12: 2019/07/04 13:45:35 [INFO] Terraform version: 0.12.3
2019-07-04T13:45:35.592+1000 [DEBUG] plugin.terraform-0.12: 2019/07/04 13:45:35 [INFO] Go runtime version: go1.12.4
2019-07-04T13:45:35.592+1000 [DEBUG] plugin.terraform-0.12: 2019/07/04 13:45:35 [INFO] CLI args: []string{"/home/cera/bin/terraform-0.12", "internal-plugin", "provisioner", "local-exec"}
2019-07-04T13:45:35.592+1000 [DEBUG] plugin.terraform-0.12: 2019/07/04 13:45:35 [DEBUG] Attempting to open CLI config file: /home/cera/.terraformrc
2019-07-04T13:45:35.592+1000 [DEBUG] plugin.terraform-0.12: 2019/07/04 13:45:35 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2019-07-04T13:45:35.592+1000 [DEBUG] plugin.terraform-0.12: 2019/07/04 13:45:35 [INFO] CLI command args: []string{"internal-plugin", "provisioner", "local-exec"}
2019-07-04T13:45:35.592+1000 [DEBUG] plugin.terraform-0.12: local-exec-provisioner (internal) 2019/07/04 13:45:35 [INFO] Starting provisioner plugin local-exec
2019-07-04T13:45:35.593+1000 [DEBUG] plugin: using plugin: version=5
2019-07-04T13:45:35.593+1000 [DEBUG] plugin.terraform-0.12: plugin address: address=/tmp/plugin349880298 network=unix timestamp=2019-07-04T13:45:35.592+1000
2019-07-04T13:45:35.595+1000 [DEBUG] plugin: plugin process exited: path=/home/cera/bin/terraform-0.12 pid=18885
2019-07-04T13:45:35.595+1000 [DEBUG] plugin: plugin exited
2019/07/04 13:45:35 [TRACE] terraform.NewContext: complete
2019/07/04 13:45:35 [TRACE] backend/local: finished building terraform.Context
2019/07/04 13:45:35 [TRACE] backend/local: requesting interactive input, if necessary
2019/07/04 13:45:35 [TRACE] Context.Input: Prompting for variables
2019/07/04 13:45:35 [TRACE] Context.Input: Prompting for provider arguments
2019/07/04 13:45:35 [TRACE] Context.Input: Provider provider.google declared at main.tf:1,1-18
2019/07/04 13:45:35 [TRACE] Context.Input: Provider provider.google-beta declared at main.tf:7,1-23
2019/07/04 13:45:35 [TRACE] Context.Input: Provider provider.kubernetes.cera-test-cluster-1 declared at main.tf:75,1-22
2019/07/04 13:45:35 [TRACE] Context.Input: Input for provider.google: map[string]cty.Value{}
2019/07/04 13:45:35 [TRACE] Context.Input: Input for provider.google-beta: map[string]cty.Value{}
2019/07/04 13:45:35 [TRACE] Context.Input: Input for provider.kubernetes.cera-test-cluster-1: map[string]cty.Value{}
2019/07/04 13:45:35 [TRACE] backend/local: running validation operation
2019/07/04 13:45:35 [INFO] terraform: building graph: GraphTypeValidate
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.ConfigTransformer
2019/07/04 13:45:35 [TRACE] ConfigTransformer: Starting for path:
2019/07/04 13:45:35 [TRACE] ConfigTransformer: Starting for path: cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ConfigTransformer: Starting for path: cera-test-vpc-1
2019/07/04 13:45:35 [TRACE] ConfigTransformer: Starting for path: cluster-services
2019/07/04 13:45:35 [TRACE] ConfigTransformer: Starting for path: ns-policy-test-1
2019/07/04 13:45:35 [TRACE] ConfigTransformer: Starting for path: ns-policy-test-2
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
data.google_project.project - *terraform.NodeValidatableResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
------
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.LocalTransformer
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes)
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.OutputTransformer
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
data.google_project.project - *terraform.NodeValidatableResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
------
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes)
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.StateTransformer
2019/07/04 13:45:35 [TRACE] StateTransformer: creating nodes for deposed instance objects only
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.StateTransformer (no changes)
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes)
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_route.nat-route-a" (*terraform.NodeValidatableResource) config from ../terraform-vpc/main.tf:247,1-46
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_role_binding.admin" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:74,1-43
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp" (*terraform.NodeValidatableResource) config from ../terraform-vpc/main.tf:11,1-65
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_resource_quota.limit-quota" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:160,1-51
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:217,1-70
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_secret.google-application-credentials" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:33,1-62
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_role_binding.viewer" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:116,1-44
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:217,1-70
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_router.cloud-router" (*terraform.NodeValidatableResource) config from ../terraform-vpc/main.tf:132,1-48
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_secret.google-application-credentials" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:33,1-62
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_role_binding.admin" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:74,1-43
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_limit_range.limit-defaults" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:137,1-51
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_namespace.app-namespace" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:18,1-48
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_role_binding.editor" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:95,1-44
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:263,1-61
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_resource_quota.limit-quota" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:160,1-51
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.google_service_account.service_account" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:4,1-52
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:241,1-62
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "data.google_project.project" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"main.tf", Start:hcl.Pos{Line:23, Column:1, Byte:651}, End:hcl.Pos{Line:23, Column:32, Byte:682}}
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:217,1-70
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_network_policy.default-deny" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:175,1-52
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.google_service_account_key.app_key" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:10,1-48
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal" (*terraform.NodeValidatableResource) config from ../terraform-vpc/main.tf:24,1-69
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation" (*terraform.NodeValidatableResource) config from ../terraform-vpc/main.tf:110,1-71
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_instance.nat-b" (*terraform.NodeValidatableResource) config from ../terraform-vpc/main.tf:212,1-43
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_network_policy.allow-internet-traffic" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:241,1-62
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_limit_range.limit-defaults" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:137,1-51
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:263,1-61
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.google_service_account.service_account" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:4,1-52
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_role_binding.viewer" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:116,1-44
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_role_binding.editor" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:95,1-44
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-cluster-1.google_container_node_pool.pool-b" (*terraform.NodeValidatableResource) config from ../terraform-gke-cluster/main.tf:148,1-47
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_network.greensync-network" (*terraform.NodeValidatableResource) config from ../terraform-vpc/main.tf:1,1-54
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_firewall.firewall-rdp" (*terraform.NodeValidatableResource) config from ../terraform-vpc/main.tf:87,1-50
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_role_binding.editor" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:95,1-44
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_limit_range.limit-defaults" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:137,1-51
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:241,1-62
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_secret.service-account-credentials" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:46,1-59
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_secret.database-credentials" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:58,1-52
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_network_policy.default-deny" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:175,1-52
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_resource_quota.limit-quota" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:160,1-51
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "google_compute_address.nataddress-australia-southeast1-1" (*terraform.NodeValidatableResource) config from main.tf:25,1-70
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection" (*terraform.NodeValidatableResource) config from ../terraform-vpc/main.tf:122,1-79
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_secret.google-application-credentials" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:33,1-62
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_namespace.app-namespace" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:18,1-48
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_namespace.app-namespace" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:18,1-48
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_role_binding.viewer" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:116,1-44
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_role_binding.admin" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:74,1-43
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-cluster-1.google_container_node_pool.pool-a" (*terraform.NodeValidatableResource) config from ../terraform-gke-cluster/main.tf:110,1-47
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_instance.nat-a" (*terraform.NodeValidatableResource) config from ../terraform-vpc/main.tf:177,1-43
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.data.template_file.nat-startup-script" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"../terraform-vpc/main.tf", Start:hcl.Pos{Line:166, Column:1, Byte:5464}, End:hcl.Pos{Line:166, Column:42, Byte:5505}}
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "data.google_client_config.default" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"main.tf", Start:hcl.Pos{Line:73, Column:1, Byte:2000}, End:hcl.Pos{Line:73, Column:38, Byte:2037}}
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.google_service_account_key.app_key" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:10,1-48
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:191,1-68
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_network_policy.default-deny" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:175,1-52
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:191,1-68
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:191,1-68
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_secret.database-credentials" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:58,1-52
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-cluster-1.google_container_cluster.cluster" (*terraform.NodeValidatableResource) config from ../terraform-gke-cluster/main.tf:10,1-46
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway" (*terraform.NodeValidatableResource) config from ../terraform-vpc/main.tf:143,1-57
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_secret.service-account-credentials" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:46,1-59
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_firewall.firewall-http" (*terraform.NodeValidatableResource) config from ../terraform-vpc/main.tf:61,1-51
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_secret.database-credentials" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:58,1-52
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_secret.service-account-credentials" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:46,1-59
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.google_service_account_key.app_key" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:10,1-48
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_firewall.firewall-ssh" (*terraform.NodeValidatableResource) config from ../terraform-vpc/main.tf:74,1-50
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_route.nat-route-b" (*terraform.NodeValidatableResource) config from ../terraform-vpc/main.tf:258,1-46
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh" (*terraform.NodeValidatableResource) config from ../terraform-vpc/main.tf:47,1-64
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-cluster-1.google_service_account.service_account" (*terraform.NodeValidatableResource) config from ../terraform-gke-cluster/main.tf:4,1-52
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_network_policy.allow-cluster-traffic" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:263,1-61
2019/07/04 13:45:35 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.google_service_account.service_account" (*terraform.NodeValidatableResource) config from ../terraform-gke-namespace/main.tf:4,1-52
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes)
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer
2019/07/04 13:45:35 [TRACE] MissingProviderTransformer: added implicit provisioner module.cera-test-vpc-1.local-exec, first implied by module.cera-test-vpc-1.google_compute_instance.nat-a
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
data.google_project.project - *terraform.NodeValidatableResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
------
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.ProvisionerTransformer
2019/07/04 13:45:35 [TRACE] ProvisionerTransformer: module.cera-test-vpc-1.google_compute_instance.nat-b is provisioned by module.cera-test-vpc-1.local-exec ("module.cera-test-vpc-1.provisioner.local-exec")
2019/07/04 13:45:35 [TRACE] ProvisionerTransformer: module.cera-test-vpc-1.google_compute_instance.nat-a is provisioned by module.cera-test-vpc-1.local-exec ("module.cera-test-vpc-1.provisioner.local-exec")
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.ProvisionerTransformer with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
data.google_project.project - *terraform.NodeValidatableResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
------
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
data.google_project.project - *terraform.NodeValidatableResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
------
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.graphTransformerMulti
2019/07/04 13:45:35 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer
2019/07/04 13:45:35 [TRACE] ProviderConfigTransformer: attaching to "provider.google-beta" provider configuration from main.tf:7,1-23
2019/07/04 13:45:35 [TRACE] ProviderConfigTransformer: attaching to "provider.google" provider configuration from main.tf:1,1-18
2019/07/04 13:45:35 [TRACE] ProviderConfigTransformer: attaching to "provider.kubernetes.cera-test-cluster-1" provider configuration from main.tf:75,1-22
2019/07/04 13:45:35 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
data.google_project.project - *terraform.NodeValidatableResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.provider.kubernetes (proxy) - *terraform.graphNodeProxyProvider
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.provider.kubernetes (proxy) - *terraform.graphNodeProxyProvider
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.provider.kubernetes (proxy) - *terraform.graphNodeProxyProvider
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
provider.google-beta - *terraform.NodeApplyableProvider
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
------
2019/07/04 13:45:35 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer
2019/07/04 13:45:35 [DEBUG] adding implicit provider configuration provider.kubernetes, implied first by module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services
2019/07/04 13:45:35 [DEBUG] adding implicit provider configuration provider.template, implied first by module.cera-test-vpc-1.data.template_file.nat-startup-script
2019/07/04 13:45:35 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
data.google_project.project - *terraform.NodeValidatableResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.provider.kubernetes (proxy) - *terraform.graphNodeProxyProvider
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.provider.kubernetes (proxy) - *terraform.graphNodeProxyProvider
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.provider.kubernetes (proxy) - *terraform.graphNodeProxyProvider
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
provider.google-beta - *terraform.NodeApplyableProvider
provider.kubernetes - *terraform.NodeApplyableProvider
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
provider.template - *terraform.NodeApplyableProvider
------
2019/07/04 13:45:35 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_instance.nat-a is provided by module.cera-test-vpc-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.kubernetes_namespace.app-namespace is provided by module.ns-policy-test-1.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: data.google_client_config.default is provided by provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway is provided by module.cera-test-vpc-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.kubernetes_secret.service-account-credentials is provided by module.cluster-services.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace is provided by module.cluster-services.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_firewall.firewall-http is provided by module.cera-test-vpc-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_route.nat-route-b is provided by module.cera-test-vpc-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-cluster-1.google_service_account.service_account is provided by module.cera-test-cluster-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_route.nat-route-a is provided by module.cera-test-vpc-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.kubernetes_role_binding.admin is provided by module.cluster-services.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp is provided by module.cera-test-vpc-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.kubernetes_resource_quota.limit-quota is provided by module.cluster-services.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.kubernetes_role_binding.admin is provided by module.ns-policy-test-1.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.kubernetes_secret.google-application-credentials is provided by module.ns-policy-test-2.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services is provided by module.ns-policy-test-2.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.kubernetes_resource_quota.limit-quota is provided by module.ns-policy-test-1.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: data.google_project.project is provided by provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.google_service_account.service_account is provided by module.ns-policy-test-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.google_service_account_key.app_key is provided by module.ns-policy-test-2.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.kubernetes_network_policy.allow-internet-traffic is provided by module.cluster-services.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.kubernetes_limit_range.limit-defaults is provided by module.cluster-services.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic is provided by module.ns-policy-test-2.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-cluster-1.google_container_node_pool.pool-b is provided by module.cera-test-cluster-1.provider.google-beta or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_network.greensync-network is provided by module.cera-test-vpc-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_firewall.firewall-rdp is provided by module.cera-test-vpc-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.kubernetes_role_binding.viewer is provided by module.cluster-services.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: google_compute_address.nataddress-australia-southeast1-1 is provided by provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection is provided by module.cera-test-vpc-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic is provided by module.ns-policy-test-1.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.kubernetes_secret.service-account-credentials is provided by module.ns-policy-test-1.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-cluster-1.google_container_node_pool.pool-a is provided by module.cera-test-cluster-1.provider.google-beta or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.data.template_file.nat-startup-script is provided by module.cera-test-vpc-1.provider.template or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.kubernetes_namespace.app-namespace is provided by module.cluster-services.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.kubernetes_role_binding.viewer is provided by module.ns-policy-test-1.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.kubernetes_role_binding.admin is provided by module.ns-policy-test-2.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.google_service_account_key.app_key is provided by module.ns-policy-test-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace is provided by module.ns-policy-test-1.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-cluster-1.google_container_cluster.cluster is provided by module.cera-test-cluster-1.provider.google-beta or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.kubernetes_network_policy.default-deny is provided by module.cluster-services.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace is provided by module.ns-policy-test-2.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.kubernetes_secret.database-credentials is provided by module.ns-policy-test-2.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.kubernetes_secret.database-credentials is provided by module.cluster-services.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.kubernetes_secret.service-account-credentials is provided by module.ns-policy-test-2.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_firewall.firewall-ssh is provided by module.cera-test-vpc-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh is provided by module.cera-test-vpc-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.google_service_account_key.app_key is provided by module.cluster-services.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.kubernetes_network_policy.allow-cluster-traffic is provided by module.cluster-services.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.google_service_account.service_account is provided by module.ns-policy-test-2.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services is provided by module.ns-policy-test-1.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_router.cloud-router is provided by module.cera-test-vpc-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.kubernetes_secret.google-application-credentials is provided by module.ns-policy-test-1.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.kubernetes_role_binding.viewer is provided by module.ns-policy-test-2.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.kubernetes_role_binding.editor is provided by module.cluster-services.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic is provided by module.ns-policy-test-1.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.kubernetes_limit_range.limit-defaults is provided by module.ns-policy-test-1.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.kubernetes_namespace.app-namespace is provided by module.ns-policy-test-2.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services is provided by module.cluster-services.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.kubernetes_network_policy.default-deny is provided by module.ns-policy-test-1.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic is provided by module.ns-policy-test-2.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal is provided by module.cera-test-vpc-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation is provided by module.cera-test-vpc-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_instance.nat-b is provided by module.cera-test-vpc-1.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.google_service_account.service_account is provided by module.cluster-services.provider.google or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.kubernetes_role_binding.editor is provided by module.ns-policy-test-2.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.kubernetes_role_binding.editor is provided by module.ns-policy-test-1.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.kubernetes_limit_range.limit-defaults is provided by module.ns-policy-test-2.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.kubernetes_secret.google-application-credentials is provided by module.cluster-services.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.kubernetes_secret.database-credentials is provided by module.ns-policy-test-1.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.kubernetes_network_policy.default-deny is provided by module.ns-policy-test-2.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.kubernetes_resource_quota.limit-quota is provided by module.ns-policy-test-2.provider.kubernetes or inherited equivalent
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.cluster-services.provider.kubernetes serving module.cluster-services.kubernetes_secret.service-account-credentials
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.kubernetes_secret.service-account-credentials" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.cluster-services.provider.kubernetes serving module.cluster-services.kubernetes_resource_quota.limit-quota
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.kubernetes_resource_quota.limit-quota" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.cluster-services.provider.kubernetes serving module.cluster-services.kubernetes_secret.database-credentials
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.kubernetes_secret.database-credentials" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-1.provider.kubernetes serving module.ns-policy-test-1.kubernetes_secret.google-application-credentials
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.kubernetes_secret.google-application-credentials" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-2.provider.kubernetes serving module.ns-policy-test-2.kubernetes_secret.database-credentials
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.kubernetes_secret.database-credentials" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-1.provider.kubernetes serving module.ns-policy-test-1.kubernetes_role_binding.editor
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.kubernetes_role_binding.editor" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_route.nat-route-b uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.google_compute_route.nat-route-b" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_route.nat-route-a uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.google_compute_route.nat-route-a" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-2.provider.kubernetes serving module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.cluster-services.provider.kubernetes serving module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-2.provider.kubernetes serving module.ns-policy-test-2.kubernetes_secret.service-account-credentials
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.kubernetes_secret.service-account-credentials" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-2.provider.kubernetes serving module.ns-policy-test-2.kubernetes_resource_quota.limit-quota
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.kubernetes_resource_quota.limit-quota" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-2.provider.kubernetes serving module.ns-policy-test-2.kubernetes_secret.google-application-credentials
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.kubernetes_secret.google-application-credentials" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-cluster-1.google_container_node_pool.pool-a uses inherited configuration provider.google-beta
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-cluster-1.google_container_node_pool.pool-a" (*terraform.NodeValidatableResource) needs provider.google-beta
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-2.provider.kubernetes serving module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.google_service_account_key.app_key uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.google_service_account_key.app_key" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_firewall.firewall-rdp uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.google_compute_firewall.firewall-rdp" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.cluster-services.provider.kubernetes serving module.cluster-services.kubernetes_network_policy.allow-cluster-traffic
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.kubernetes_network_policy.allow-cluster-traffic" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-2.provider.kubernetes serving module.ns-policy-test-2.kubernetes_network_policy.default-deny
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.kubernetes_network_policy.default-deny" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.cluster-services.provider.kubernetes serving module.cluster-services.kubernetes_network_policy.default-deny
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.kubernetes_network_policy.default-deny" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-1.provider.kubernetes serving module.ns-policy-test-1.kubernetes_network_policy.default-deny
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.kubernetes_network_policy.default-deny" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-2.provider.kubernetes serving module.ns-policy-test-2.kubernetes_role_binding.editor
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.kubernetes_role_binding.editor" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.cluster-services.provider.kubernetes serving module.cluster-services.kubernetes_secret.google-application-credentials
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.kubernetes_secret.google-application-credentials" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.google_service_account_key.app_key uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.google_service_account_key.app_key" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-cluster-1.google_container_node_pool.pool-b uses inherited configuration provider.google-beta
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-cluster-1.google_container_node_pool.pool-b" (*terraform.NodeValidatableResource) needs provider.google-beta
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for provider.google serving google_compute_address.nataddress-australia-southeast1-1
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "google_compute_address.nataddress-australia-southeast1-1" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-2.provider.kubernetes serving module.ns-policy-test-2.kubernetes_limit_range.limit-defaults
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.kubernetes_limit_range.limit-defaults" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-1.provider.kubernetes serving module.ns-policy-test-1.kubernetes_namespace.app-namespace
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.kubernetes_namespace.app-namespace" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-1.provider.kubernetes serving module.ns-policy-test-1.kubernetes_resource_quota.limit-quota
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.kubernetes_resource_quota.limit-quota" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-2.google_service_account.service_account uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.google_service_account.service_account" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-2.provider.kubernetes serving module.ns-policy-test-2.kubernetes_namespace.app-namespace
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.kubernetes_namespace.app-namespace" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-1.provider.kubernetes serving module.ns-policy-test-1.kubernetes_role_binding.admin
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.kubernetes_role_binding.admin" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.cluster-services.provider.kubernetes serving module.cluster-services.kubernetes_role_binding.viewer
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.kubernetes_role_binding.viewer" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-1.provider.kubernetes serving module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-1.provider.kubernetes serving module.ns-policy-test-1.kubernetes_limit_range.limit-defaults
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.kubernetes_limit_range.limit-defaults" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.google_service_account_key.app_key uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.google_service_account_key.app_key" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.cluster-services.provider.kubernetes serving module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-2.provider.kubernetes serving module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_router.cloud-router uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.google_compute_router.cloud-router" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cluster-services.google_service_account.service_account uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.google_service_account.service_account" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.cluster-services.provider.kubernetes serving module.cluster-services.kubernetes_limit_range.limit-defaults
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.kubernetes_limit_range.limit-defaults" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_network.greensync-network uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.google_compute_network.greensync-network" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.data.template_file.nat-startup-script uses inherited configuration provider.template
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.data.template_file.nat-startup-script" (*terraform.NodeValidatableResource) needs provider.template
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-2.provider.kubernetes serving module.ns-policy-test-2.kubernetes_role_binding.admin
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.kubernetes_role_binding.admin" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_instance.nat-a uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.google_compute_instance.nat-a" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_firewall.firewall-http uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.google_compute_firewall.firewall-http" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-cluster-1.google_service_account.service_account uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-cluster-1.google_service_account.service_account" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.cluster-services.provider.kubernetes serving module.cluster-services.kubernetes_role_binding.admin
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.kubernetes_role_binding.admin" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_instance.nat-b uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.google_compute_instance.nat-b" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-2.provider.kubernetes serving module.ns-policy-test-2.kubernetes_role_binding.viewer
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.kubernetes_role_binding.viewer" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.cluster-services.provider.kubernetes serving module.cluster-services.kubernetes_role_binding.editor
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.kubernetes_role_binding.editor" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for provider.google serving data.google_project.project
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "data.google_project.project" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-2.provider.kubernetes serving module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.cluster-services.provider.kubernetes serving module.cluster-services.kubernetes_namespace.app-namespace
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.kubernetes_namespace.app-namespace" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-1.provider.kubernetes serving module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-1.provider.kubernetes serving module.ns-policy-test-1.kubernetes_role_binding.viewer
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.kubernetes_role_binding.viewer" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-1.provider.kubernetes serving module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-cluster-1.google_container_cluster.cluster uses inherited configuration provider.google-beta
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-cluster-1.google_container_cluster.cluster" (*terraform.NodeValidatableResource) needs provider.google-beta
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.cera-test-vpc-1.google_compute_firewall.firewall-ssh uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cera-test-vpc-1.google_compute_firewall.firewall-ssh" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for provider.google serving data.google_client_config.default
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "data.google_client_config.default" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: module.ns-policy-test-1.google_service_account.service_account uses inherited configuration provider.google
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.google_service_account.service_account" (*terraform.NodeValidatableResource) needs provider.google
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.cluster-services.provider.kubernetes serving module.cluster-services.kubernetes_network_policy.allow-internet-traffic
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.cluster-services.kubernetes_network_policy.allow-internet-traffic" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-1.provider.kubernetes serving module.ns-policy-test-1.kubernetes_secret.service-account-credentials
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.kubernetes_secret.service-account-credentials" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-1.provider.kubernetes serving module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] ProviderTransformer: exact match for module.ns-policy-test-1.provider.kubernetes serving module.ns-policy-test-1.kubernetes_secret.database-credentials
2019/07/04 13:45:35 [DEBUG] ProviderTransformer: "module.ns-policy-test-1.kubernetes_secret.database-credentials" (*terraform.NodeValidatableResource) needs provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
data.google_project.project - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
provider.template - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
provider.google-beta - *terraform.NodeApplyableProvider
provider.kubernetes - *terraform.NodeApplyableProvider
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
provider.template - *terraform.NodeApplyableProvider
------
2019/07/04 13:45:35 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer
2019/07/04 13:45:35 [DEBUG] pruning unused provider.kubernetes
2019/07/04 13:45:35 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
data.google_project.project - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
provider.template - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
provider.google-beta - *terraform.NodeApplyableProvider
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
provider.template - *terraform.NodeApplyableProvider
------
2019/07/04 13:45:35 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer
2019/07/04 13:45:35 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes)
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
data.google_project.project - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
provider.template - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
provider.google-beta - *terraform.NodeApplyableProvider
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
provider.template - *terraform.NodeApplyableProvider
------
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes)
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.kubernetes_role_binding.admin
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.kubernetes_secret.google-application-credentials
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.kubernetes_resource_quota.limit-quota
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to data.google_project.project
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.google_service_account.service_account
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.google_service_account_key.app_key
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.kubernetes_network_policy.allow-internet-traffic
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.kubernetes_limit_range.limit-defaults
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-cluster-1.google_container_node_pool.pool-b
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.google_compute_network.greensync-network
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.google_compute_firewall.firewall-rdp
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.kubernetes_role_binding.viewer
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to google_compute_address.nataddress-australia-southeast1-1
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.kubernetes_secret.service-account-credentials
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-cluster-1.google_container_node_pool.pool-a
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.data.template_file.nat-startup-script
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.kubernetes_namespace.app-namespace
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.kubernetes_role_binding.viewer
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.kubernetes_role_binding.admin
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.google_service_account_key.app_key
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.google-beta
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-cluster-1.google_container_cluster.cluster
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.kubernetes_network_policy.default-deny
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.kubernetes_secret.database-credentials
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.kubernetes_secret.database-credentials
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.kubernetes_secret.service-account-credentials
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.google_compute_firewall.firewall-ssh
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.google_service_account_key.app_key
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.google
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.kubernetes_network_policy.allow-cluster-traffic
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.google_service_account.service_account
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.google_compute_router.cloud-router
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.kubernetes_secret.google-application-credentials
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.kubernetes_role_binding.viewer
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.kubernetes_role_binding.editor
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.kubernetes_limit_range.limit-defaults
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.kubernetes_namespace.app-namespace
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.kubernetes_network_policy.default-deny
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.google_compute_instance.nat-b
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching provisioner "local-exec" config schema to module.cera-test-vpc-1.google_compute_instance.nat-b
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.google_service_account.service_account
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.kubernetes_role_binding.editor
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.template
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.kubernetes_role_binding.editor
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.kubernetes_limit_range.limit-defaults
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.kubernetes_secret.google-application-credentials
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.kubernetes_secret.database-credentials
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.kubernetes_network_policy.default-deny
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-2.kubernetes_resource_quota.limit-quota
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.google_compute_instance.nat-a
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching provisioner "local-exec" config schema to module.cera-test-vpc-1.google_compute_instance.nat-a
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.ns-policy-test-1.kubernetes_namespace.app-namespace
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to data.google_client_config.default
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.kubernetes_secret.service-account-credentials
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.google_compute_firewall.firewall-http
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.google_compute_route.nat-route-b
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-cluster-1.google_service_account.service_account
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.google_compute_route.nat-route-a
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.kubernetes_role_binding.admin
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp
2019/07/04 13:45:35 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cluster-services.kubernetes_resource_quota.limit-quota
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes)
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.db_username" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.quota_cpu" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.db_name" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal" references: [module.cera-test-vpc-1.var.network_name module.cera-test-vpc-1.google_compute_network.greensync-network]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation" references: [module.cera-test-vpc-1.var.google_managed_service_provider_allocation module.cera-test-vpc-1.var.network_name module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length module.cera-test-vpc-1.google_compute_network.greensync-network module.cera-test-vpc-1.var.network_name]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.google_compute_instance.nat-b" references: [module.cera-test-vpc-1.var.nat_zone module.cera-test-vpc-1.var.external_nat_ip_b module.cera-test-vpc-1.var.gcp_project module.cera-test-vpc-1.var.nat_zone module.cera-test-vpc-1.data.template_file.nat-startup-script module.cera-test-vpc-1.var.network_name module.cera-test-vpc-1.var.external_nat_ip_b]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.output.cluster_ca_certificate" references: [module.cera-test-cluster-1.google_container_cluster.cluster]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.var.external_nat_ip_b" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.location" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.var.gcp_project" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.use_network_policies" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.db_name" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.quota_memory" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.editors" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.gcp_project" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.db_connection_name" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.pool_b_gke_version" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.google_service_account.service_account" references: [module.cluster-services.var.service_account_name module.cluster-services.var.name module.cluster-services.var.gcp_project module.cluster-services.var.service_account_name module.cluster-services.var.name]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.kubernetes_role_binding.editor" references: [module.ns-policy-test-2.var.editors module.ns-policy-test-2.kubernetes_namespace.app-namespace module.ns-policy-test-2.var.editors]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.output.service_account_email" references: [module.ns-policy-test-2.google_service_account.service_account]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.default_memory_limit" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.db_username" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "provider.template" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.kubernetes_role_binding.editor" references: [module.ns-policy-test-1.var.editors module.ns-policy-test-1.kubernetes_namespace.app-namespace module.ns-policy-test-1.var.editors]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.kubernetes_limit_range.limit-defaults" references: [module.ns-policy-test-2.kubernetes_namespace.app-namespace module.ns-policy-test-2.var.default_cpu_limit module.ns-policy-test-2.var.default_memory_limit module.ns-policy-test-2.var.default_cpu_limit module.ns-policy-test-2.var.default_memory_limit]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.provisioner.local-exec" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.allow_internet_ingress_traffic" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.pool_b_disk_type" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.service_account_name" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.gke_min_master_version" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.kubernetes_secret.google-application-credentials" references: [module.cluster-services.google_service_account_key.app_key module.cluster-services.kubernetes_namespace.app-namespace module.cluster-services.var.name]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.kubernetes_secret.database-credentials" references: [module.ns-policy-test-1.var.db_username module.ns-policy-test-1.var.db_password module.ns-policy-test-1.var.db_connection_name module.ns-policy-test-1.var.db_name module.ns-policy-test-1.var.db_username module.ns-policy-test-1.var.db_password module.ns-policy-test-1.var.db_connection_name module.ns-policy-test-1.var.db_name module.ns-policy-test-1.kubernetes_namespace.app-namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.kubernetes_network_policy.default-deny" references: [module.ns-policy-test-2.var.use_network_policies module.ns-policy-test-2.kubernetes_namespace.app-namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.kubernetes_resource_quota.limit-quota" references: [module.ns-policy-test-2.kubernetes_namespace.app-namespace module.ns-policy-test-2.var.quota_memory module.ns-policy-test-2.var.quota_cpu]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.var.network_description" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.google_compute_instance.nat-a" references: [module.cera-test-vpc-1.var.nat_zone module.cera-test-vpc-1.var.external_nat_ip_a module.cera-test-vpc-1.var.nat_zone module.cera-test-vpc-1.data.template_file.nat-startup-script module.cera-test-vpc-1.var.gcp_project module.cera-test-vpc-1.var.network_name module.cera-test-vpc-1.var.external_nat_ip_a]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.kubernetes_namespace.app-namespace" references: [module.ns-policy-test-1.var.name module.ns-policy-test-1.var.name]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.default_memory_limit" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.name" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "data.google_client_config.default" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.service_account_name" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.pool_a_max_node_count" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.security_group" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.gcp_project" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.db_password" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.use_network_policies" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway" references: [module.cera-test-vpc-1.var.cloud_router_bgp_asn module.cera-test-vpc-1.var.cloud_nat_gateways module.cera-test-vpc-1.var.cloud_nat_gateways module.cera-test-vpc-1.var.network_name module.cera-test-vpc-1.var.cloud_nat_gateways module.cera-test-vpc-1.var.cloud_nat_gateways module.cera-test-vpc-1.google_compute_router.cloud-router module.cera-test-vpc-1.var.cloud_nat_gateways]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.kubernetes_secret.service-account-credentials" references: [module.cluster-services.google_service_account_key.app_key module.cluster-services.kubernetes_namespace.app-namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace" references: [module.cluster-services.var.use_network_policies module.cluster-services.kubernetes_namespace.app-namespace module.cluster-services.kubernetes_namespace.app-namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.output.endpoint" references: [module.cera-test-cluster-1.google_container_cluster.cluster]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.var.network_name" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.google_compute_firewall.firewall-http" references: [module.cera-test-vpc-1.google_compute_network.greensync-network]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.allow_internet_ingress_traffic" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.pool_a_machine_type" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.google_compute_route.nat-route-b" references: [module.cera-test-vpc-1.var.enable_nat_b module.cera-test-vpc-1.var.network_name module.cera-test-vpc-1.google_compute_instance.nat-b]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.use_network_policies" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.cluster_services_namespace" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.allow_cluster_ingress_traffic" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.pool_a_gke_version" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.allow_cluster_ingress_traffic" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.admins" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.allow_cluster_ingress_traffic" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.google_service_account.service_account" references: [module.cera-test-cluster-1.var.name module.cera-test-cluster-1.var.name]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.output.nat_zone" references: [module.cera-test-vpc-1.var.nat_zone]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.var.external_nat_ip_a" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.var.google_managed_service_provider_allocation" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.pool_a_preemptible" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.google_compute_route.nat-route-a" references: [module.cera-test-vpc-1.var.enable_nat_a module.cera-test-vpc-1.var.network_name module.cera-test-vpc-1.google_compute_instance.nat-a]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.kubernetes_role_binding.admin" references: [module.cluster-services.var.admins module.cluster-services.kubernetes_namespace.app-namespace module.cluster-services.var.admins]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.quota_cpu" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.viewers" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.gke_master_ipv4_cidr" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp" references: [module.cera-test-vpc-1.var.network_name module.cera-test-vpc-1.google_compute_network.greensync-network]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.kubernetes_resource_quota.limit-quota" references: [module.cluster-services.kubernetes_namespace.app-namespace module.cluster-services.var.quota_memory module.cluster-services.var.quota_cpu]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.editors" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.service_account_name" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.db_connection_name" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.db_password" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.cluster_services_namespace" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.kubernetes_role_binding.admin" references: [module.ns-policy-test-1.var.admins module.ns-policy-test-1.kubernetes_namespace.app-namespace module.ns-policy-test-1.var.admins]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.kubernetes_secret.google-application-credentials" references: [module.ns-policy-test-2.google_service_account_key.app_key module.ns-policy-test-2.var.name module.ns-policy-test-2.kubernetes_namespace.app-namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services" references: [module.ns-policy-test-2.var.use_network_policies module.ns-policy-test-2.kubernetes_namespace.app-namespace module.ns-policy-test-2.var.cluster_services_namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.output.service_account_email" references: [module.cluster-services.google_service_account.service_account]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.var.cloud_router_bgp_asn" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.kubernetes_resource_quota.limit-quota" references: [module.ns-policy-test-1.kubernetes_namespace.app-namespace module.ns-policy-test-1.var.quota_memory module.ns-policy-test-1.var.quota_cpu]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.output.nat_instance_link_a" references: [module.cera-test-vpc-1.google_compute_instance.nat-a]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.admins" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.cluster_services_namespace" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.pool_a_disk_size_gb" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.pool_b_machine_type" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "data.google_project.project" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.google_service_account.service_account" references: [module.ns-policy-test-1.var.gcp_project module.ns-policy-test-1.var.service_account_name module.ns-policy-test-1.var.name module.ns-policy-test-1.var.service_account_name module.ns-policy-test-1.var.name]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.default_memory_limit" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.quota_cpu" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.allow_internet_ingress_traffic" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.google_service_account_key.app_key" references: [module.ns-policy-test-2.google_service_account.service_account]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.output.network_self_link" references: [module.cera-test-vpc-1.google_compute_network.greensync-network]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.editors" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.kubernetes_network_policy.allow-internet-traffic" references: [module.cluster-services.var.use_network_policies module.cluster-services.var.allow_internet_ingress_traffic module.cluster-services.var.allow_internet_ingress_traffic module.cluster-services.var.allow_internet_ingress_traffic module.cluster-services.kubernetes_namespace.app-namespace module.cluster-services.var.allow_internet_ingress_traffic module.cluster-services.var.allow_internet_ingress_traffic]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.kubernetes_limit_range.limit-defaults" references: [module.cluster-services.kubernetes_namespace.app-namespace module.cluster-services.var.default_cpu_limit module.cluster-services.var.default_memory_limit module.cluster-services.var.default_cpu_limit module.cluster-services.var.default_memory_limit]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic" references: [module.ns-policy-test-2.var.use_network_policies module.ns-policy-test-2.var.allow_cluster_ingress_traffic module.ns-policy-test-2.var.allow_cluster_ingress_traffic module.ns-policy-test-2.var.allow_cluster_ingress_traffic module.ns-policy-test-2.kubernetes_namespace.app-namespace module.ns-policy-test-2.var.allow_cluster_ingress_traffic module.ns-policy-test-2.var.allow_cluster_ingress_traffic]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.var.nat_zone" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.var.enable_nat_a" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.quota_memory" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.default_cpu_limit" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.google_container_node_pool.pool-b" references: [module.cera-test-cluster-1.var.pool_b_min_node_count module.cera-test-cluster-1.var.pool_b_max_node_count module.cera-test-cluster-1.google_container_cluster.cluster module.cera-test-cluster-1.var.location module.cera-test-cluster-1.var.pool_b_min_node_count module.cera-test-cluster-1.var.pool_b_gke_version module.cera-test-cluster-1.var.pool_b_min_node_count module.cera-test-cluster-1.var.pool_b_max_node_count module.cera-test-cluster-1.var.pool_b_disk_type module.cera-test-cluster-1.var.pool_b_preemptible module.cera-test-cluster-1.var.pool_b_machine_type module.cera-test-cluster-1.google_service_account.service_account module.cera-test-cluster-1.var.pool_b_disk_size_gb]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.google_compute_network.greensync-network" references: [module.cera-test-vpc-1.var.network_description module.cera-test-vpc-1.var.network_name]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.google_compute_firewall.firewall-rdp" references: [module.cera-test-vpc-1.google_compute_network.greensync-network]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.kubernetes_role_binding.viewer" references: [module.cluster-services.var.viewers module.cluster-services.kubernetes_namespace.app-namespace module.cluster-services.var.viewers]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.output.service_account_email" references: [module.ns-policy-test-1.google_service_account.service_account]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.pool_b_min_node_count" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.default_cpu_limit" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.name" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.pool_b_preemptible" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "google_compute_address.nataddress-australia-southeast1-1" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection" references: [module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation module.cera-test-vpc-1.google_compute_network.greensync-network]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic" references: [module.ns-policy-test-1.var.use_network_policies module.ns-policy-test-1.var.allow_internet_ingress_traffic module.ns-policy-test-1.var.allow_internet_ingress_traffic module.ns-policy-test-1.var.allow_internet_ingress_traffic module.ns-policy-test-1.kubernetes_namespace.app-namespace module.ns-policy-test-1.var.allow_internet_ingress_traffic module.ns-policy-test-1.var.allow_internet_ingress_traffic]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.kubernetes_secret.service-account-credentials" references: [module.ns-policy-test-1.google_service_account_key.app_key module.ns-policy-test-1.kubernetes_namespace.app-namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.name" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.viewers" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.google_container_node_pool.pool-a" references: [module.cera-test-cluster-1.var.pool_a_min_node_count module.cera-test-cluster-1.var.pool_a_max_node_count module.cera-test-cluster-1.google_container_cluster.cluster module.cera-test-cluster-1.var.pool_a_gke_version module.cera-test-cluster-1.var.pool_a_min_node_count module.cera-test-cluster-1.var.location module.cera-test-cluster-1.var.pool_a_min_node_count module.cera-test-cluster-1.var.pool_a_max_node_count module.cera-test-cluster-1.google_service_account.service_account module.cera-test-cluster-1.var.pool_a_machine_type module.cera-test-cluster-1.var.pool_a_disk_type module.cera-test-cluster-1.var.pool_a_disk_size_gb module.cera-test-cluster-1.var.pool_a_preemptible]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.data.template_file.nat-startup-script" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.kubernetes_namespace.app-namespace" references: [module.cluster-services.var.name module.cluster-services.var.name]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.kubernetes_role_binding.viewer" references: [module.ns-policy-test-1.var.viewers module.ns-policy-test-1.kubernetes_namespace.app-namespace module.ns-policy-test-1.var.viewers]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.kubernetes_role_binding.admin" references: [module.ns-policy-test-2.var.admins module.ns-policy-test-2.kubernetes_namespace.app-namespace module.ns-policy-test-2.var.admins]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.google_service_account_key.app_key" references: [module.ns-policy-test-1.google_service_account.service_account]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace" references: [module.ns-policy-test-1.var.use_network_policies module.ns-policy-test-1.kubernetes_namespace.app-namespace module.ns-policy-test-1.kubernetes_namespace.app-namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.name" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.default_cpu_limit" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.pool_b_max_node_count" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "provider.google-beta" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.google_container_cluster.cluster" references: [module.cera-test-cluster-1.var.location module.cera-test-cluster-1.var.gke_min_master_version module.cera-test-cluster-1.var.network module.cera-test-cluster-1.var.name module.cera-test-cluster-1.var.gke_master_ipv4_cidr module.cera-test-cluster-1.var.security_group]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.kubernetes_network_policy.default-deny" references: [module.cluster-services.var.use_network_policies module.cluster-services.kubernetes_namespace.app-namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace" references: [module.ns-policy-test-2.var.use_network_policies module.ns-policy-test-2.kubernetes_namespace.app-namespace module.ns-policy-test-2.kubernetes_namespace.app-namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.kubernetes_secret.database-credentials" references: [module.ns-policy-test-2.var.db_username module.ns-policy-test-2.var.db_password module.ns-policy-test-2.var.db_connection_name module.ns-policy-test-2.var.db_name module.ns-policy-test-2.var.db_username module.ns-policy-test-2.var.db_password module.ns-policy-test-2.var.db_connection_name module.ns-policy-test-2.var.db_name module.ns-policy-test-2.kubernetes_namespace.app-namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.quota_memory" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.kubernetes_secret.database-credentials" references: [module.cluster-services.var.db_username module.cluster-services.var.db_password module.cluster-services.var.db_connection_name module.cluster-services.var.db_name module.cluster-services.var.db_username module.cluster-services.var.db_password module.cluster-services.var.db_connection_name module.cluster-services.var.db_name module.cluster-services.kubernetes_namespace.app-namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.kubernetes_secret.service-account-credentials" references: [module.ns-policy-test-2.google_service_account_key.app_key module.ns-policy-test-2.kubernetes_namespace.app-namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.gcp_project" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.pool_a_min_node_count" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.google_compute_firewall.firewall-ssh" references: [module.cera-test-vpc-1.google_compute_network.greensync-network]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh" references: [module.cera-test-vpc-1.var.network_name module.cera-test-vpc-1.google_compute_network.greensync-network]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.google_service_account_key.app_key" references: [module.cluster-services.google_service_account.service_account]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.pool_b_disk_size_gb" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "provider.google" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.pool_a_disk_type" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.kubernetes_network_policy.allow-cluster-traffic" references: [module.cluster-services.var.use_network_policies module.cluster-services.var.allow_cluster_ingress_traffic module.cluster-services.var.allow_cluster_ingress_traffic module.cluster-services.var.allow_cluster_ingress_traffic module.cluster-services.kubernetes_namespace.app-namespace module.cluster-services.var.allow_cluster_ingress_traffic module.cluster-services.var.allow_cluster_ingress_traffic]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.google_service_account.service_account" references: [module.ns-policy-test-2.var.gcp_project module.ns-policy-test-2.var.service_account_name module.ns-policy-test-2.var.name module.ns-policy-test-2.var.service_account_name module.ns-policy-test-2.var.name]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.db_connection_name" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.admins" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.var.db_password" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.db_username" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "provider.kubernetes.cera-test-cluster-1" references: [module.cera-test-cluster-1.output.cluster_ca_certificate data.google_client_config.default module.cera-test-cluster-1.output.endpoint]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services" references: [module.ns-policy-test-1.var.use_network_policies module.ns-policy-test-1.kubernetes_namespace.app-namespace module.ns-policy-test-1.var.cluster_services_namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.google_compute_router.cloud-router" references: [module.cera-test-vpc-1.var.cloud_router_bgp_asn module.cera-test-vpc-1.var.cloud_nat_gateways module.cera-test-vpc-1.var.network_name module.cera-test-vpc-1.google_compute_network.greensync-network module.cera-test-vpc-1.var.cloud_router_bgp_asn]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.kubernetes_secret.google-application-credentials" references: [module.ns-policy-test-1.google_service_account_key.app_key module.ns-policy-test-1.kubernetes_namespace.app-namespace module.ns-policy-test-1.var.name]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.kubernetes_role_binding.viewer" references: [module.ns-policy-test-2.var.viewers module.ns-policy-test-2.kubernetes_namespace.app-namespace module.ns-policy-test-2.var.viewers]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.output.cluster_service_account_email" references: [module.cera-test-cluster-1.google_service_account.service_account]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.var.db_name" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-cluster-1.var.network" references: [module.cera-test-vpc-1.output.network_self_link]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.kubernetes_role_binding.editor" references: [module.cluster-services.var.editors module.cluster-services.kubernetes_namespace.app-namespace module.cluster-services.var.editors]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic" references: [module.ns-policy-test-1.var.use_network_policies module.ns-policy-test-1.var.allow_cluster_ingress_traffic module.ns-policy-test-1.var.allow_cluster_ingress_traffic module.ns-policy-test-1.var.allow_cluster_ingress_traffic module.ns-policy-test-1.kubernetes_namespace.app-namespace module.ns-policy-test-1.var.allow_cluster_ingress_traffic module.ns-policy-test-1.var.allow_cluster_ingress_traffic]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.kubernetes_limit_range.limit-defaults" references: [module.ns-policy-test-1.kubernetes_namespace.app-namespace module.ns-policy-test-1.var.default_cpu_limit module.ns-policy-test-1.var.default_memory_limit module.ns-policy-test-1.var.default_cpu_limit module.ns-policy-test-1.var.default_memory_limit]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.kubernetes_namespace.app-namespace" references: [module.ns-policy-test-2.var.name module.ns-policy-test-2.var.name]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.output.nat_instance_link_b" references: [module.cera-test-vpc-1.google_compute_instance.nat-b]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.var.viewers" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services" references: [module.cluster-services.var.use_network_policies module.cluster-services.kubernetes_namespace.app-namespace module.cluster-services.var.cluster_services_namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-1.kubernetes_network_policy.default-deny" references: [module.ns-policy-test-1.var.use_network_policies module.ns-policy-test-1.kubernetes_namespace.app-namespace]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic" references: [module.ns-policy-test-2.var.use_network_policies module.ns-policy-test-2.var.allow_internet_ingress_traffic module.ns-policy-test-2.var.allow_internet_ingress_traffic module.ns-policy-test-2.kubernetes_namespace.app-namespace module.ns-policy-test-2.var.allow_internet_ingress_traffic module.ns-policy-test-2.var.allow_internet_ingress_traffic module.ns-policy-test-2.var.allow_internet_ingress_traffic]
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.var.enable_nat_b" references: []
2019/07/04 13:45:35 [DEBUG] ReferenceTransformer: "module.cera-test-vpc-1.var.cloud_nat_gateways" references: [google_compute_address.nataddress-australia-southeast1-1]
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
data.google_project.project - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
provider.template - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
provider.google-beta - *terraform.NodeApplyableProvider
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
data.google_client_config.default - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
provider.template - *terraform.NodeApplyableProvider
------
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
data.google_project.project - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
data.google_client_config.default - *terraform.NodeValidatableResource
data.google_project.project - *terraform.NodeValidatableResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
provider.google-beta - *terraform.NodeApplyableProvider
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
provider.template - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
provider.template - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
provider.google-beta - *terraform.NodeApplyableProvider
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
data.google_client_config.default - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
provider.template - *terraform.NodeApplyableProvider
------
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.TargetsTransformer
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes)
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.CloseProviderTransformer
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
data.google_project.project - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
data.google_client_config.default - *terraform.NodeValidatableResource
data.google_project.project - *terraform.NodeValidatableResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
provider.google-beta - *terraform.NodeApplyableProvider
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
provider.template - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
provider.template - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
provider.google (close) - *terraform.graphNodeCloseProvider
data.google_client_config.default - *terraform.NodeValidatableResource
data.google_project.project - *terraform.NodeValidatableResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provider.google-beta - *terraform.NodeApplyableProvider
provider.google-beta (close) - *terraform.graphNodeCloseProvider
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
provider.google-beta - *terraform.NodeApplyableProvider
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
data.google_client_config.default - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
provider.kubernetes.cera-test-cluster-1 (close) - *terraform.graphNodeCloseProvider
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
provider.template - *terraform.NodeApplyableProvider
provider.template (close) - *terraform.graphNodeCloseProvider
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
provider.template - *terraform.NodeApplyableProvider
------
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
data.google_project.project - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
data.google_client_config.default - *terraform.NodeValidatableResource
data.google_project.project - *terraform.NodeValidatableResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
provider.google-beta - *terraform.NodeApplyableProvider
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
provider.template - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
provider.template - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
provider.google (close) - *terraform.graphNodeCloseProvider
data.google_client_config.default - *terraform.NodeValidatableResource
data.google_project.project - *terraform.NodeValidatableResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provider.google-beta - *terraform.NodeApplyableProvider
provider.google-beta (close) - *terraform.graphNodeCloseProvider
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
provider.google-beta - *terraform.NodeApplyableProvider
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
data.google_client_config.default - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
provider.kubernetes.cera-test-cluster-1 (close) - *terraform.graphNodeCloseProvider
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
provider.template - *terraform.NodeApplyableProvider
provider.template (close) - *terraform.graphNodeCloseProvider
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
provider.template - *terraform.NodeApplyableProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
------
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.RootTransformer
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.RootTransformer with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
data.google_project.project - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
data.google_client_config.default - *terraform.NodeValidatableResource
data.google_project.project - *terraform.NodeValidatableResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
provider.google-beta - *terraform.NodeApplyableProvider
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
provider.template - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
provider.template - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
provider.google (close) - *terraform.graphNodeCloseProvider
data.google_client_config.default - *terraform.NodeValidatableResource
data.google_project.project - *terraform.NodeValidatableResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provider.google-beta - *terraform.NodeApplyableProvider
provider.google-beta (close) - *terraform.graphNodeCloseProvider
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
provider.google-beta - *terraform.NodeApplyableProvider
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
data.google_client_config.default - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
provider.kubernetes.cera-test-cluster-1 (close) - *terraform.graphNodeCloseProvider
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
provider.template - *terraform.NodeApplyableProvider
provider.template (close) - *terraform.graphNodeCloseProvider
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
provider.template - *terraform.NodeApplyableProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.google (close) - *terraform.graphNodeCloseProvider
provider.google-beta (close) - *terraform.graphNodeCloseProvider
provider.kubernetes.cera-test-cluster-1 (close) - *terraform.graphNodeCloseProvider
provider.template (close) - *terraform.graphNodeCloseProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
------
2019/07/04 13:45:35 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer
2019/07/04 13:45:35 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph:
data.google_client_config.default - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
data.google_project.project - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
data.google_project.project - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
provider.google-beta - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeValidatableResource
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
provider.template - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeValidatableResource
module.cera-test-vpc-1.provisioner.local-exec - *terraform.NodeProvisioner
module.cera-test-vpc-1.var.cloud_nat_gateways - *terraform.NodeApplyableModuleVariable
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeValidatableResource
module.cera-test-vpc-1.var.cloud_router_bgp_asn - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.enable_nat_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_a - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.external_nat_ip_b - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_allocation - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.nat_zone - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_description - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.var.network_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.cluster-services.google_service_account.service_account - *terraform.NodeValidatableResource
module.cluster-services.var.admins - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_password - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.db_username - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.editors - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.cluster-services.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-1.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-1.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeValidatableResource
module.ns-policy-test-2.var.admins - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_cluster_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.allow_internet_ingress_traffic - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.cluster_services_namespace - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_connection_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_password - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.db_username - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_cpu_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.default_memory_limit - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.editors - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.gcp_project - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_cpu - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.quota_memory - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.service_account_name - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.use_network_policies - *terraform.NodeApplyableModuleVariable
module.ns-policy-test-2.var.viewers - *terraform.NodeApplyableModuleVariable
provider.google - *terraform.NodeApplyableProvider
provider.google (close) - *terraform.graphNodeCloseProvider
data.google_client_config.default - *terraform.NodeValidatableResource
data.google_project.project - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeValidatableResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeValidatableResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeValidatableResource
provider.google-beta - *terraform.NodeApplyableProvider
provider.google-beta (close) - *terraform.graphNodeCloseProvider
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeValidatableResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeValidatableResource
provider.kubernetes.cera-test-cluster-1 - *terraform.NodeApplyableProvider
data.google_client_config.default - *terraform.NodeValidatableResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
provider.kubernetes.cera-test-cluster-1 (close) - *terraform.graphNodeCloseProvider
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeValidatableResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeValidatableResource
provider.template - *terraform.NodeApplyableProvider
provider.template (close) - *terraform.graphNodeCloseProvider
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeValidatableResource
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeValidatableResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeValidatableResource
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.google (close) - *terraform.graphNodeCloseProvider
provider.google-beta (close) - *terraform.graphNodeCloseProvider
provider.kubernetes.cera-test-cluster-1 (close) - *terraform.graphNodeCloseProvider
provider.template (close) - *terraform.graphNodeCloseProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
------
2019/07/04 13:45:35 [DEBUG] Starting graph walk: walkValidate
2019/07/04 13:45:35 [TRACE] dag/walk: updating graph
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.kubernetes_secret.database-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.kubernetes_secret.google-application-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.viewers"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.output.service_account_email"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.allow_internet_ingress_traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.cluster_services_namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "provider.google-beta (close)"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.pool_b_max_node_count"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.allow_cluster_ingress_traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.google_compute_route.nat-route-a"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.kubernetes_secret.google-application-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.name"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.var.gcp_project"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.security_group"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.name"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.google_compute_firewall.firewall-http"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.gke_master_ipv4_cidr"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.db_username"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "provider.kubernetes.cera-test-cluster-1"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.allow_internet_ingress_traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.kubernetes_secret.google-application-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.pool_b_disk_size_gb"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.kubernetes_network_policy.allow-cluster-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.db_password"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.kubernetes_resource_quota.limit-quota"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.kubernetes_role_binding.viewer"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.gcp_project"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.google_compute_firewall.firewall-ssh"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.editors"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "provider.template"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.allow_cluster_ingress_traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.admins"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.kubernetes_network_policy.allow-internet-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.default_cpu_limit"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.db_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.db_username"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.kubernetes_role_binding.editor"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "meta.count-boundary (EachMode fixup)"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.viewers"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.admins"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.quota_cpu"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.output.nat_instance_link_a"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.quota_cpu"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.google_container_node_pool.pool-a"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.kubernetes_network_policy.default-deny"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.quota_memory"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.gke_min_master_version"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.kubernetes_role_binding.admin"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.default_cpu_limit"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "provider.google"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.google_compute_network.greensync-network"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.output.cluster_ca_certificate"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.pool_b_gke_version"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "provisioner.local-exec (close)"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.pool_b_machine_type"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.var.enable_nat_b"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.kubernetes_secret.database-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.service_account_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.var.cloud_router_bgp_asn"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.output.service_account_email"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.allow_internet_ingress_traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.output.network_self_link"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.google_container_cluster.cluster"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.location"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.kubernetes_resource_quota.limit-quota"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.kubernetes_role_binding.admin"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.quota_memory"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "google_compute_address.nataddress-australia-southeast1-1"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.google_service_account_key.app_key"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.default_memory_limit"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.allow_cluster_ingress_traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "data.google_project.project"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.google_container_node_pool.pool-b"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.google_compute_router.cloud-router"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.service_account_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.quota_cpu"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.kubernetes_resource_quota.limit-quota"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.data.template_file.nat-startup-script"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.kubernetes_network_policy.default-deny"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "provider.kubernetes.cera-test-cluster-1 (close)"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.kubernetes_role_binding.viewer"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.kubernetes_secret.service-account-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.google_compute_instance.nat-b"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.kubernetes_secret.service-account-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.output.endpoint"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.editors"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.db_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.db_connection_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.output.cluster_service_account_email"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.db_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.pool_a_machine_type"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.var.google_managed_service_provider_allocation"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.pool_a_disk_size_gb"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.pool_b_min_node_count"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.default_cpu_limit"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "root"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.output.nat_instance_link_b"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.gcp_project"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.kubernetes_network_policy.default-deny"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.db_password"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.admins"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.pool_a_disk_type"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.default_memory_limit"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.pool_b_disk_type"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.gcp_project"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.google_service_account_key.app_key"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.var.nat_zone"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.name"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.kubernetes_limit_range.limit-defaults"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.pool_a_max_node_count"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.var.network_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.quota_memory"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.network"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.kubernetes_role_binding.editor"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.var.external_nat_ip_a"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.pool_a_preemptible"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.service_account_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.google_compute_firewall.firewall-rdp"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.kubernetes_role_binding.editor"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.viewers"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.var.network_description"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "provider.template (close)"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.kubernetes_role_binding.viewer"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.db_connection_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.google_compute_route.nat-route-b"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.google_service_account_key.app_key"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.cluster_services_namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.name"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.var.cloud_nat_gateways"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.kubernetes_limit_range.limit-defaults"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.kubernetes_role_binding.admin"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.kubernetes_limit_range.limit-defaults"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.pool_a_min_node_count"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.cluster_services_namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.pool_a_gke_version"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.default_memory_limit"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.kubernetes_secret.service-account-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.var.enable_nat_a"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.kubernetes_secret.database-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.db_connection_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.output.service_account_email"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-1.var.db_username"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "provider.google (close)"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cluster-services.var.db_password"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "provider.google-beta"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.var.external_nat_ip_b"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.ns-policy-test-2.var.editors"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.google_compute_instance.nat-a"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "data.google_client_config.default"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.provisioner.local-exec"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-vpc-1.output.nat_zone"
2019/07/04 13:45:35 [TRACE] dag/walk: added new vertex: "module.cera-test-cluster-1.var.pool_b_preemptible"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_network_policy.default-deny" waiting on "module.cluster-services.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cluster-services.kubernetes_role_binding.viewer"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-2.kubernetes_resource_quota.limit-quota"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-vpc-1.google_compute_route.nat-route-a"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_limit_range.limit-defaults" waiting on "module.cluster-services.var.default_memory_limit"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-a" waiting on "module.cera-test-cluster-1.google_container_cluster.cluster"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-1.kubernetes_network_policy.default-deny"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "module.cera-test-vpc-1.google_compute_firewall.firewall-ssh"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cluster-services.kubernetes_secret.google-application-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_secret.database-credentials" waiting on "module.cluster-services.var.db_password"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-vpc-1.google_compute_firewall.firewall-http"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cluster-services.output.service_account_email"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_network_policy.default-deny" waiting on "module.ns-policy-test-1.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-cluster-1.output.cluster_service_account_email"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-2.kubernetes_network_policy.default-deny"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_role_binding.admin" waiting on "module.ns-policy-test-1.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.output.cluster_ca_certificate" waiting on "module.cera-test-cluster-1.google_container_cluster.cluster"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-2.kubernetes_role_binding.viewer"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-b" waiting on "module.cera-test-cluster-1.var.pool_b_max_node_count"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_cluster.cluster" waiting on "module.cera-test-cluster-1.var.network"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.google_service_account_key.app_key" waiting on "module.ns-policy-test-1.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-1.kubernetes_limit_range.limit-defaults"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cluster-services.kubernetes_role_binding.admin"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation" waiting on "module.cera-test-vpc-1.var.google_managed_service_provider_allocation"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.output.service_account_email" waiting on "module.ns-policy-test-2.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_secret.database-credentials" waiting on "module.cluster-services.var.db_connection_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.cluster-services.kubernetes_secret.service-account-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cluster-services.kubernetes_network_policy.default-deny"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-2.output.service_account_email"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-1.kubernetes_secret.database-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services" waiting on "module.cluster-services.var.cluster_services_namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_role_binding.editor" waiting on "module.ns-policy-test-1.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-b" waiting on "module.cera-test-cluster-1.google_container_cluster.cluster"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_limit_range.limit-defaults" waiting on "module.cluster-services.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.google_service_account.service_account" waiting on "module.ns-policy-test-1.var.service_account_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_firewall.firewall-ssh" waiting on "module.cera-test-vpc-1.google_compute_network.greensync-network"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services" waiting on "module.ns-policy-test-2.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.var.network" waiting on "module.cera-test-vpc-1.output.network_self_link"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_resource_quota.limit-quota" waiting on "module.ns-policy-test-1.var.quota_cpu"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_instance.nat-a" waiting on "module.cera-test-vpc-1.var.external_nat_ip_a"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_role_binding.admin" waiting on "module.ns-policy-test-1.var.admins"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_limit_range.limit-defaults" waiting on "module.ns-policy-test-2.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "module.ns-policy-test-2.google_service_account_key.app_key"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.google_service_account.service_account" waiting on "module.ns-policy-test-2.var.gcp_project"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-1.output.service_account_email"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_cluster.cluster" waiting on "module.cera-test-cluster-1.var.location"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace" waiting on "module.ns-policy-test-1.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-b" waiting on "module.cera-test-cluster-1.var.pool_b_machine_type"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_firewall.firewall-http" waiting on "module.cera-test-vpc-1.google_compute_network.greensync-network"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "module.cera-test-vpc-1.google_compute_instance.nat-a"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.google_service_account.service_account" waiting on "module.cluster-services.var.name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_role_binding.admin" waiting on "module.cluster-services.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_resource_quota.limit-quota" waiting on "module.ns-policy-test-2.var.quota_memory"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-1.kubernetes_secret.google-application-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cluster-services.kubernetes_limit_range.limit-defaults"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-1.kubernetes_secret.google-application-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic" waiting on "module.ns-policy-test-1.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_cluster.cluster" waiting on "module.cera-test-cluster-1.var.name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal" waiting on "module.cera-test-vpc-1.google_compute_network.greensync-network"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_secret.database-credentials" waiting on "module.ns-policy-test-2.var.db_username"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_instance.nat-b" waiting on "provider.google"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-2.kubernetes_secret.service-account-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_instance.nat-b" waiting on "module.cera-test-vpc-1.var.gcp_project"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.output.network_self_link" waiting on "module.cera-test-vpc-1.google_compute_network.greensync-network"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1" waiting on "module.cera-test-cluster-1.output.endpoint"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-2.kubernetes_secret.database-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_network.greensync-network" waiting on "module.cera-test-vpc-1.var.network_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_secret.database-credentials" waiting on "module.ns-policy-test-2.var.db_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_secret.database-credentials" waiting on "module.ns-policy-test-1.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-a" waiting on "module.cera-test-cluster-1.var.pool_a_min_node_count"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "module.cera-test-vpc-1.google_compute_firewall.firewall-http"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_namespace.app-namespace" waiting on "provider.kubernetes.cera-test-cluster-1"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.cluster-services.kubernetes_role_binding.viewer"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation" waiting on "module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-2.kubernetes_secret.service-account-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace" waiting on "module.cluster-services.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-1.kubernetes_role_binding.viewer"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-a" waiting on "module.cera-test-cluster-1.var.pool_a_disk_type"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "module.cera-test-vpc-1.google_compute_route.nat-route-b"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_instance.nat-b" waiting on "module.cera-test-vpc-1.var.nat_zone"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_network_policy.allow-cluster-traffic" waiting on "module.cluster-services.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_instance.nat-a" waiting on "module.cera-test-vpc-1.data.template_file.nat-startup-script"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_secret.database-credentials" waiting on "module.ns-policy-test-2.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace" waiting on "module.cluster-services.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "module.cluster-services.google_service_account_key.app_key"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_service_account.service_account" waiting on "module.cera-test-cluster-1.var.name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_secret.service-account-credentials" waiting on "module.ns-policy-test-2.google_service_account_key.app_key"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-vpc-1.output.nat_zone"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_limit_range.limit-defaults" waiting on "module.ns-policy-test-1.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "root" waiting on "provider.kubernetes.cera-test-cluster-1 (close)"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-2.kubernetes_network_policy.default-deny"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.cluster-services.kubernetes_network_policy.allow-internet-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google-beta (close)" waiting on "module.cera-test-cluster-1.google_container_node_pool.pool-b"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_cluster.cluster" waiting on "provider.google-beta"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.output.nat_instance_link_a" waiting on "module.cera-test-vpc-1.google_compute_instance.nat-a"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_role_binding.editor" waiting on "module.cluster-services.var.editors"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "root" waiting on "provider.google-beta (close)"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_resource_quota.limit-quota" waiting on "module.ns-policy-test-1.var.quota_memory"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.cluster-services.kubernetes_network_policy.allow-cluster-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_namespace.app-namespace" waiting on "module.cluster-services.var.name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_network_policy.default-deny" waiting on "module.cluster-services.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google-beta (close)" waiting on "module.cera-test-cluster-1.google_container_node_pool.pool-a"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_secret.google-application-credentials" waiting on "module.ns-policy-test-1.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_role_binding.admin" waiting on "module.ns-policy-test-2.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-1.kubernetes_network_policy.default-deny"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.google_service_account.service_account" waiting on "provider.google"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.output.cluster_service_account_email" waiting on "module.cera-test-cluster-1.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_role_binding.admin" waiting on "module.ns-policy-test-2.var.admins"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_cluster.cluster" waiting on "module.cera-test-cluster-1.var.gke_min_master_version"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.google_service_account.service_account" waiting on "module.ns-policy-test-1.var.gcp_project"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-vpc-1.google_compute_route.nat-route-b"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.cluster-services.kubernetes_role_binding.admin"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-a" waiting on "module.cera-test-cluster-1.var.pool_a_gke_version"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-1.kubernetes_role_binding.admin"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.output.nat_zone" waiting on "module.cera-test-vpc-1.var.nat_zone"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic" waiting on "module.ns-policy-test-1.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services" waiting on "module.ns-policy-test-2.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_namespace.app-namespace" waiting on "provider.kubernetes.cera-test-cluster-1"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp" waiting on "module.cera-test-vpc-1.google_compute_network.greensync-network"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_instance.nat-a" waiting on "module.cera-test-vpc-1.var.network_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.google_service_account_key.app_key" waiting on "module.cluster-services.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_secret.google-application-credentials" waiting on "module.cluster-services.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-1.kubernetes_secret.service-account-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic" waiting on "module.ns-policy-test-2.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_role_binding.viewer" waiting on "module.ns-policy-test-2.var.viewers"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_role_binding.editor" waiting on "module.cluster-services.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-2.kubernetes_role_binding.editor"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_instance.nat-a" waiting on "module.cera-test-vpc-1.provisioner.local-exec"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic" waiting on "module.ns-policy-test-1.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_secret.database-credentials" waiting on "module.cluster-services.var.db_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh" waiting on "module.cera-test-vpc-1.google_compute_network.greensync-network"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace" waiting on "module.ns-policy-test-2.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_limit_range.limit-defaults" waiting on "module.ns-policy-test-1.var.default_cpu_limit"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-1.kubernetes_secret.database-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic" waiting on "module.ns-policy-test-1.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-2.kubernetes_resource_quota.limit-quota"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1" waiting on "module.cera-test-cluster-1.output.cluster_ca_certificate"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_route.nat-route-a" waiting on "module.cera-test-vpc-1.var.enable_nat_a"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-2.kubernetes_limit_range.limit-defaults"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_secret.google-application-credentials" waiting on "module.cluster-services.google_service_account_key.app_key"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_network.greensync-network" waiting on "provider.google"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_resource_quota.limit-quota" waiting on "module.cluster-services.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.cluster-services.kubernetes_role_binding.editor"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-1.kubernetes_secret.service-account-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_role_binding.viewer" waiting on "module.ns-policy-test-2.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "module.cera-test-vpc-1.google_compute_firewall.firewall-rdp"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_role_binding.viewer" waiting on "module.cluster-services.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_secret.database-credentials" waiting on "module.ns-policy-test-2.var.db_connection_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway" waiting on "module.cera-test-vpc-1.google_compute_router.cloud-router"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_resource_quota.limit-quota" waiting on "module.ns-policy-test-2.var.quota_cpu"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.google_service_account.service_account" waiting on "module.ns-policy-test-2.var.name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "data.google_project.project" waiting on "provider.google"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_namespace.app-namespace" waiting on "module.ns-policy-test-1.var.name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "root" waiting on "provisioner.local-exec (close)"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-1.kubernetes_role_binding.admin"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_resource_quota.limit-quota" waiting on "module.ns-policy-test-2.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-a" waiting on "module.cera-test-cluster-1.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_cluster.cluster" waiting on "module.cera-test-cluster-1.var.gke_master_ipv4_cidr"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-b" waiting on "module.cera-test-cluster-1.var.pool_b_preemptible"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-b" waiting on "module.cera-test-cluster-1.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_secret.database-credentials" waiting on "module.ns-policy-test-2.var.db_password"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_instance.nat-b" waiting on "module.cera-test-vpc-1.var.network_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.google_service_account.service_account" waiting on "module.ns-policy-test-1.var.name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "data.google_client_config.default" waiting on "provider.google"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services" waiting on "module.ns-policy-test-1.var.cluster_services_namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_limit_range.limit-defaults" waiting on "module.ns-policy-test-2.var.default_memory_limit"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-1.kubernetes_resource_quota.limit-quota"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "data.google_project.project"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_secret.database-credentials" waiting on "module.ns-policy-test-1.var.db_connection_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_network_policy.default-deny" waiting on "module.ns-policy-test-2.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_resource_quota.limit-quota" waiting on "module.ns-policy-test-1.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_secret.database-credentials" waiting on "module.cluster-services.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic" waiting on "module.ns-policy-test-2.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "data.google_project.project"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-vpc-1.google_compute_firewall.firewall-rdp"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-b" waiting on "module.cera-test-cluster-1.var.pool_b_disk_size_gb"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-1.kubernetes_role_binding.viewer"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.output.service_account_email" waiting on "module.cluster-services.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_network_policy.allow-cluster-traffic" waiting on "module.cluster-services.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic" waiting on "module.ns-policy-test-2.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic" waiting on "module.ns-policy-test-1.var.allow_cluster_ingress_traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-1.kubernetes_limit_range.limit-defaults"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection" waiting on "module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic" waiting on "module.ns-policy-test-1.var.allow_internet_ingress_traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_resource_quota.limit-quota" waiting on "module.cluster-services.var.quota_cpu"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_network_policy.allow-internet-traffic" waiting on "module.cluster-services.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_router.cloud-router" waiting on "module.cera-test-vpc-1.google_compute_network.greensync-network"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-2.kubernetes_role_binding.editor"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-a" waiting on "module.cera-test-cluster-1.var.pool_a_preemptible"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_network_policy.allow-internet-traffic" waiting on "module.cluster-services.var.allow_internet_ingress_traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.var.cloud_nat_gateways" waiting on "google_compute_address.nataddress-australia-southeast1-1"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "module.cera-test-cluster-1.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_network_policy.allow-internet-traffic" waiting on "module.cluster-services.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-cluster-1.google_container_node_pool.pool-a"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-vpc-1.output.nat_instance_link_b"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_secret.service-account-credentials" waiting on "module.ns-policy-test-2.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.output.nat_instance_link_b" waiting on "module.cera-test-vpc-1.google_compute_instance.nat-b"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.output.endpoint" waiting on "module.cera-test-cluster-1.google_container_cluster.cluster"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-b" waiting on "module.cera-test-cluster-1.var.pool_b_min_node_count"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-2.kubernetes_role_binding.admin"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1" waiting on "data.google_client_config.default"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.cluster-services.kubernetes_secret.google-application-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.google_service_account.service_account" waiting on "module.cluster-services.var.service_account_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-a" waiting on "module.cera-test-cluster-1.var.pool_a_machine_type"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.cluster-services.kubernetes_resource_quota.limit-quota"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "data.google_client_config.default"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "module.cera-test-vpc-1.google_compute_instance.nat-b"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-b" waiting on "module.cera-test-cluster-1.var.pool_b_disk_type"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "google_compute_address.nataddress-australia-southeast1-1" waiting on "provider.google"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-1.kubernetes_role_binding.editor"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cluster-services.kubernetes_network_policy.allow-internet-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services" waiting on "module.ns-policy-test-1.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "module.ns-policy-test-1.google_service_account_key.app_key"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_secret.service-account-credentials" waiting on "module.ns-policy-test-1.google_service_account_key.app_key"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-1.kubernetes_resource_quota.limit-quota"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.output.service_account_email" waiting on "module.ns-policy-test-1.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (EachMode fixup)"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_instance.nat-b" waiting on "module.cera-test-vpc-1.data.template_file.nat-startup-script"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.template (close)" waiting on "module.cera-test-vpc-1.data.template_file.nat-startup-script"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.google_service_account.service_account" waiting on "provider.google"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace" waiting on "module.ns-policy-test-2.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_network_policy.default-deny" waiting on "module.ns-policy-test-1.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_router.cloud-router" waiting on "module.cera-test-vpc-1.var.cloud_router_bgp_asn"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_secret.database-credentials" waiting on "module.ns-policy-test-1.var.db_username"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-1.kubernetes_role_binding.editor"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services" waiting on "module.cluster-services.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_secret.database-credentials" waiting on "module.ns-policy-test-1.var.db_name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-2.kubernetes_limit_range.limit-defaults"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-2.kubernetes_secret.google-application-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_role_binding.editor" waiting on "module.ns-policy-test-1.var.editors"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_secret.database-credentials" waiting on "module.cluster-services.var.db_username"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_route.nat-route-b" waiting on "module.cera-test-vpc-1.google_compute_instance.nat-b"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-a" waiting on "module.cera-test-cluster-1.var.pool_a_max_node_count"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_network_policy.allow-cluster-traffic" waiting on "module.cluster-services.var.allow_cluster_ingress_traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_secret.google-application-credentials" waiting on "module.ns-policy-test-2.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-a" waiting on "module.cera-test-cluster-1.var.pool_a_disk_size_gb"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_limit_range.limit-defaults" waiting on "module.ns-policy-test-2.var.default_cpu_limit"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_firewall.firewall-rdp" waiting on "module.cera-test-vpc-1.google_compute_network.greensync-network"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_role_binding.viewer" waiting on "module.cluster-services.var.viewers"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_role_binding.editor" waiting on "module.ns-policy-test-2.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_secret.google-application-credentials" waiting on "module.ns-policy-test-2.google_service_account_key.app_key"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.data.template_file.nat-startup-script" waiting on "provider.template"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic" waiting on "module.ns-policy-test-2.var.allow_internet_ingress_traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-vpc-1.output.nat_instance_link_a"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_resource_quota.limit-quota" waiting on "module.cluster-services.var.quota_memory"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_route.nat-route-b" waiting on "module.cera-test-vpc-1.var.enable_nat_b"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_secret.database-credentials" waiting on "module.ns-policy-test-1.var.db_password"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cluster-services.kubernetes_role_binding.editor"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_role_binding.viewer" waiting on "module.ns-policy-test-1.var.viewers"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_secret.google-application-credentials" waiting on "module.ns-policy-test-1.google_service_account_key.app_key"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-2.kubernetes_secret.google-application-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services" waiting on "module.ns-policy-test-2.var.cluster_services_namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_instance.nat-a" waiting on "module.cera-test-vpc-1.var.nat_zone"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_instance.nat-a" waiting on "module.cera-test-vpc-1.var.gcp_project"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_namespace.app-namespace" waiting on "provider.kubernetes.cera-test-cluster-1"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cluster-services.kubernetes_network_policy.allow-cluster-traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.cluster-services.kubernetes_secret.database-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cluster-services.kubernetes_secret.database-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_network.greensync-network" waiting on "module.cera-test-vpc-1.var.network_description"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-cluster-1.google_container_node_pool.pool-b"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.google_service_account.service_account" waiting on "provider.google"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cluster-services.kubernetes_resource_quota.limit-quota"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services" waiting on "module.cluster-services.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_router.cloud-router" waiting on "module.cera-test-vpc-1.var.cloud_nat_gateways"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_namespace.app-namespace" waiting on "module.ns-policy-test-2.var.name"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.cluster-services.kubernetes_limit_range.limit-defaults"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_secret.service-account-credentials" waiting on "module.cluster-services.google_service_account_key.app_key"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_route.nat-route-a" waiting on "module.cera-test-vpc-1.google_compute_instance.nat-a"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cluster-services.kubernetes_secret.service-account-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_role_binding.admin" waiting on "module.cluster-services.var.admins"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_role_binding.viewer" waiting on "module.ns-policy-test-1.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace" waiting on "module.ns-policy-test-1.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.google_service_account.service_account" waiting on "module.cluster-services.var.gcp_project"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cera-test-vpc-1.google_compute_firewall.firewall-ssh"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-2.kubernetes_role_binding.admin"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_limit_range.limit-defaults" waiting on "module.cluster-services.var.default_cpu_limit"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_role_binding.editor" waiting on "module.ns-policy-test-2.var.editors"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_node_pool.pool-b" waiting on "module.cera-test-cluster-1.var.pool_b_gke_version"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_instance.nat-b" waiting on "module.cera-test-vpc-1.var.external_nat_ip_b"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation" waiting on "module.cera-test-vpc-1.google_compute_network.greensync-network"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_instance.nat-b" waiting on "module.cera-test-vpc-1.provisioner.local-exec"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.ns-policy-test-2.kubernetes_secret.database-credentials"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_secret.service-account-credentials" waiting on "module.ns-policy-test-1.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_service_account.service_account" waiting on "provider.google"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic" waiting on "module.ns-policy-test-2.var.allow_cluster_ingress_traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-cluster-1.google_container_cluster.cluster" waiting on "module.cera-test-cluster-1.var.security_group"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_limit_range.limit-defaults" waiting on "module.ns-policy-test-1.var.default_memory_limit"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_network_policy.default-deny" waiting on "module.ns-policy-test-2.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "module.cera-test-vpc-1.google_compute_route.nat-route-a"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services" waiting on "module.ns-policy-test-1.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "root" waiting on "provider.google (close)"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic" waiting on "module.ns-policy-test-2.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.ns-policy-test-2.kubernetes_role_binding.viewer"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "provider.kubernetes.cera-test-cluster-1 (close)" waiting on "module.cluster-services.kubernetes_network_policy.default-deny"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.google_service_account_key.app_key" waiting on "module.ns-policy-test-2.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cera-test-vpc-1.google_compute_instance.nat-a" waiting on "provider.google"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.cluster-services.kubernetes_secret.service-account-credentials" waiting on "module.cluster-services.kubernetes_namespace.app-namespace"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "root" waiting on "provider.template (close)"
2019/07/04 13:45:35 [TRACE] dag/walk: added edge: "module.ns-policy-test-2.google_service_account.service_account" waiting on "module.ns-policy-test-2.var.service_account_name"
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.google_compute_instance.nat-a", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.kubernetes_namespace.app-namespace", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.kubernetes_secret.google-application-credentials", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.output.nat_zone", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "provider.kubernetes.cera-test-cluster-1 (close)", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.kubernetes_role_binding.editor", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.kubernetes_namespace.app-namespace", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-cluster-1.output.endpoint", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-cluster-1.google_container_node_pool.pool-a", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.google_service_account.service_account", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.google_compute_firewall.firewall-http", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.google_compute_instance.nat-b", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "provider.google-beta (close)", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.google_compute_route.nat-route-a", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.google_service_account_key.app_key", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.kubernetes_resource_quota.limit-quota", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.output.nat_instance_link_b", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.var.cloud_nat_gateways", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "provider.template (close)", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.kubernetes_network_policy.default-deny", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.kubernetes_role_binding.viewer", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.kubernetes_limit_range.limit-defaults", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.google_service_account_key.app_key", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.kubernetes_role_binding.editor", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.google_service_account.service_account", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "google_compute_address.nataddress-australia-southeast1-1", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.google_compute_firewall.firewall-rdp", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.kubernetes_role_binding.admin", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.kubernetes_secret.database-credentials", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "data.google_client_config.default", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.kubernetes_secret.service-account-credentials", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.kubernetes_role_binding.editor", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.google_service_account_key.app_key", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "provider.google (close)", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.google_service_account.service_account", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.kubernetes_secret.database-credentials", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.google_compute_network.greensync-network", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.kubernetes_role_binding.viewer", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.output.service_account_email", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-cluster-1.google_container_cluster.cluster", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.kubernetes_secret.service-account-credentials", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-cluster-1.var.network", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "provider.kubernetes.cera-test-cluster-1", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.data.template_file.nat-startup-script", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-cluster-1.output.cluster_ca_certificate", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.google_compute_firewall.firewall-ssh", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.kubernetes_limit_range.limit-defaults", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "provisioner.local-exec (close)", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.kubernetes_role_binding.admin", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.kubernetes_role_binding.admin", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.kubernetes_network_policy.default-deny", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (EachMode fixup)", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.output.service_account_email", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.output.nat_instance_link_a", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-cluster-1.output.cluster_service_account_email", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.kubernetes_role_binding.viewer", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-1.output.service_account_email", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-cluster-1.google_container_node_pool.pool-b", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.kubernetes_network_policy.allow-cluster-traffic", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-cluster-1.google_service_account.service_account", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "data.google_project.project", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.kubernetes_network_policy.allow-internet-traffic", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.kubernetes_network_policy.default-deny", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.kubernetes_resource_quota.limit-quota", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.google_compute_route.nat-route-b", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.output.network_self_link", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.kubernetes_secret.service-account-credentials", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.kubernetes_namespace.app-namespace", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.kubernetes_secret.google-application-credentials", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.kubernetes_secret.google-application-credentials", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.kubernetes_limit_range.limit-defaults", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.kubernetes_secret.database-credentials", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.kubernetes_resource_quota.limit-quota", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cera-test-vpc-1.google_compute_router.cloud-router", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: dependencies changed for "module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic", sending new deps
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.viewers"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.viewers": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "provider.template"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.viewers": evaluating
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.allow_internet_ingress_traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.pool_b_disk_size_gb"
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.allow_internet_ingress_traffic": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.db_password"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.gcp_project"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.db_name"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_disk_size_gb": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.db_name": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.pool_b_max_node_count"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.name"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_max_node_count": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.name": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.admins"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.gke_master_ipv4_cidr"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.db_username"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.pool_b_preemptible"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.var.gcp_project"
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.db_username": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.gcp_project": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.viewers"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.db_name"
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.db_username": evaluating
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.admins"
2019/07/04 13:45:35 [TRACE] vertex "provider.template": starting visit (*terraform.NodeApplyableProvider)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.pool_a_machine_type"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.quota_memory"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.quota_memory": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.quota_memory"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.pool_b_gke_version"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.db_password": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_gke_version": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_machine_type": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.default_cpu_limit"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "provider.google"
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.default_cpu_limit": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.allow_cluster_ingress_traffic"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.quota_cpu"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.db_password": evaluating
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.gcp_project"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_machine_type": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.db_password
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.gcp_project": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.db_password"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.name"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.db_password": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.name": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.var.nat_zone"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.db_password": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.name": evaluating
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.name
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.use_network_policies": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.name"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.pool_a_gke_version"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_gke_version": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.db_connection_name"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.admins"
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.db_connection_name": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.admins": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.var.external_nat_ip_b"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.var.network_description"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.admins": evaluating
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.viewers"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.editors"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.pool_a_disk_type"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.pool_a_min_node_count"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.db_username"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.pool_b_disk_type"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.db_password"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.db_username": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_disk_type": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.db_password": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.db_username": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_disk_type": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.db_username
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.db_password": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.pool_b_disk_type
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.db_password
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.var.network_name"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.network_name": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.network_name": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.var.network_name
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.db_password
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.db_password": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.default_cpu_limit": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.default_cpu_limit
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.db_username
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.db_username": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.quota_cpu"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.quota_cpu": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.quota_cpu": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.quota_cpu
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.pool_b_disk_type
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_disk_type": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.pool_a_preemptible"
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_preemptible": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.quota_cpu
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_preemptible": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.pool_a_preemptible
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_gke_version": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.pool_a_gke_version
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.pool_a_preemptible
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_preemptible": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.pool_a_gke_version
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.quota_cpu": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_gke_version": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "provider.google-beta"
2019/07/04 13:45:35 [TRACE] vertex "provider.google-beta": starting visit (*terraform.NodeApplyableProvider)
2019/07/04 13:45:35 [TRACE] vertex "provider.google-beta": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: provider.google-beta
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalInitProvider
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.cluster_services_namespace"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.cluster_services_namespace": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.cluster_services_namespace": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.cluster_services_namespace
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.cluster_services_namespace
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.cluster_services_namespace": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.pool_a_machine_type
2019-07-04T13:45:35.642+1000 [INFO] plugin: configuring client automatic mTLS
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.pool_a_machine_type
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_machine_type": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.gke_min_master_version"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.gke_min_master_version": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.gke_min_master_version": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.gke_min_master_version
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.quota_memory": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.quota_memory
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.gke_min_master_version
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.gke_min_master_version": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.var.enable_nat_a"
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.enable_nat_a": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.service_account_name"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.enable_nat_a": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.quota_memory
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.var.enable_nat_a
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_max_node_count": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.pool_b_max_node_count
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.pool_b_max_node_count
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_max_node_count": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.service_account_name": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.service_account_name": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.service_account_name
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.service_account_name
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.service_account_name": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.quota_memory": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.name"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.name": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.name": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.name
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.name
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.name": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.allow_cluster_ingress_traffic"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.allow_cluster_ingress_traffic": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.allow_cluster_ingress_traffic": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.allow_cluster_ingress_traffic
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.allow_cluster_ingress_traffic
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_disk_size_gb": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.allow_cluster_ingress_traffic": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.pool_b_disk_size_gb
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.pool_b_disk_size_gb
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_disk_size_gb": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.google_managed_service_provider_prefix_length": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.allow_internet_ingress_traffic": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.allow_internet_ingress_traffic
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.cluster_services_namespace"
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.allow_internet_ingress_traffic
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.cluster_services_namespace": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.cluster_services_namespace": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.cluster_services_namespace
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.cluster_services_namespace
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.cluster_services_namespace": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.allow_internet_ingress_traffic": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.gcp_project": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.gcp_project": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.gcp_project
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.db_name": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.db_name
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.gcp_project
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.gcp_project": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.db_name
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.db_name": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.admins": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.admins": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.admins
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.admins
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.admins": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.gke_master_ipv4_cidr": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.gke_master_ipv4_cidr": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.gke_master_ipv4_cidr
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.gke_master_ipv4_cidr
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.gke_master_ipv4_cidr": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.security_group"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.security_group": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.security_group": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.security_group
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.security_group
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.security_group": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.db_username"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.db_username": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.db_username": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.db_username
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.db_username
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.db_username": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.default_cpu_limit"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.default_cpu_limit": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.default_cpu_limit": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.default_cpu_limit
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.default_cpu_limit
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.default_cpu_limit": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.db_name"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.db_name": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.db_name": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.db_name
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.db_name
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_preemptible": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.db_name": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_preemptible": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.pool_b_preemptible
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.allow_cluster_ingress_traffic"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.allow_cluster_ingress_traffic": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.allow_cluster_ingress_traffic": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.pool_b_preemptible
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_preemptible": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.allow_cluster_ingress_traffic
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.allow_cluster_ingress_traffic
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.allow_cluster_ingress_traffic": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.allow_internet_ingress_traffic"
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.allow_internet_ingress_traffic": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.allow_internet_ingress_traffic": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.allow_internet_ingress_traffic
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.viewers": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.viewers": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.viewers
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.allow_internet_ingress_traffic
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.allow_internet_ingress_traffic": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.viewers
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.gcp_project": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.viewers": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.allow_internet_ingress_traffic"
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.var.gcp_project
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.allow_internet_ingress_traffic": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.allow_internet_ingress_traffic": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.allow_internet_ingress_traffic
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.var.gcp_project
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.gcp_project": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.db_name": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.db_name": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.db_name
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.db_name
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.db_name": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.allow_internet_ingress_traffic
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.allow_internet_ingress_traffic": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.db_username
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.db_username
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.db_username": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.default_memory_limit"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.default_memory_limit": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.default_memory_limit": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.default_memory_limit
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.default_memory_limit
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.default_memory_limit": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.service_account_name"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.service_account_name": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.service_account_name": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.service_account_name
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.service_account_name
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.db_connection_name"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.service_account_name": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.db_connection_name": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.admins": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.db_connection_name": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.admins": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.db_connection_name
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.db_connection_name
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.db_connection_name": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.admins
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.admins
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.admins": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.use_network_policies": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.use_network_policies": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.use_network_policies
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.use_network_policies
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.use_network_policies": visit complete
2019/07/04 13:45:35 [TRACE] vertex "provider.template": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: provider.template
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalInitProvider
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.quota_memory": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.quota_memory": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.quota_memory
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.var.google_managed_service_provider_allocation"
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.quota_memory
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.google_managed_service_provider_allocation": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.quota_memory": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.google_managed_service_provider_allocation": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.var.google_managed_service_provider_allocation
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.var.google_managed_service_provider_allocation
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.google_managed_service_provider_allocation": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.cluster_services_namespace"
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.cluster_services_namespace": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.cluster_services_namespace": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.cluster_services_namespace
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.cluster_services_namespace
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.cluster_services_namespace": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_gke_version": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.pool_b_gke_version
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.db_connection_name"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.editors"
2019/07/04 13:45:35 [TRACE] vertex "provider.google": starting visit (*terraform.NodeApplyableProvider)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.quota_cpu": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.allow_cluster_ingress_traffic": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.pool_b_machine_type"
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.pool_a_max_node_count"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.var.enable_nat_b"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.gcp_project": evaluating
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.pool_a_disk_size_gb"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.nat_zone": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.pool_b_min_node_count"
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.db_password
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.var.external_nat_ip_a"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.var.cloud_router_bgp_asn"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.default_cpu_limit"
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.use_network_policies": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.name": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.default_memory_limit"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.location"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.quota_memory"
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.db_connection_name": evaluating
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.provisioner.local-exec"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.var.default_memory_limit"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.network_description": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.external_nat_ip_b": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.admins
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.viewers": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.editors": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.use_network_policies"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_disk_type": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_min_node_count": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.gcp_project"
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.editors"
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.viewers
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.name": evaluating
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.service_account_name"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.var.quota_cpu"
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.pool_b_gke_version
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_gke_version": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.db_connection_name": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.viewers
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.viewers": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.db_connection_name": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.db_connection_name
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.db_connection_name
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.db_connection_name": visit complete
2019/07/04 13:45:35 [TRACE] vertex "provider.google": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: provider.google
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalInitProvider
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.quota_cpu": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.quota_cpu
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.allow_cluster_ingress_traffic": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.allow_cluster_ingress_traffic
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_machine_type": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_machine_type": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.pool_b_machine_type
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.db_password
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.db_password": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_max_node_count": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_max_node_count": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.pool_a_max_node_count
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.quota_cpu
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.quota_cpu": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.gcp_project
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_disk_size_gb": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_disk_size_gb": evaluating
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.pool_a_disk_size_gb
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.allow_cluster_ingress_traffic
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.allow_cluster_ingress_traffic": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.pool_b_machine_type
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_machine_type": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_min_node_count": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_min_node_count": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.pool_b_min_node_count
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.pool_a_max_node_count
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_max_node_count": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.external_nat_ip_a": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.gcp_project
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.gcp_project": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.external_nat_ip_a": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.db_password
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.default_cpu_limit": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.default_cpu_limit": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.default_cpu_limit
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.db_password": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.pool_a_disk_size_gb
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_disk_size_gb": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.default_cpu_limit
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.default_cpu_limit": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.name
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.name": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.name": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.name
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.name
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.name": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.default_memory_limit": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.default_memory_limit": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.default_memory_limit
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.default_memory_limit
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.default_memory_limit": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.location": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.location": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.location
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.location
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.location": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.quota_memory": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.quota_memory": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.quota_memory
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.quota_memory
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.quota_memory": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.db_connection_name
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.db_connection_name
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.db_connection_name": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.provisioner.local-exec": starting visit (*terraform.NodeProvisioner)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.provisioner.local-exec": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.provisioner.local-exec
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalInitProvisioner
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.default_memory_limit": starting visit (*terraform.NodeApplyableModuleVariable)
2019-07-04T13:45:35.646+1000 [DEBUG] plugin: starting plugin: path=/home/cera/bin/terraform-0.12 args=[/home/cera/bin/terraform-0.12, internal-plugin, provisioner, local-exec]
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.default_memory_limit": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.default_memory_limit
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.default_memory_limit
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.default_memory_limit": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.network_description": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.var.network_description
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.external_nat_ip_b": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.viewers": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.editors": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.use_network_policies": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_disk_type": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_min_node_count": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.gcp_project": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.var.network_name
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.editors": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.name
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.service_account_name": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.quota_cpu": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.editors": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.enable_nat_b": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.nat_zone": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.var.external_nat_ip_a
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.cloud_router_bgp_asn": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.cloud_router_bgp_asn": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.var.cloud_router_bgp_asn
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019-07-04T13:45:35.646+1000 [DEBUG] plugin: plugin started: path=/home/cera/bin/terraform-0.12 pid=18897
2019-07-04T13:45:35.646+1000 [DEBUG] plugin: waiting for RPC address: path=/home/cera/bin/terraform-0.12
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.pool_b_min_node_count
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.use_network_policies
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.var.external_nat_ip_b
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.var.external_nat_ip_a
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.external_nat_ip_a": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.viewers
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.var.editors
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.var.cloud_router_bgp_asn
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.cloud_router_bgp_asn": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.var.network_description
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.network_description": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.use_network_policies": evaluating
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.use_network_policies
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.use_network_policies
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.use_network_policies": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.admins
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.admins": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.pool_a_min_node_count
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.gcp_project": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.viewers
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.gcp_project
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.network_name": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.var.editors
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.var.editors": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.default_cpu_limit
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.default_cpu_limit": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.pool_a_min_node_count
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_min_node_count": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.gcp_project
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.gcp_project": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.var.enable_nat_a
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.enable_nat_a": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.editors": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.editors
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.editors
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.editors": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.name
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.name": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.quota_cpu": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.quota_cpu
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.quota_cpu
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.editors": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.quota_cpu": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.var.editors
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.enable_nat_b": evaluating
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.var.enable_nat_b
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.var.nat_zone
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.var.editors
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.var.editors": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.var.nat_zone
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.nat_zone": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.output.nat_zone"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.output.nat_zone": starting visit (*terraform.NodeApplyableOutput)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.output.nat_zone": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.output.nat_zone
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.var.enable_nat_b
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.enable_nat_b": visit complete
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalWriteOutput
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Removing module.cera-test-vpc-1.output.nat_zone from state (it is now null)
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Saving Create change for module.cera-test-vpc-1.output.nat_zone in changeset
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.output.nat_zone
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.output.nat_zone": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.use_network_policies
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.use_network_policies": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.service_account_name": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.var.service_account_name
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.var.service_account_name
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.service_account_name": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.var.external_nat_ip_b
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.external_nat_ip_b": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_b_min_node_count": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.pool_a_disk_type
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.pool_a_disk_type
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.pool_a_disk_type": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.var.viewers": visit complete
2019-07-04T13:45:35.654+1000 [DEBUG] plugin.terraform-0.12: 2019/07/04 13:45:35 [INFO] Terraform version: 0.12.3
2019-07-04T13:45:35.654+1000 [DEBUG] plugin.terraform-0.12: 2019/07/04 13:45:35 [INFO] Go runtime version: go1.12.4
2019-07-04T13:45:35.654+1000 [DEBUG] plugin.terraform-0.12: 2019/07/04 13:45:35 [INFO] CLI args: []string{"/home/cera/bin/terraform-0.12", "internal-plugin", "provisioner", "local-exec"}
2019-07-04T13:45:35.654+1000 [DEBUG] plugin.terraform-0.12: 2019/07/04 13:45:35 [DEBUG] Attempting to open CLI config file: /home/cera/.terraformrc
2019-07-04T13:45:35.655+1000 [DEBUG] plugin.terraform-0.12: 2019/07/04 13:45:35 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2019-07-04T13:45:35.655+1000 [DEBUG] plugin.terraform-0.12: 2019/07/04 13:45:35 [INFO] CLI command args: []string{"internal-plugin", "provisioner", "local-exec"}
2019-07-04T13:45:35.655+1000 [DEBUG] plugin.terraform-0.12: local-exec-provisioner (internal) 2019/07/04 13:45:35 [INFO] Starting provisioner plugin local-exec
2019-07-04T13:45:35.655+1000 [DEBUG] plugin.terraform-0.12: plugin address: address=/tmp/plugin629385352 network=unix timestamp=2019-07-04T13:45:35.655+1000
2019-07-04T13:45:35.655+1000 [DEBUG] plugin: using plugin: version=5
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.provisioner.local-exec
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.provisioner.local-exec": visit complete
2019-07-04T13:45:35.671+1000 [DEBUG] plugin: starting plugin: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google-beta_v2.9.1_x4 args=[/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google-beta_v2.9.1_x4]
2019-07-04T13:45:35.672+1000 [DEBUG] plugin: plugin started: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google-beta_v2.9.1_x4 pid=18910
2019-07-04T13:45:35.672+1000 [DEBUG] plugin: waiting for RPC address: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google-beta_v2.9.1_x4
2019-07-04T13:45:35.681+1000 [INFO] plugin.terraform-provider-google-beta_v2.9.1_x4: configuring server automatic mTLS: timestamp=2019-07-04T13:45:35.681+1000
2019-07-04T13:45:35.709+1000 [DEBUG] plugin: using plugin: version=5
2019-07-04T13:45:35.709+1000 [DEBUG] plugin.terraform-provider-google-beta_v2.9.1_x4: plugin address: address=/tmp/plugin127840040 network=unix timestamp=2019-07-04T13:45:35.709+1000
2019/07/04 13:45:35 [TRACE] BuiltinEvalContext: Initialized "google-beta" provider for provider.google-beta
2019/07/04 13:45:35 [TRACE] <root>: eval: terraform.EvalNoop
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalValidateProvider
2019/07/04 13:45:35 [TRACE] buildProviderConfig for provider.google-beta: using explicit config only
2019/07/04 13:45:35 [TRACE] GRPCProvider: GetSchema
2019-07-04T13:45:35.710+1000 [INFO] plugin: configuring client automatic mTLS
2019-07-04T13:45:35.737+1000 [DEBUG] plugin: starting plugin: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-template_v2.1.2_x4 args=[/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-template_v2.1.2_x4]
2019-07-04T13:45:35.737+1000 [DEBUG] plugin: plugin started: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-template_v2.1.2_x4 pid=18924
2019-07-04T13:45:35.737+1000 [DEBUG] plugin: waiting for RPC address: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-template_v2.1.2_x4
2019-07-04T13:45:35.742+1000 [INFO] plugin.terraform-provider-template_v2.1.2_x4: configuring server automatic mTLS: timestamp=2019-07-04T13:45:35.742+1000
2019-07-04T13:45:35.769+1000 [DEBUG] plugin.terraform-provider-template_v2.1.2_x4: plugin address: address=/tmp/plugin149416169 network=unix timestamp=2019-07-04T13:45:35.769+1000
2019-07-04T13:45:35.769+1000 [DEBUG] plugin: using plugin: version=5
2019/07/04 13:45:35 [TRACE] BuiltinEvalContext: Initialized "template" provider for provider.template
2019/07/04 13:45:35 [TRACE] <root>: eval: terraform.EvalNoop
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalValidateProvider
2019/07/04 13:45:35 [TRACE] buildProviderConfig for provider.template: no configuration at all
2019/07/04 13:45:35 [TRACE] GRPCProvider: GetSchema
2019-07-04T13:45:35.769+1000 [INFO] plugin: configuring client automatic mTLS
2019/07/04 13:45:35 [TRACE] GRPCProvider: PrepareProviderConfig
2019-07-04T13:45:35.803+1000 [DEBUG] plugin: starting plugin: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google_v2.9.1_x4 args=[/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google_v2.9.1_x4]
2019-07-04T13:45:35.804+1000 [DEBUG] plugin: plugin started: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google_v2.9.1_x4 pid=18940
2019-07-04T13:45:35.804+1000 [DEBUG] plugin: waiting for RPC address: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google_v2.9.1_x4
2019/07/04 13:45:35 [TRACE] <root>: eval: terraform.EvalNoop
2019/07/04 13:45:35 [TRACE] <root>: eval: terraform.EvalNoop
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: provider.google-beta
2019/07/04 13:45:35 [TRACE] vertex "provider.google-beta": visit complete
2019-07-04T13:45:35.813+1000 [INFO] plugin.terraform-provider-google_v2.9.1_x4: configuring server automatic mTLS: timestamp=2019-07-04T13:45:35.813+1000
2019/07/04 13:45:35 [TRACE] GRPCProvider: PrepareProviderConfig
2019/07/04 13:45:35 [TRACE] <root>: eval: terraform.EvalNoop
2019/07/04 13:45:35 [TRACE] <root>: eval: terraform.EvalNoop
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: provider.template
2019/07/04 13:45:35 [TRACE] vertex "provider.template": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.data.template_file.nat-startup-script"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.data.template_file.nat-startup-script": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.data.template_file.nat-startup-script": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.data.template_file.nat-startup-script
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019-07-04T13:45:35.841+1000 [DEBUG] plugin: using plugin: version=5
2019-07-04T13:45:35.841+1000 [DEBUG] plugin.terraform-provider-google_v2.9.1_x4: plugin address: address=/tmp/plugin217654281 network=unix timestamp=2019-07-04T13:45:35.841+1000
2019/07/04 13:45:35 [TRACE] BuiltinEvalContext: Initialized "google" provider for provider.google
2019/07/04 13:45:35 [TRACE] <root>: eval: terraform.EvalNoop
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalValidateProvider
2019/07/04 13:45:35 [TRACE] buildProviderConfig for provider.google: using explicit config only
2019/07/04 13:45:35 [TRACE] GRPCProvider: GetSchema
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateDataSourceConfig
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.data.template_file.nat-startup-script
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.data.template_file.nat-startup-script": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "provider.template (close)"
2019/07/04 13:45:35 [TRACE] vertex "provider.template (close)": starting visit (*terraform.graphNodeCloseProvider)
2019/07/04 13:45:35 [TRACE] vertex "provider.template (close)": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: provider.template (close)
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalCloseProvider
2019/07/04 13:45:35 [TRACE] GRPCProvider: Close
2019-07-04T13:45:35.842+1000 [DEBUG] plugin: plugin process exited: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-template_v2.1.2_x4 pid=18924
2019-07-04T13:45:35.842+1000 [DEBUG] plugin: plugin exited
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: provider.template (close)
2019/07/04 13:45:35 [TRACE] vertex "provider.template (close)": visit complete
2019/07/04 13:45:35 [TRACE] GRPCProvider: PrepareProviderConfig
2019/07/04 13:45:35 [TRACE] <root>: eval: terraform.EvalNoop
2019/07/04 13:45:35 [TRACE] <root>: eval: terraform.EvalNoop
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: provider.google
2019/07/04 13:45:35 [TRACE] vertex "provider.google": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.google_compute_instance.nat-b"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_instance.nat-b": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_instance.nat-b": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.google_compute_instance.nat-b
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "data.google_client_config.default"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.google_compute_network.greensync-network"
2019/07/04 13:45:35 [TRACE] vertex "data.google_client_config.default": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_network.greensync-network": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "data.google_client_config.default": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: data.google_client_config.default
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_network.greensync-network": evaluating
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.google_compute_network.greensync-network
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.google_service_account.service_account": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.google_service_account.service_account": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.google_service_account.service_account
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.google_service_account.service_account": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.google_service_account.service_account": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.google_service_account.service_account
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateDataSourceConfig
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "data.google_project.project"
2019/07/04 13:45:35 [TRACE] vertex "data.google_project.project": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "data.google_project.project": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: data.google_project.project
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.google_compute_instance.nat-a"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_instance.nat-a": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_instance.nat-a": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.google_compute_instance.nat-a
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.google_service_account.service_account": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.google_service_account.service_account": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.google_service_account.service_account
2019/07/04 13:45:35 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.google_compute_network.greensync-network
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_network.greensync-network": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateDataSourceConfig
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "google_compute_address.nataddress-australia-southeast1-1"
2019/07/04 13:45:35 [TRACE] vertex "google_compute_address.nataddress-australia-southeast1-1": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "google_compute_address.nataddress-australia-southeast1-1": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: google_compute_address.nataddress-australia-southeast1-1
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.output.network_self_link"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.output.network_self_link": starting visit (*terraform.NodeApplyableOutput)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.output.network_self_link": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.output.network_self_link
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalWriteOutput
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.google_service_account.service_account
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.google_service_account.service_account": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.google_service_account_key.app_key"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.google_service_account_key.app_key": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.google_service_account_key.app_key": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.google_service_account_key.app_key
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Removing module.cera-test-vpc-1.output.network_self_link from state (it is now null)
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Saving Create change for module.cera-test-vpc-1.output.network_self_link in changeset
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.output.network_self_link
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: data.google_client_config.default
2019/07/04 13:45:35 [TRACE] vertex "data.google_client_config.default": visit complete
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.output.network_self_link": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.var.network"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.network": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.network": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.var.network
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-1.output.service_account_email"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.google_compute_firewall.firewall-ssh"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-ssh": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-ssh": evaluating
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.google_compute_firewall.firewall-ssh
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh": evaluating
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.google_compute_firewall.firewall-http"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-http": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.google_compute_firewall.firewall-rdp"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-rdp": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.output.service_account_email": starting visit (*terraform.NodeApplyableOutput)
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-rdp": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.output.service_account_email": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.google_compute_firewall.firewall-rdp
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.output.service_account_email
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.google_service_account.service_account"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-http": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.google_compute_firewall.firewall-http
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.google_service_account.service_account": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.google_service_account.service_account": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.google_service_account.service_account
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.var.network
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.var.network": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.google_container_cluster.cluster"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.google_container_cluster.cluster": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.google_container_cluster.cluster": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.google_container_cluster.cluster
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal": visit complete
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.google_service_account.service_account
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.google_service_account.service_account": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.google_service_account_key.app_key"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.google_service_account_key.app_key": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.google_service_account_key.app_key": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.google_service_account_key.app_key
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.google_service_account_key.app_key
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.google_service_account_key.app_key": visit complete
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvisioner
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateProvisioner
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp": visit complete
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvisioner
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateProvisioner
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: data.google_project.project
2019/07/04 13:45:35 [TRACE] vertex "data.google_project.project": visit complete
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.ns-policy-test-2.output.service_account_email"
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.output.service_account_email": starting visit (*terraform.NodeApplyableOutput)
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.output.service_account_email": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.output.service_account_email
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalWriteOutput
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.google_service_account.service_account
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.google_service_account.service_account": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.google_service_account_key.app_key"
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.google_service_account_key.app_key": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.google_service_account_key.app_key": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.google_service_account_key.app_key
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: google_compute_address.nataddress-australia-southeast1-1
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Removing module.ns-policy-test-1.output.service_account_email from state (it is now null)
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Saving Create change for module.ns-policy-test-1.output.service_account_email in changeset
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.output.service_account_email
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-1.output.service_account_email": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cluster-services.output.service_account_email"
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.output.service_account_email": starting visit (*terraform.NodeApplyableOutput)
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.output.service_account_email": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.output.service_account_email
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.google_compute_firewall.firewall-ssh
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-ssh": visit complete
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalWriteOutput
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Removing module.ns-policy-test-2.output.service_account_email from state (it is now null)
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Saving Create change for module.ns-policy-test-2.output.service_account_email in changeset
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.output.service_account_email
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.output.service_account_email": visit complete
2019/07/04 13:45:35 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] vertex "google_compute_address.nataddress-australia-southeast1-1": visit complete
2019/07/04 13:45:35 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.var.cloud_nat_gateways"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.cloud_nat_gateways": starting visit (*terraform.NodeApplyableModuleVariable)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.cloud_nat_gateways": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.var.cloud_nat_gateways
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection": visit complete
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.google_compute_instance.nat-b
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.google_compute_instance.nat-a
2019/07/04 13:45:35 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cluster-services: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] module.cluster-services: eval: *terraform.EvalWriteOutput
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.var.cloud_nat_gateways
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.var.cloud_nat_gateways": visit complete
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Removing module.cluster-services.output.service_account_email from state (it is now null)
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Saving Create change for module.cluster-services.output.service_account_email in changeset
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.google_compute_router.cloud-router"
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.output.service_account_email
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.google_service_account_key.app_key
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.output.service_account_email": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cluster-services.google_service_account_key.app_key": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.google_service_account.service_account
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.google_service_account.service_account": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.output.cluster_service_account_email"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.output.cluster_service_account_email": starting visit (*terraform.NodeApplyableOutput)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.output.cluster_service_account_email": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.output.cluster_service_account_email
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalWriteOutput
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_instance.nat-b": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.google_service_account_key.app_key
2019/07/04 13:45:35 [TRACE] vertex "module.ns-policy-test-2.google_service_account_key.app_key": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_router.cloud-router": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.output.nat_instance_link_b"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_router.cloud-router": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.output.nat_instance_link_b": starting visit (*terraform.NodeApplyableOutput)
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.google_compute_router.cloud-router
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Removing module.cera-test-cluster-1.output.cluster_service_account_email from state (it is now null)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.output.nat_instance_link_b": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.output.nat_instance_link_b
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Saving Create change for module.cera-test-cluster-1.output.cluster_service_account_email in changeset
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.google_compute_firewall.firewall-http
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.output.cluster_service_account_email
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.google_compute_route.nat-route-b"
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_route.nat-route-b": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_route.nat-route-b": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.google_compute_route.nat-route-b
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_instance.nat-a": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "provisioner.local-exec (close)"
2019/07/04 13:45:35 [TRACE] vertex "provisioner.local-exec (close)": starting visit (*terraform.graphNodeCloseProvisioner)
2019/07/04 13:45:35 [TRACE] vertex "provisioner.local-exec (close)": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: provisioner.local-exec (close)
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalCloseProvisioner
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: provisioner.local-exec (close)
2019/07/04 13:45:35 [TRACE] vertex "provisioner.local-exec (close)": visit complete
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalWriteOutput
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.google_compute_route.nat-route-a"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.output.nat_instance_link_a"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_route.nat-route-a": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.output.nat_instance_link_a": starting visit (*terraform.NodeApplyableOutput)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.output.nat_instance_link_a": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_route.nat-route-a": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.output.nat_instance_link_a
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.google_compute_route.nat-route-a
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalWriteOutput
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Removing module.cera-test-vpc-1.output.nat_instance_link_b from state (it is now null)
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Saving Create change for module.cera-test-vpc-1.output.nat_instance_link_b in changeset
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.output.nat_instance_link_b
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.output.nat_instance_link_b": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.google_compute_firewall.firewall-rdp
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-rdp": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_firewall.firewall-http": visit complete
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.output.cluster_service_account_email": visit complete
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Removing module.cera-test-vpc-1.output.nat_instance_link_a from state (it is now null)
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Saving Create change for module.cera-test-vpc-1.output.nat_instance_link_a in changeset
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.output.nat_instance_link_a
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.output.nat_instance_link_a": visit complete
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.google_compute_route.nat-route-b
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_route.nat-route-b": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.google_compute_route.nat-route-a
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_route.nat-route-a": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.google_compute_router.cloud-router
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_router.cloud-router": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cera-test-vpc-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "provider.google (close)"
2019/07/04 13:45:35 [TRACE] vertex "provider.google (close)": starting visit (*terraform.graphNodeCloseProvider)
2019/07/04 13:45:35 [TRACE] vertex "provider.google (close)": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: provider.google (close)
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalCloseProvider
2019/07/04 13:45:35 [TRACE] GRPCProvider: Close
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.google_container_cluster.cluster
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.google_container_cluster.cluster": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.output.endpoint"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.output.endpoint": starting visit (*terraform.NodeApplyableOutput)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.google_container_node_pool.pool-b"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.output.endpoint": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.google_container_node_pool.pool-b": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.output.cluster_ca_certificate"
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "module.cera-test-cluster-1.google_container_node_pool.pool-a"
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.output.cluster_ca_certificate": starting visit (*terraform.NodeApplyableOutput)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.google_container_node_pool.pool-b": evaluating
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.google_container_node_pool.pool-a": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.output.cluster_ca_certificate": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.google_container_node_pool.pool-b
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.output.cluster_ca_certificate
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalWriteOutput
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.google_container_node_pool.pool-a": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.google_container_node_pool.pool-a
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: module.cera-test-cluster-1.output.endpoint
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalOpFilter
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalWriteOutput
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Removing module.cera-test-cluster-1.output.cluster_ca_certificate from state (it is now null)
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Saving Create change for module.cera-test-cluster-1.output.cluster_ca_certificate in changeset
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.output.cluster_ca_certificate
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.output.cluster_ca_certificate": visit complete
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Removing module.cera-test-cluster-1.output.endpoint from state (it is now null)
2019/07/04 13:45:35 [TRACE] EvalWriteOutput: Saving Create change for module.cera-test-cluster-1.output.endpoint in changeset
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.output.endpoint
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.output.endpoint": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "provider.kubernetes.cera-test-cluster-1"
2019/07/04 13:45:35 [TRACE] vertex "provider.kubernetes.cera-test-cluster-1": starting visit (*terraform.NodeApplyableProvider)
2019/07/04 13:45:35 [TRACE] vertex "provider.kubernetes.cera-test-cluster-1": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalInitProvider
2019-07-04T13:45:35.945+1000 [DEBUG] plugin: plugin process exited: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google_v2.9.1_x4 pid=18940
2019-07-04T13:45:35.945+1000 [DEBUG] plugin: plugin exited
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: provider.google (close)
2019/07/04 13:45:35 [TRACE] vertex "provider.google (close)": visit complete
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:35 [TRACE] module.cera-test-cluster-1: eval: *terraform.EvalValidateResource
2019-07-04T13:45:35.946+1000 [INFO] plugin: configuring client automatic mTLS
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.google_container_node_pool.pool-b
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.google_container_node_pool.pool-b": visit complete
2019/07/04 13:45:35 [TRACE] [walkValidate] Exiting eval tree: module.cera-test-cluster-1.google_container_node_pool.pool-a
2019/07/04 13:45:35 [TRACE] vertex "module.cera-test-cluster-1.google_container_node_pool.pool-a": visit complete
2019/07/04 13:45:35 [TRACE] dag/walk: visiting "provider.google-beta (close)"
2019/07/04 13:45:35 [TRACE] vertex "provider.google-beta (close)": starting visit (*terraform.graphNodeCloseProvider)
2019/07/04 13:45:35 [TRACE] vertex "provider.google-beta (close)": evaluating
2019/07/04 13:45:35 [TRACE] [walkValidate] Entering eval tree: provider.google-beta (close)
2019/07/04 13:45:35 [TRACE] <root>: eval: *terraform.EvalCloseProvider
2019-07-04T13:45:35.972+1000 [DEBUG] plugin: starting plugin: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-kubernetes_v1.8.0_x4 args=[/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-kubernetes_v1.8.0_x4]
2019-07-04T13:45:35.973+1000 [DEBUG] plugin: plugin started: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-kubernetes_v1.8.0_x4 pid=18983
2019-07-04T13:45:35.973+1000 [DEBUG] plugin: waiting for RPC address: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-kubernetes_v1.8.0_x4
2019-07-04T13:45:35.985+1000 [INFO] plugin.terraform-provider-kubernetes_v1.8.0_x4: configuring server automatic mTLS: timestamp=2019-07-04T13:45:35.985+1000
2019-07-04T13:45:36.012+1000 [DEBUG] plugin: using plugin: version=5
2019-07-04T13:45:36.012+1000 [DEBUG] plugin.terraform-provider-kubernetes_v1.8.0_x4: plugin address: address=/tmp/plugin183714615 network=unix timestamp=2019-07-04T13:45:36.011+1000
2019/07/04 13:45:36 [TRACE] BuiltinEvalContext: Initialized "kubernetes" provider for provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:36 [TRACE] <root>: eval: terraform.EvalNoop
2019/07/04 13:45:36 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/07/04 13:45:36 [TRACE] <root>: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] <root>: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] <root>: eval: *terraform.EvalValidateProvider
2019/07/04 13:45:36 [TRACE] buildProviderConfig for provider.kubernetes.cera-test-cluster-1: using explicit config only
2019/07/04 13:45:36 [TRACE] GRPCProvider: GetSchema
2019/07/04 13:45:36 [TRACE] GRPCProvider: Close
2019-07-04T13:45:36.013+1000 [DEBUG] plugin: plugin process exited: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-google-beta_v2.9.1_x4 pid=18910
2019-07-04T13:45:36.013+1000 [DEBUG] plugin: plugin exited
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: provider.google-beta (close)
2019/07/04 13:45:36 [TRACE] vertex "provider.google-beta (close)": visit complete
2019/07/04 13:45:36 [TRACE] GRPCProvider: PrepareProviderConfig
2019/07/04 13:45:36 [TRACE] <root>: eval: terraform.EvalNoop
2019/07/04 13:45:36 [TRACE] <root>: eval: terraform.EvalNoop
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: provider.kubernetes.cera-test-cluster-1
2019/07/04 13:45:36 [TRACE] vertex "provider.kubernetes.cera-test-cluster-1": visit complete
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.cluster-services.kubernetes_namespace.app-namespace"
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_namespace.app-namespace": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_namespace.app-namespace": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.kubernetes_namespace.app-namespace
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-1.kubernetes_namespace.app-namespace"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_namespace.app-namespace": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_namespace.app-namespace": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.kubernetes_namespace.app-namespace
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-2.kubernetes_namespace.app-namespace"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_namespace.app-namespace": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_namespace.app-namespace": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.kubernetes_namespace.app-namespace
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.kubernetes_namespace.app-namespace
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_namespace.app-namespace": visit complete
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.kubernetes_namespace.app-namespace
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.kubernetes_namespace.app-namespace
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_namespace.app-namespace": visit complete
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_namespace.app-namespace": visit complete
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-1.kubernetes_role_binding.editor"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_role_binding.editor": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-2.kubernetes_role_binding.editor"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_role_binding.editor": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.cluster-services.kubernetes_secret.service-account-credentials"
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_secret.service-account-credentials": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_role_binding.editor": evaluating
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-2.kubernetes_resource_quota.limit-quota"
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.kubernetes_role_binding.editor
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_resource_quota.limit-quota": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-1.kubernetes_secret.service-account-credentials"
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-2.kubernetes_secret.database-credentials"
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.cluster-services.kubernetes_limit_range.limit-defaults"
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_limit_range.limit-defaults": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services"
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-2.kubernetes_limit_range.limit-defaults"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_limit_range.limit-defaults": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-1.kubernetes_role_binding.viewer"
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-2.kubernetes_secret.google-application-credentials"
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_limit_range.limit-defaults": evaluating
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_role_binding.viewer": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.cluster-services.kubernetes_role_binding.editor"
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.kubernetes_limit_range.limit-defaults
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_resource_quota.limit-quota": evaluating
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.kubernetes_resource_quota.limit-quota
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-1.kubernetes_secret.google-application-credentials"
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_secret.service-account-credentials": evaluating
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-1.kubernetes_resource_quota.limit-quota"
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_resource_quota.limit-quota": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_resource_quota.limit-quota": evaluating
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_secret.google-application-credentials": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services": evaluating
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.cluster-services.kubernetes_secret.google-application-credentials"
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace"
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services": evaluating
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.cluster-services.kubernetes_resource_quota.limit-quota"
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-2.kubernetes_secret.service-account-credentials"
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_resource_quota.limit-quota": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.cluster-services.kubernetes_secret.database-credentials"
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic"
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-1.kubernetes_role_binding.admin"
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_secret.database-credentials": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-2.kubernetes_role_binding.viewer"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_role_binding.viewer": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.cluster-services.kubernetes_network_policy.default-deny"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_role_binding.viewer": evaluating
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-1.kubernetes_limit_range.limit-defaults"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_limit_range.limit-defaults": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_limit_range.limit-defaults": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.kubernetes_limit_range.limit-defaults
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.cluster-services.kubernetes_network_policy.allow-internet-traffic"
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_network_policy.allow-internet-traffic": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_network_policy.allow-internet-traffic": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.kubernetes_network_policy.allow-internet-traffic
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_secret.service-account-credentials": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_secret.service-account-credentials": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.kubernetes_secret.service-account-credentials
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_network_policy.default-deny": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_network_policy.default-deny": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.kubernetes_network_policy.default-deny
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_role_binding.admin": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_role_binding.admin": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.kubernetes_role_binding.admin
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_secret.google-application-credentials": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.kubernetes_secret.google-application-credentials
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.cluster-services.kubernetes_network_policy.allow-cluster-traffic"
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_network_policy.allow-cluster-traffic": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_network_policy.allow-cluster-traffic": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.kubernetes_network_policy.allow-cluster-traffic
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_resource_quota.limit-quota": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.kubernetes_resource_quota.limit-quota
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-2.kubernetes_role_binding.admin"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_role_binding.admin": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_role_binding.admin": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.kubernetes_role_binding.admin
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.cluster-services.kubernetes_role_binding.viewer"
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_role_binding.viewer": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_role_binding.viewer": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.kubernetes_role_binding.viewer
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_secret.service-account-credentials": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_secret.service-account-credentials": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.kubernetes_secret.service-account-credentials
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_secret.database-credentials": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_secret.database-credentials": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.kubernetes_secret.database-credentials
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-2.kubernetes_network_policy.default-deny"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_network_policy.default-deny": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_network_policy.default-deny": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.kubernetes_role_binding.viewer
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_limit_range.limit-defaults": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.kubernetes_limit_range.limit-defaults
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.kubernetes_role_binding.editor
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_role_binding.editor": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.kubernetes_limit_range.limit-defaults
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_limit_range.limit-defaults": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_role_binding.viewer": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.kubernetes_role_binding.viewer
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace"
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-1.kubernetes_secret.database-credentials"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_secret.database-credentials": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_secret.database-credentials": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.kubernetes_secret.database-credentials
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_secret.google-application-credentials": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_secret.google-application-credentials": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.kubernetes_secret.google-application-credentials
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.kubernetes_secret.service-account-credentials
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.kubernetes_resource_quota.limit-quota
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.cluster-services.kubernetes_role_binding.admin"
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_role_binding.admin": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_role_binding.admin": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.kubernetes_role_binding.admin
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic": evaluating
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_secret.google-application-credentials": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_secret.google-application-credentials": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.kubernetes_secret.google-application-credentials
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_role_binding.editor": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.kubernetes_role_binding.editor
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_secret.database-credentials": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.kubernetes_secret.database-credentials
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-2.kubernetes_network_policy.default-deny
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "module.ns-policy-test-1.kubernetes_network_policy.default-deny"
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_network_policy.default-deny": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_network_policy.default-deny": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.ns-policy-test-1.kubernetes_network_policy.default-deny
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_role_binding.editor": starting visit (*terraform.NodeValidatableResource)
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_role_binding.editor": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: module.cluster-services.kubernetes_role_binding.editor
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.kubernetes_role_binding.admin
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_role_binding.admin": visit complete
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.kubernetes_resource_quota.limit-quota
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_resource_quota.limit-quota": visit complete
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.kubernetes_secret.service-account-credentials
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_secret.service-account-credentials": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.kubernetes_secret.google-application-credentials
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_secret.google-application-credentials": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.kubernetes_limit_range.limit-defaults
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_limit_range.limit-defaults": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.kubernetes_network_policy.default-deny
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_network_policy.default-deny": visit complete
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.kubernetes_resource_quota.limit-quota
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_resource_quota.limit-quota": visit complete
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.kubernetes_secret.service-account-credentials
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_secret.service-account-credentials": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.kubernetes_role_binding.admin
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_role_binding.admin": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.kubernetes_role_binding.viewer
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_role_binding.viewer": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.kubernetes_network_policy.allow-internet-traffic
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_network_policy.allow-internet-traffic": visit complete
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.kubernetes_role_binding.viewer
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_role_binding.viewer": visit complete
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services": visit complete
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.kubernetes_secret.database-credentials
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_secret.database-credentials": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace": visit complete
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.kubernetes_limit_range.limit-defaults
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_limit_range.limit-defaults": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services": visit complete
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.kubernetes_secret.google-application-credentials
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_secret.google-application-credentials": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.kubernetes_role_binding.viewer
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_role_binding.viewer": visit complete
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.kubernetes_resource_quota.limit-quota
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_resource_quota.limit-quota": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services": visit complete
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.kubernetes_secret.database-credentials
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_secret.database-credentials": visit complete
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.kubernetes_network_policy.allow-cluster-traffic
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_network_policy.allow-cluster-traffic": visit complete
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.kubernetes_secret.service-account-credentials
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_secret.service-account-credentials": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-2: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.kubernetes_role_binding.admin
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_role_binding.admin": visit complete
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.cluster-services: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.kubernetes_secret.google-application-credentials
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_secret.google-application-credentials": visit complete
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalSequence
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalGetProvider
2019/07/04 13:45:36 [TRACE] module.ns-policy-test-1: eval: *terraform.EvalValidateResource
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.kubernetes_role_binding.editor
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_role_binding.editor": visit complete
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.kubernetes_role_binding.editor
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_role_binding.editor": visit complete
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic": visit complete
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.kubernetes_secret.database-credentials
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_secret.database-credentials": visit complete
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace
2019/07/04 13:45:36 [TRACE] vertex "module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace": visit complete
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.kubernetes_network_policy.default-deny
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_network_policy.default-deny": visit complete
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic": visit complete
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-1.kubernetes_network_policy.default-deny
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-1.kubernetes_network_policy.default-deny": visit complete
2019/07/04 13:45:36 [TRACE] vertex "module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic": visit complete
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)"
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "provider.kubernetes.cera-test-cluster-1 (close)"
2019/07/04 13:45:36 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary)
2019/07/04 13:45:36 [TRACE] vertex "provider.kubernetes.cera-test-cluster-1 (close)": starting visit (*terraform.graphNodeCloseProvider)
2019/07/04 13:45:36 [TRACE] vertex "meta.count-boundary (EachMode fixup)": evaluating
2019/07/04 13:45:36 [TRACE] vertex "provider.kubernetes.cera-test-cluster-1 (close)": evaluating
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: meta.count-boundary (EachMode fixup)
2019/07/04 13:45:36 [TRACE] [walkValidate] Entering eval tree: provider.kubernetes.cera-test-cluster-1 (close)
2019/07/04 13:45:36 [TRACE] <root>: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2019/07/04 13:45:36 [TRACE] <root>: eval: *terraform.EvalCloseProvider
2019/07/04 13:45:36 [TRACE] GRPCProvider: Close
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: meta.count-boundary (EachMode fixup)
2019/07/04 13:45:36 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete
2019-07-04T13:45:36.122+1000 [DEBUG] plugin: plugin process exited: path=/home/cera/src/gs/infra/terraform-modules/cera-cluster-test/.terraform/plugins/linux_amd64/terraform-provider-kubernetes_v1.8.0_x4 pid=18983
2019-07-04T13:45:36.122+1000 [DEBUG] plugin: plugin exited
2019/07/04 13:45:36 [TRACE] [walkValidate] Exiting eval tree: provider.kubernetes.cera-test-cluster-1 (close)
2019/07/04 13:45:36 [TRACE] vertex "provider.kubernetes.cera-test-cluster-1 (close)": visit complete
2019/07/04 13:45:36 [TRACE] dag/walk: visiting "root"
2019/07/04 13:45:36 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot)
2019/07/04 13:45:36 [TRACE] vertex "root": visit complete
2019/07/04 13:45:36 [INFO] backend/local: apply calling Refresh
2019/07/04 13:45:36 [INFO] terraform: building graph: GraphTypeRefresh
2019/07/04 13:45:36 [TRACE] Executing graph transform *terraform.ConfigTransformer
2019/07/04 13:45:36 [TRACE] ConfigTransformer: Starting for path:
2019/07/04 13:45:36 [TRACE] ConfigTransformer: Starting for path: cluster-services
2019/07/04 13:45:36 [TRACE] ConfigTransformer: Starting for path: ns-policy-test-1
2019/07/04 13:45:36 [TRACE] ConfigTransformer: Starting for path: ns-policy-test-2
2019/07/04 13:45:36 [TRACE] ConfigTransformer: Starting for path: cera-test-cluster-1
2019/07/04 13:45:36 [TRACE] ConfigTransformer: Starting for path: cera-test-vpc-1
2019/07/04 13:45:36 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeRefreshableManagedResource
module.cluster-services.google_service_account.service_account - *terraform.NodeRefreshableManagedResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeRefreshableManagedResource
------
2019/07/04 13:45:36 [TRACE] Executing graph transform *terraform.ConfigTransformer
2019/07/04 13:45:36 [TRACE] ConfigTransformer: Starting for path:
2019/07/04 13:45:36 [TRACE] ConfigTransformer: Starting for path: ns-policy-test-2
2019/07/04 13:45:36 [TRACE] ConfigTransformer: Starting for path: cera-test-cluster-1
2019/07/04 13:45:36 [TRACE] ConfigTransformer: Starting for path: cera-test-vpc-1
2019/07/04 13:45:36 [TRACE] ConfigTransformer: Starting for path: cluster-services
2019/07/04 13:45:36 [TRACE] ConfigTransformer: Starting for path: ns-policy-test-1
2019/07/04 13:45:36 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
data.google_client_config.default - *terraform.NodeRefreshableDataResource
data.google_project.project - *terraform.NodeRefreshableDataResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeRefreshableDataResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeRefreshableManagedResource
module.cluster-services.google_service_account.service_account - *terraform.NodeRefreshableManagedResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeRefreshableManagedResource
------
2019/07/04 13:45:36 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer
2019/07/04 13:45:36 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes)
2019/07/04 13:45:36 [TRACE] Executing graph transform *terraform.StateTransformer
2019/07/04 13:45:36 [TRACE] StateTransformer: creating nodes for deposed instance objects only
2019/07/04 13:45:36 [TRACE] Completed graph transform *terraform.StateTransformer (no changes)
2019/07/04 13:45:36 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2019/07/04 13:45:36 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2019/07/04 13:45:36 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_namespace.app-namespace" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:18,1-48
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "data.google_client_config.default" (*terraform.NodeRefreshableDataResource) config from hcl.Range{Filename:"main.tf", Start:hcl.Pos{Line:73, Column:1, Byte:2000}, End:hcl.Pos{Line:73, Column:38, Byte:2037}}
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_secret.database-credentials" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:58,1-52
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_secret.google-application-credentials" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:33,1-62
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:241,1-62
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection" (*terraform.NodeRefreshableManagedResource) config from ../terraform-vpc/main.tf:122,1-79
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_route.nat-route-b" (*terraform.NodeRefreshableManagedResource) config from ../terraform-vpc/main.tf:258,1-46
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_instance.nat-a" (*terraform.NodeRefreshableManagedResource) config from ../terraform-vpc/main.tf:177,1-43
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_secret.database-credentials" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:58,1-52
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:191,1-68
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_secret.service-account-credentials" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:46,1-59
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_role_binding.admin" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:74,1-43
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_limit_range.limit-defaults" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:137,1-51
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-cluster-1.google_container_node_pool.pool-b" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-cluster/main.tf:148,1-47
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:217,1-70
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:263,1-61
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.google_service_account.service_account" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:4,1-52
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway" (*terraform.NodeRefreshableManagedResource) config from ../terraform-vpc/main.tf:143,1-57
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.data.template_file.nat-startup-script" (*terraform.NodeRefreshableDataResource) config from hcl.Range{Filename:"../terraform-vpc/main.tf", Start:hcl.Pos{Line:166, Column:1, Byte:5464}, End:hcl.Pos{Line:166, Column:42, Byte:5505}}
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_secret.service-account-credentials" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:46,1-59
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-cluster-1.google_service_account.service_account" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-cluster/main.tf:4,1-52
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_firewall.firewall-http" (*terraform.NodeRefreshableManagedResource) config from ../terraform-vpc/main.tf:61,1-51
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_firewall.firewall-rdp" (*terraform.NodeRefreshableManagedResource) config from ../terraform-vpc/main.tf:87,1-50
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.google_service_account.service_account" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:4,1-52
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.google_service_account.service_account" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:4,1-52
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-cluster-1.google_container_node_pool.pool-a" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-cluster/main.tf:110,1-47
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_network.greensync-network" (*terraform.NodeRefreshableManagedResource) config from ../terraform-vpc/main.tf:1,1-54
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_network_policy.allow-cluster-traffic" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:263,1-61
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_role_binding.viewer" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:116,1-44
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:263,1-61
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:217,1-70
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "data.google_project.project" (*terraform.NodeRefreshableDataResource) config from hcl.Range{Filename:"main.tf", Start:hcl.Pos{Line:23, Column:1, Byte:651}, End:hcl.Pos{Line:23, Column:32, Byte:682}}
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:217,1-70
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_namespace.app-namespace" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:18,1-48
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.google_service_account_key.app_key" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:10,1-48
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_firewall.firewall-ssh" (*terraform.NodeRefreshableManagedResource) config from ../terraform-vpc/main.tf:74,1-50
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.google_service_account_key.app_key" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:10,1-48
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_namespace.app-namespace" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:18,1-48
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_secret.google-application-credentials" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:33,1-62
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-cluster-1.google_container_cluster.cluster" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-cluster/main.tf:10,1-46
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "google_compute_address.nataddress-australia-southeast1-1" (*terraform.NodeRefreshableManagedResource) config from main.tf:25,1-70
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_secret.google-application-credentials" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:33,1-62
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_role_binding.admin" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:74,1-43
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_network_policy.default-deny" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:175,1-52
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_secret.database-credentials" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:58,1-52
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:191,1-68
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_role_binding.editor" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:95,1-44
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh" (*terraform.NodeRefreshableManagedResource) config from ../terraform-vpc/main.tf:47,1-64
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_instance.nat-b" (*terraform.NodeRefreshableManagedResource) config from ../terraform-vpc/main.tf:212,1-43
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_resource_quota.limit-quota" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:160,1-51
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_network_policy.default-deny" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:175,1-52
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.google_service_account_key.app_key" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:10,1-48
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_resource_quota.limit-quota" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:160,1-51
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_route.nat-route-a" (*terraform.NodeRefreshableManagedResource) config from ../terraform-vpc/main.tf:247,1-46
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_network_policy.allow-internet-traffic" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:241,1-62
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_limit_range.limit-defaults" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:137,1-51
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_role_binding.editor" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:95,1-44
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp" (*terraform.NodeRefreshableManagedResource) config from ../terraform-vpc/main.tf:11,1-65
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_router.cloud-router" (*terraform.NodeRefreshableManagedResource) config from ../terraform-vpc/main.tf:132,1-48
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_role_binding.admin" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:74,1-43
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_role_binding.viewer" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:116,1-44
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_role_binding.viewer" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:116,1-44
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_network_policy.default-deny" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:175,1-52
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_resource_quota.limit-quota" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:160,1-51
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_role_binding.editor" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:95,1-44
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_secret.service-account-credentials" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:46,1-59
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:191,1-68
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal" (*terraform.NodeRefreshableManagedResource) config from ../terraform-vpc/main.tf:24,1-69
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation" (*terraform.NodeRefreshableManagedResource) config from ../terraform-vpc/main.tf:110,1-71
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.cluster-services.kubernetes_limit_range.limit-defaults" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:137,1-51
2019/07/04 13:45:36 [TRACE] AttachResourceConfigTransformer: attaching to "module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic" (*terraform.NodeRefreshableManagedResource) config from ../terraform-gke-namespace/main.tf:241,1-62
2019/07/04 13:45:36 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2019/07/04 13:45:36 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2019/07/04 13:45:36 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes)
2019/07/04 13:45:36 [TRACE] Executing graph transform *terraform.LocalTransformer
2019/07/04 13:45:36 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes)
2019/07/04 13:45:36 [TRACE] Executing graph transform *terraform.OutputTransformer
2019/07/04 13:45:36 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph:
data.google_client_config.default - *terraform.NodeRefreshableDataResource
data.google_project.project - *terraform.NodeRefreshableDataResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeRefreshableDataResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_service_networking_connection.servicenetworking-connection - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.output.nat_instance_link_a - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_instance_link_b - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.nat_zone - *terraform.NodeApplyableOutput
module.cera-test-vpc-1.output.network_self_link - *terraform.NodeApplyableOutput
module.cluster-services.google_service_account.service_account - *terraform.NodeRefreshableManagedResource
module.cluster-services.google_service_account_key.app_key - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_limit_range.limit-defaults - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_namespace.app-namespace - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_network_policy.default-deny - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_resource_quota.limit-quota - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_role_binding.admin - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_role_binding.editor - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_role_binding.viewer - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_secret.database-credentials - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_secret.google-application-credentials - *terraform.NodeRefreshableManagedResource
module.cluster-services.kubernetes_secret.service-account-credentials - *terraform.NodeRefreshableManagedResource
module.cluster-services.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-1.google_service_account.service_account - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.google_service_account_key.app_key - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_limit_range.limit-defaults - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_namespace.app-namespace - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_network_policy.default-deny - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_resource_quota.limit-quota - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_role_binding.admin - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_role_binding.editor - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_role_binding.viewer - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_secret.database-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_secret.google-application-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.kubernetes_secret.service-account-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-1.output.service_account_email - *terraform.NodeApplyableOutput
module.ns-policy-test-2.google_service_account.service_account - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.google_service_account_key.app_key - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_limit_range.limit-defaults - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_namespace.app-namespace - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_network_policy.allow-cluster-traffic - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-cluster-services - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_network_policy.allow-ingress-same-namespace - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_network_policy.allow-internet-traffic - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_network_policy.default-deny - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_resource_quota.limit-quota - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_role_binding.admin - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_role_binding.editor - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_role_binding.viewer - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_secret.database-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_secret.google-application-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.kubernetes_secret.service-account-credentials - *terraform.NodeRefreshableManagedResource
module.ns-policy-test-2.output.service_account_email - *terraform.NodeApplyableOutput
------
2019/07/04 13:45:36 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2019/07/04 13:45:36 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer with new graph:
data.google_client_config.default - *terraform.NodeRefreshableDataResource
data.google_project.project - *terraform.NodeRefreshableDataResource
google_compute_address.nataddress-australia-southeast1-1 - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_container_cluster.cluster - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_container_node_pool.pool-a - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_container_node_pool.pool-b - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.google_service_account.service_account - *terraform.NodeRefreshableManagedResource
module.cera-test-cluster-1.output.cluster_ca_certificate - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.cluster_service_account_email - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.output.endpoint - *terraform.NodeApplyableOutput
module.cera-test-cluster-1.var.gke_master_ipv4_cidr - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.gke_min_master_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.location - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.name - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.network - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_a_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_size_gb - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_disk_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_gke_version - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_machine_type - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_max_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_min_node_count - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.pool_b_preemptible - *terraform.NodeApplyableModuleVariable
module.cera-test-cluster-1.var.security_group - *terraform.NodeApplyableModuleVariable
module.cera-test-vpc-1.data.template_file.nat-startup-script - *terraform.NodeRefreshableDataResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-icmp - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-internal - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-default-allow-ssh - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-http - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-rdp - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_firewall.firewall-ssh - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_global_address.service-provider-allocation - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_instance.nat-a - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_instance.nat-b - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_network.greensync-network - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_route.nat-route-a - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_route.nat-route-b - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_router.cloud-router - *terraform.NodeRefreshableManagedResource
module.cera-test-vpc-1.google_compute_router_nat.cloud-nat-gateway - *terraform.NodeRefreshableManagedR
View raw

(Sorry about that, but we can’t show files that are this big right now.)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment