Created
April 2, 2019 03:50
-
-
Save sbutler/f9480ef8e86428b054181b94d6221a75 to your computer and use it in GitHub Desktop.
terraform aws_backup_plan cold_storage_after optional (debug)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2019/04/01 22:41:49 [INFO] Terraform version: 0.11.13 | |
2019/04/01 22:41:49 [INFO] Go runtime version: go1.11.5 | |
2019/04/01 22:41:49 [INFO] CLI args: []string{"/usr/local/bin/terraform", "apply"} | |
2019/04/01 22:41:49 [DEBUG] Attempting to open CLI config file: /Users/sbutler/.terraformrc | |
2019/04/01 22:41:49 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2019/04/01 22:41:49 [INFO] CLI command args: []string{"apply"} | |
2019/04/01 22:41:49 [INFO] command: empty backend config, returning nil | |
2019/04/01 22:41:49 [DEBUG] command: no data state file found for backend config | |
2019/04/01 22:41:49 [DEBUG] New state was assigned lineage "25dc2857-a584-3a09-78e8-1dc7a74ec158" | |
2019/04/01 22:41:49 [INFO] command: backend initialized: <nil> | |
2019/04/01 22:41:49 [DEBUG] checking for provider in "." | |
2019/04/01 22:41:49 [DEBUG] checking for provider in "/usr/local/bin" | |
2019/04/01 22:41:49 [DEBUG] checking for provider in ".terraform/plugins/darwin_amd64" | |
2019/04/01 22:41:49 [DEBUG] found provider "terraform-provider-aws_v2.4.0_x4" | |
2019/04/01 22:41:49 [DEBUG] found valid plugin: "aws", "2.4.0", "/Users/sbutler/Desktop/backup-example/.terraform/plugins/darwin_amd64/terraform-provider-aws_v2.4.0_x4" | |
2019/04/01 22:41:49 [DEBUG] checking for provisioner in "." | |
2019/04/01 22:41:49 [DEBUG] checking for provisioner in "/usr/local/bin" | |
2019/04/01 22:41:49 [DEBUG] checking for provisioner in ".terraform/plugins/darwin_amd64" | |
2019/04/01 22:41:49 [INFO] command: backend <nil> is not enhanced, wrapping in local | |
2019/04/01 22:41:49 [INFO] backend/local: starting Apply operation | |
2019/04/01 22:41:49 [DEBUG] New state was assigned lineage "08d02c7a-2477-34d8-650b-fb6d3cc6b9ba" | |
2019/04/01 22:41:49 [INFO] terraform: building graph: GraphTypeInput | |
2019/04/01 22:41:49 [DEBUG] Resource state not found for "aws_backup_vault.example": aws_backup_vault.example | |
2019/04/01 22:41:49 [DEBUG] Resource state not found for "aws_backup_plan.example": aws_backup_plan.example | |
2019/04/01 22:41:49 [DEBUG] ReferenceTransformer: "aws_backup_vault.example" references: [] | |
2019/04/01 22:41:49 [DEBUG] ReferenceTransformer: "aws_backup_plan.example" references: [aws_backup_vault.example] | |
2019/04/01 22:41:49 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2019/04/01 22:41:49 [DEBUG] Starting graph walk: walkInput | |
2019-04-01T22:41:49.828-0500 [DEBUG] plugin: starting plugin: path=/Users/sbutler/Desktop/backup-example/.terraform/plugins/darwin_amd64/terraform-provider-aws_v2.4.0_x4 args=[/Users/sbutler/Desktop/backup-example/.terraform/plugins/darwin_amd64/terraform-provider-aws_v2.4.0_x4] | |
2019-04-01T22:41:49.837-0500 [DEBUG] plugin: waiting for RPC address: path=/Users/sbutler/Desktop/backup-example/.terraform/plugins/darwin_amd64/terraform-provider-aws_v2.4.0_x4 | |
2019-04-01T22:41:49.849-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: plugin address: timestamp=2019-04-01T22:41:49.848-0500 address=/var/folders/d1/vyfzthg90glcb7xgzrkw54pdm7gsvz/T/plugin636944067 network=unix | |
2019/04/01 22:41:49 [INFO] terraform: building graph: GraphTypeValidate | |
2019/04/01 22:41:49 [DEBUG] Resource state not found for "aws_backup_vault.example": aws_backup_vault.example | |
2019/04/01 22:41:49 [DEBUG] Resource state not found for "aws_backup_plan.example": aws_backup_plan.example | |
2019/04/01 22:41:49 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_backup_plan.example - *terraform.NodeValidatableResource | |
aws_backup_vault.example - *terraform.NodeValidatableResource | |
2019/04/01 22:41:49 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_backup_plan.example - *terraform.NodeValidatableResource | |
aws_backup_vault.example - *terraform.NodeValidatableResource | |
2019/04/01 22:41:49 [DEBUG] resource aws_backup_vault.example using provider provider.aws | |
2019/04/01 22:41:49 [DEBUG] resource aws_backup_plan.example using provider provider.aws | |
2019/04/01 22:41:49 [DEBUG] ReferenceTransformer: "aws_backup_plan.example" references: [aws_backup_vault.example] | |
2019/04/01 22:41:49 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2019/04/01 22:41:49 [DEBUG] Resource state not found for "aws_backup_vault.example": aws_backup_vault.example | |
2019/04/01 22:41:49 [DEBUG] ReferenceTransformer: "aws_backup_vault.example" references: [] | |
2019/04/01 22:41:49 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_backup_vault.example - *terraform.NodeValidatableResourceInstance | |
2019/04/01 22:41:49 [DEBUG] Resource state not found for "aws_backup_plan.example": aws_backup_plan.example | |
2019/04/01 22:41:49 [DEBUG] ReferenceTransformer: "aws_backup_plan.example" references: [] | |
2019/04/01 22:41:49 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_backup_plan.example - *terraform.NodeValidatableResourceInstance | |
2019/04/01 22:41:49 [INFO] backend/local: apply calling Refresh | |
2019/04/01 22:41:49 [INFO] terraform: building graph: GraphTypeRefresh | |
2019/04/01 22:41:49 [DEBUG] Starting graph walk: walkRefresh | |
2019/04/01 22:41:49 [INFO] backend/local: apply calling Plan | |
2019/04/01 22:41:49 [INFO] terraform: building graph: GraphTypePlan | |
2019/04/01 22:41:49 [TRACE] ConfigTransformer: Starting for path: [] | |
2019/04/01 22:41:49 [DEBUG] Resource state not found for "aws_backup_vault.example": aws_backup_vault.example | |
2019/04/01 22:41:49 [DEBUG] Resource state not found for "aws_backup_plan.example": aws_backup_plan.example | |
2019/04/01 22:41:49 [DEBUG] resource aws_backup_plan.example using provider provider.aws | |
2019/04/01 22:41:49 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2019/04/01 22:41:49 [DEBUG] ReferenceTransformer: "aws_backup_vault.example" references: [] | |
2019/04/01 22:41:49 [DEBUG] ReferenceTransformer: "aws_backup_plan.example" references: [aws_backup_vault.example] | |
2019/04/01 22:41:49 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_backup_plan.example - *terraform.NodePlannableResource | |
aws_backup_vault.example - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_backup_vault.example - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2019/04/01 22:41:49 [DEBUG] Starting graph walk: walkPlan | |
2019-04-01T22:41:49.907-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:49 [INFO] No assume_role block read from configuration | |
2019-04-01T22:41:49.907-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:49 [INFO] Building AWS auth structure | |
2019-04-01T22:41:49.907-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:49 [INFO] Setting AWS metadata API timeout to 100ms | |
2019-04-01T22:41:50.689-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:50 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id | |
[... snip get caller logs ...] | |
2019/04/01 22:41:51 [TRACE] [walkPlan] Exiting eval tree: provider.aws | |
2019/04/01 22:41:51 [DEBUG] Resource state not found for "aws_backup_vault.example": aws_backup_vault.example | |
2019/04/01 22:41:51 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_backup_vault.example - *terraform.NodePlannableResourceInstance | |
2019/04/01 22:41:51 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_backup_vault.example - *terraform.NodePlannableResourceInstance | |
2019/04/01 22:41:51 [DEBUG] ReferenceTransformer: "aws_backup_vault.example" references: [] | |
2019/04/01 22:41:51 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_backup_vault.example - *terraform.NodePlannableResourceInstance | |
2019/04/01 22:41:51 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_backup_vault.example - *terraform.NodePlannableResourceInstance | |
2019/04/01 22:41:51 [TRACE] dag/walk: added new vertex: "aws_backup_vault.example" | |
2019/04/01 22:41:51 [DEBUG] Resource state not found for "aws_backup_plan.example": aws_backup_plan.example | |
2019/04/01 22:41:51 [DEBUG] ReferenceTransformer: "aws_backup_plan.example" references: [] | |
2019/04/01 22:41:51 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_backup_plan.example - *terraform.NodePlannableResourceInstance | |
An execution plan has been generated and is shown below. | |
Resource actions are indicated with the following symbols: | |
+ create | |
Terraform will perform the following actions: | |
2019/04/01 22:41:51 [DEBUG] command: asking for input: "Do you want to perform these actions?" | |
+ aws_backup_plan.example | |
id: <computed> | |
arn: <computed> | |
name: "example-plan" | |
rule.#: "1" | |
rule.670050765.completion_window: "180" | |
rule.670050765.lifecycle.#: "1" | |
rule.670050765.lifecycle.0.cold_storage_after: "" | |
rule.670050765.lifecycle.0.delete_after: "30" | |
rule.670050765.rule_name: "MainRule" | |
rule.670050765.schedule: "cron(5 8 * * ? *)" | |
rule.670050765.start_window: "60" | |
rule.670050765.target_vault_name: "example-vault" | |
version: <computed> | |
+ aws_backup_vault.example | |
id: <computed> | |
arn: <computed> | |
kms_key_arn: <computed> | |
name: "example-vault" | |
recovery_points: <computed> | |
Plan: 2 to add, 0 to change, 0 to destroy. | |
Do you want to perform these actions? | |
Terraform will perform the actions described above. | |
Only 'yes' will be accepted to approve. | |
Enter a value: yes | |
2019/04/01 22:41:56 [INFO] terraform: building graph: GraphTypeApply | |
iff{Old:"", New:"example-vault", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "rule.670050765.start_window":*terraform.ResourceAttrDiff{Old:"", New:"60", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "rule.670050765.schedule":*terraform.ResourceAttrDiff{Old:"", New:"cron(5 8 * * ? *)", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, Meta:map[string]interface {}(nil)} | |
2019/04/01 22:41:56 [DEBUG] Resource state not found for "aws_backup_vault.example": aws_backup_vault.example | |
2019/04/01 22:41:56 [DEBUG] Resource state not found for "aws_backup_plan.example": aws_backup_plan.example | |
2019/04/01 22:41:56 [DEBUG] resource aws_backup_vault.example using provider provider.aws | |
2019/04/01 22:41:56 [DEBUG] resource aws_backup_plan.example using provider provider.aws | |
2019/04/01 22:41:56 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2019/04/01 22:41:56 [DEBUG] Starting graph walk: walkApply | |
2019-04-01T22:41:56.476-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:56 [INFO] No assume_role block read from configuration | |
2019-04-01T22:41:56.476-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:56 [INFO] Building AWS auth structure | |
2019-04-01T22:41:56.476-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:56 [INFO] Setting AWS metadata API timeout to 100ms | |
2019-04-01T22:41:56.477-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:56 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id | |
[... snip get caller logs ...] | |
aws_backup_vault.example: Creating... | |
arn: "" => "<computed>" | |
kms_key_arn: "" => "<computed>" | |
name: "" => "example-vault" | |
recovery_points: "" => "<computed>" | |
2019-04-01T22:41:56.818-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:56 [DEBUG] [aws-sdk-go] DEBUG: Request Backup/CreateBackupVault Details: | |
2019-04-01T22:41:56.818-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-01T22:41:56.818-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: PUT /backup-vaults/example-vault HTTP/1.1 | |
2019-04-01T22:41:56.818-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: backup.us-east-2.amazonaws.com | |
2019-04-01T22:41:56.818-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-01T22:41:56.818-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 0 | |
2019-04-01T22:41:56.818-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: [... snip auth ...] | |
2019-04-01T22:41:56.818-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json | |
2019-04-01T22:41:56.818-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T034156Z | |
2019-04-01T22:41:56.818-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-01T22:41:56.818-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-01T22:41:56.818-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-01T22:41:56.818-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:57 [DEBUG] [aws-sdk-go] DEBUG: Response Backup/CreateBackupVault Details: | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 151 | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 2 Apr 2019 03:41:57 GMT | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: e88d4a5d-761b-4233-96be-aca8ec41b2a5 | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:57 [DEBUG] [aws-sdk-go] {"BackupVaultArn":"arn:aws:backup:us-east-2:378517677616:backup-vault:example-vault","BackupVaultName":"example-vault","CreationDate":1.554176517143E9} | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:57 [DEBUG] [aws-sdk-go] DEBUG: Request Backup/DescribeBackupVault Details: | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: GET /backup-vaults/example-vault HTTP/1.1 | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: backup.us-east-2.amazonaws.com | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: [... snip auth ...] | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T034157Z | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-01T22:41:57.181-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:57 [DEBUG] [aws-sdk-go] DEBUG: Response Backup/DescribeBackupVault Details: | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 299 | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 2 Apr 2019 03:41:57 GMT | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: 5d2cd1c6-97e7-43fd-adef-03620fce7f69 | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:57 [DEBUG] [aws-sdk-go] {"BackupVaultArn":"arn:aws:backup:us-east-2:378517677616:backup-vault:example-vault","BackupVaultName":"example-vault","CreationDate":1.554176517143E9,"CreatorRequestId":null,"EncryptionKeyArn":"arn:aws:kms:us-east-2:378517677616:key/787fabd6-f8aa-47a3-99b0-a8c67c7b2e72","NumberOfRecoveryPoints":0} | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:57 [DEBUG] [aws-sdk-go] DEBUG: Request Backup/ListTags Details: | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: GET /tags/arn%3Aaws%3Abackup%3Aus-east-2%3A378517677616%3Abackup-vault%3Aexample-vault/ HTTP/1.1 | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: backup.us-east-2.amazonaws.com | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: [... snip auth ...] | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T034157Z | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-01T22:41:57.323-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-01T22:41:57.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:57 [DEBUG] [aws-sdk-go] DEBUG: Response Backup/ListTags Details: | |
2019-04-01T22:41:57.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-01T22:41:57.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK | |
2019-04-01T22:41:57.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close | |
2019-04-01T22:41:57.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 28 | |
2019-04-01T22:41:57.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json | |
2019-04-01T22:41:57.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 2 Apr 2019 03:41:57 GMT | |
2019-04-01T22:41:57.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: cfe0aba2-0dfc-4374-b31f-7159b15960c3 | |
2019-04-01T22:41:57.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-01T22:41:57.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-01T22:41:57.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-01T22:41:57.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:57 [DEBUG] [aws-sdk-go] {"NextToken":null,"Tags":{}} | |
aws_backup_vault.example: Creation complete after 0s (ID: example-vault) | |
aws_backup_plan.example: Creating... | |
arn: "" => "<computed>" | |
name: "" => "example-plan" | |
rule.#: "" => "1" | |
rule.670050765.completion_window: "" => "180" | |
rule.670050765.lifecycle.#: "" => "1" | |
rule.670050765.lifecycle.0.cold_storage_after: "" => "" | |
2019-04-01T22:41:57.489-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:57 [DEBUG] [aws-sdk-go] DEBUG: Request Backup/CreateBackupPlan Details: | |
rule.670050765.lifecycle.0.delete_after: "" => "30" | |
2019-04-01T22:41:57.489-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-01T22:41:57.489-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: PUT /backup/plans/ HTTP/1.1 | |
2019-04-01T22:41:57.489-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: backup.us-east-2.amazonaws.com | |
2019-04-01T22:41:57.489-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-01T22:41:57.489-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 306 | |
2019-04-01T22:41:57.489-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: [... snip auth ...] | |
2019-04-01T22:41:57.489-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json | |
2019-04-01T22:41:57.489-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T034157Z | |
2019-04-01T22:41:57.489-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-01T22:41:57.489-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
rule.670050765.rule_name: "" => "MainRule" | |
rule.670050765.schedule: "" => "cron(5 8 * * ? *)" | |
rule.670050765.start_window: "" => "60" | |
2019-04-01T22:41:57.489-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
rule.670050765.target_vault_name: "" => "example-vault" | |
version: "" => "<computed>" | |
2019-04-01T22:41:57.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:57 [DEBUG] [aws-sdk-go] DEBUG: Response Backup/CreateBackupPlan Details: | |
2019-04-01T22:41:57.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-01T22:41:57.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 400 Bad Request | |
2019-04-01T22:41:57.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close | |
2019-04-01T22:41:57.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 303 | |
2019-04-01T22:41:57.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json | |
2019-04-01T22:41:57.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 2 Apr 2019 03:41:57 GMT | |
2019-04-01T22:41:57.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Errortype: InvalidParameterValueException:http://internal.amazon.com/coral/com.amazonaws.services.cryo/ | |
2019-04-01T22:41:57.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: 4bf37028-0af3-42f2-a87c-a2d6c28fa79c | |
2019-04-01T22:41:57.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-01T22:41:57.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-01T22:41:57.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-01T22:41:57.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:57 [DEBUG] [aws-sdk-go] {"Code":"ERROR_3015","Context":"[\"MainRule\",\"Invalid lifecycle. DeleteAfterDays cannot be less than 90 days apart from MoveToColdStorageAfterDays\"]","Message":"Error in rule MainRule : Invalid lifecycle. DeleteAfterDays cannot be less than 90 days apart from MoveToColdStorageAfterDays","Type":null} | |
2019-04-01T22:41:57.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:57 [DEBUG] [aws-sdk-go] DEBUG: Validate Response Backup/CreateBackupPlan failed, not retrying, error InvalidParameterValueException: Error in rule MainRule : Invalid lifecycle. DeleteAfterDays cannot be less than 90 days apart from MoveToColdStorageAfterDays | |
2019-04-01T22:41:57.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: status code: 400, request id: 4bf37028-0af3-42f2-a87c-a2d6c28fa79c | |
2019/04/01 22:41:57 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/01 22:41:57 [TRACE] root: eval: *terraform.EvalApplyProvisioners | |
2019/04/01 22:41:57 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/01 22:41:57 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/01 22:41:57 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2019/04/01 22:41:57 [ERROR] root: eval: *terraform.EvalSequence, err: 1 error(s) occurred: | |
* aws_backup_plan.example: error creating Backup Plan: InvalidParameterValueException: Error in rule MainRule : Invalid lifecycle. DeleteAfterDays cannot be less than 90 days apart from MoveToColdStorageAfterDays | |
status code: 400, request id: 4bf37028-0af3-42f2-a87c-a2d6c28fa79c | |
2019/04/01 22:41:57 [TRACE] [walkApply] Exiting eval tree: aws_backup_plan.example | |
2019/04/01 22:41:57 [TRACE] dag/walk: upstream errored, not walking "provider.aws (close)" | |
2019/04/01 22:41:57 [TRACE] dag/walk: upstream errored, not walking "meta.count-boundary (count boundary fixup)" | |
2019/04/01 22:41:57 [DEBUG] plugin: waiting for all plugin processes to complete... | |
Error: Error applying plan: | |
1 error(s) occurred: | |
* aws_backup_plan.example: 1 error(s) occurred: | |
2019-04-01T22:41:57.598-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:57 [ERR] plugin: plugin server: accept unix /var/folders/d1/vyfzthg90glcb7xgzrkw54pdm7gsvz/T/plugin636944067: use of closed network connection | |
2019-04-01T22:41:57.598-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/01 22:41:57 [ERR] plugin: stream copy 'stderr' error: stream closed | |
* aws_backup_plan.example: error creating Backup Plan: InvalidParameterValueException: Error in rule MainRule : Invalid lifecycle. DeleteAfterDays cannot be less than 90 days apart from MoveToColdStorageAfterDays | |
status code: 400, request id: 4bf37028-0af3-42f2-a87c-a2d6c28fa79c | |
Terraform does not automatically rollback in the face of errors. | |
Instead, your Terraform state file has been partially updated with | |
any resources that successfully completed. Please address the error | |
above and apply again to incrementally change your infrastructure. | |
2019-04-01T22:41:57.600-0500 [DEBUG] plugin: plugin process exited: path=/Users/sbutler/Desktop/backup-example/.terraform/plugins/darwin_amd64/terraform-provider-aws_v2.4.0_x4 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment