Created
April 13, 2022 07:50
-
-
Save simonszu/13b583b7d601457cbf28a34dfe545c1c to your computer and use it in GitHub Desktop.
Terraform Debug Log
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: HTTP/2.0 200 OK | |
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Content-Length: 567 | |
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Cache-Control: no-cache, private | |
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Content-Type: application/json | |
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Date: Wed, 13 Apr 2022 07:49:30 GMT | |
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: | |
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: { | |
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "kind": "Namespace", | |
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "apiVersion": "v1", | |
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "metadata": { | |
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "name": "ingress-nginx", | |
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "selfLink": "/api/v1/namespaces/ingress-nginx", | |
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "uid": "f49d9da0-9d62-4be9-9ccd-da9b83706f10", | |
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "resourceVersion": "2387607", | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "creationTimestamp": "2022-04-12T13:31:55Z", | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "annotations": { | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "name": "ingress-nginx" | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }, | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "managedFields": [ | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: { | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "manager": "HashiCorp", | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "operation": "Update", | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "apiVersion": "v1", | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "time": "2022-04-12T13:31:55Z", | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "fieldsType": "FieldsV1", | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "fieldsV1": { | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:metadata": { | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:annotations": { | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ".": {}, | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:name": {} | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }, | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:status": { | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:phase": {} | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ] | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }, | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "spec": { | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "finalizers": [ | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "kubernetes" | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ] | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }, | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "status": { | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "phase": "Active" | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ----------------------------------------------------- | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:29 [INFO] Namespace monitoring exists | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:29 [INFO] Namespace ingress-nginx exists | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:29 [INFO] Reading namespace monitoring | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:29 [INFO] Reading namespace ingress-nginx | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:29 [DEBUG] Kubernetes API Request Details: | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ---[ REQUEST ]--------------------------------------- | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: GET /api/v1/namespaces/monitoring HTTP/1.1 | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Host: 80.158.88.119:5443 | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: User-Agent: HashiCorp/1.0 Terraform/1.1.8 | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Accept: application/json, */* | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Accept-Encoding: gzip | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ----------------------------------------------------- | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:29 [DEBUG] Kubernetes API Request Details: | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ---[ REQUEST ]--------------------------------------- | |
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: GET /api/v1/namespaces/ingress-nginx HTTP/1.1 | |
2022-04-13T09:49:29.977+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Host: 80.158.88.119:5443 | |
2022-04-13T09:49:29.977+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: User-Agent: HashiCorp/1.0 Terraform/1.1.8 | |
2022-04-13T09:49:29.977+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Accept: application/json, */* | |
2022-04-13T09:49:29.977+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Accept-Encoding: gzip | |
2022-04-13T09:49:29.977+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: | |
2022-04-13T09:49:29.977+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: | |
2022-04-13T09:49:29.977+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ----------------------------------------------------- | |
2022-04-13T09:49:29.993+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] fluentd Unstructed YAML: map[apiVersion:rbac.authorization.k8s.io/v1 kind:ClusterRole metadata:map[name:fluentd] rules:[map[apiGroups:[] resources:[pods namespaces] verbs:[get list watch]]]] | |
2022-04-13T09:49:29.993+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] fluentd Unstructed YAML: map[apiVersion:rbac.authorization.k8s.io/v1 kind:ClusterRole metadata:map[name:fluentd] rules:[map[apiGroups:[] resources:[pods namespaces] verbs:[get list watch]]]] | |
2022-04-13T09:49:29.993+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] kube-system/fluentd Unstructed YAML: map[apiVersion:v1 kind:ServiceAccount metadata:map[name:fluentd namespace:kube-system]] | |
2022-04-13T09:49:29.993+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] kube-system/fluentd Unstructed YAML: map[apiVersion:v1 kind:ServiceAccount metadata:map[name:fluentd namespace:kube-system]] | |
2022-04-13T09:49:29.993+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.fluentd_clusterrole, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .force_new: planned value cty.False for a non-computed attribute | |
- .server_side_apply: planned value cty.False for a non-computed attribute | |
- .apply_only: planned value cty.False for a non-computed attribute | |
- .validate_schema: planned value cty.True for a non-computed attribute | |
- .wait_for_rollout: planned value cty.True for a non-computed attribute | |
- .force_conflicts: planned value cty.False for a non-computed attribute | |
2022-04-13T09:49:29.993+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.fluentd_serviceaccount, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .apply_only: planned value cty.False for a non-computed attribute | |
- .server_side_apply: planned value cty.False for a non-computed attribute | |
- .wait_for_rollout: planned value cty.True for a non-computed attribute | |
- .force_conflicts: planned value cty.False for a non-computed attribute | |
- .validate_schema: planned value cty.True for a non-computed attribute | |
- .force_new: planned value cty.False for a non-computed attribute | |
2022-04-13T09:49:29.994+0200 [INFO] ReferenceTransformer: reference not found: "kubectl_manifest.fluentd_serviceaccount" | |
2022-04-13T09:49:29.994+0200 [INFO] ReferenceTransformer: reference not found: "kubectl_manifest.fluentd_clusterrole" | |
2022-04-13T09:49:29.994+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.fluentd-clusterrolebinding" references: [] | |
2022-04-13T09:49:29.994+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] kube-system/fluentd Unstructed YAML: map[apiVersion:apps/v1 kind:DaemonSet metadata:map[labels:map[k8s-app:fluentd-logging version:v1] name:fluentd namespace:kube-system] spec:map[selector:map[matchLabels:map[k8s-app:fluentd-logging version:v1]] template:map[metadata:map[labels:map[k8s-app:fluentd-logging version:v1]] spec:map[containers:[map[env:[map[name:FLUENT_ELASTICSEARCH_HOST value:192.168.1.184] map[name:FLUENT_ELASTICSEARCH_PORT value:9200] map[name:FLUENT_ELASTICSEARCH_SCHEME value:http] map[name:FLUENT_ELASTICSEARCH_SSL_VERIFY value:false] map[name:FLUENT_ELASTICSEARCH_SSL_VERSION value:TLSv1_2] map[name:FLUENT_ELASTICSEARCH_USER value:admin] map[name:FLUENT_ELASTICSEARCH_PASSWORD value:i2M#8]b0-Pj(,yPW2wXr]kwM] map[name:FLUENTD_UID value:0] map[name:FLUENTD_SYSTEMD_CONF value:disable] map[name:FLUENTD_PROMETHEUS_CONF value:disable] map[name:FLUENT_ELASTICSEARCH_LOGSTASH_INDEX_NAME value:fluentd]] image:fluent/fluentd-kubernetes-daemonset:v1.13-debian-elasticsearch7-1 name:fluentd resources:map[limits:map[memory:200Mi] requests:map[cpu:100m memory:200Mi]] volumeMounts:[map[mountPath:/var/log name:varlog] map[mountPath:/var/lib/docker/containers name:dockercontainerlogdirectory readOnly:true]]]] serviceAccount:fluentd serviceAccountName:fluentd terminationGracePeriodSeconds:30 tolerations:[map[effect:NoSchedule key:node-role.kubernetes.io/master]] volumes:[map[hostPath:map[path:/var/log] name:varlog] map[hostPath:map[path:/var/lib/docker/containers] name:dockercontainerlogdirectory]]]]]] | |
2022-04-13T09:49:29.994+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] kube-system/fluentd Unstructed YAML: map[apiVersion:apps/v1 kind:DaemonSet metadata:map[labels:map[k8s-app:fluentd-logging version:v1] name:fluentd namespace:kube-system] spec:map[selector:map[matchLabels:map[k8s-app:fluentd-logging version:v1]] template:map[metadata:map[labels:map[k8s-app:fluentd-logging version:v1]] spec:map[containers:[map[env:[map[name:FLUENT_ELASTICSEARCH_HOST value:192.168.1.184] map[name:FLUENT_ELASTICSEARCH_PORT value:9200] map[name:FLUENT_ELASTICSEARCH_SCHEME value:http] map[name:FLUENT_ELASTICSEARCH_SSL_VERIFY value:false] map[name:FLUENT_ELASTICSEARCH_SSL_VERSION value:TLSv1_2] map[name:FLUENT_ELASTICSEARCH_USER value:admin] map[name:FLUENT_ELASTICSEARCH_PASSWORD value:i2M#8]b0-Pj(,yPW2wXr]kwM] map[name:FLUENTD_UID value:0] map[name:FLUENTD_SYSTEMD_CONF value:disable] map[name:FLUENTD_PROMETHEUS_CONF value:disable] map[name:FLUENT_ELASTICSEARCH_LOGSTASH_INDEX_NAME value:fluentd]] image:fluent/fluentd-kubernetes-daemonset:v1.13-debian-elasticsearch7-1 name:fluentd resources:map[limits:map[memory:200Mi] requests:map[cpu:100m memory:200Mi]] volumeMounts:[map[mountPath:/var/log name:varlog] map[mountPath:/var/lib/docker/containers name:dockercontainerlogdirectory readOnly:true]]]] serviceAccount:fluentd serviceAccountName:fluentd terminationGracePeriodSeconds:30 tolerations:[map[effect:NoSchedule key:node-role.kubernetes.io/master]] volumes:[map[hostPath:map[path:/var/log] name:varlog] map[hostPath:map[path:/var/lib/docker/containers] name:dockercontainerlogdirectory]]]]]] | |
2022-04-13T09:49:29.995+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.fluentd-daemonset, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .force_new: planned value cty.False for a non-computed attribute | |
- .apply_only: planned value cty.False for a non-computed attribute | |
- .server_side_apply: planned value cty.False for a non-computed attribute | |
- .wait_for_rollout: planned value cty.True for a non-computed attribute | |
- .force_conflicts: planned value cty.False for a non-computed attribute | |
- .validate_schema: planned value cty.True for a non-computed attribute | |
kubectl_manifest.fluentd-clusterrolebinding: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/fluentd] | |
2022-04-13T09:49:29.996+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] fluentd Unstructed YAML: map[apiVersion:rbac.authorization.k8s.io/v1 kind:ClusterRoleBinding metadata:map[name:fluentd] roleRef:map[apiGroup:rbac.authorization.k8s.io kind:ClusterRole name:fluentd] subjects:[map[kind:ServiceAccount name:fluentd namespace:kube-system]]] | |
2022-04-13T09:49:29.999+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] fluentd fetch from kubernetes | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:30 [DEBUG] Kubernetes API Response Details: | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ---[ RESPONSE ]-------------------------------------- | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: HTTP/2.0 200 OK | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Content-Length: 567 | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Cache-Control: no-cache, private | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Content-Type: application/json | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Date: Wed, 13 Apr 2022 07:49:30 GMT | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: { | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "kind": "Namespace", | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "apiVersion": "v1", | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "metadata": { | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "name": "ingress-nginx", | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "selfLink": "/api/v1/namespaces/ingress-nginx", | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "uid": "f49d9da0-9d62-4be9-9ccd-da9b83706f10", | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "resourceVersion": "2387607", | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "creationTimestamp": "2022-04-12T13:31:55Z", | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "annotations": { | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "name": "ingress-nginx" | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }, | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "managedFields": [ | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: { | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "manager": "HashiCorp", | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "operation": "Update", | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "apiVersion": "v1", | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "time": "2022-04-12T13:31:55Z", | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "fieldsType": "FieldsV1", | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "fieldsV1": { | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:metadata": { | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:annotations": { | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ".": {}, | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:name": {} | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }, | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:status": { | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:phase": {} | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ] | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }, | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "spec": { | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "finalizers": [ | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "kubernetes" | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ] | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }, | |
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "status": { | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "phase": "Active" | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ----------------------------------------------------- | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:30 [DEBUG] Kubernetes API Response Details: | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ---[ RESPONSE ]-------------------------------------- | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: HTTP/2.0 200 OK | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Content-Length: 558 | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Cache-Control: no-cache, private | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Content-Type: application/json | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Date: Wed, 13 Apr 2022 07:49:30 GMT | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: { | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "kind": "Namespace", | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "apiVersion": "v1", | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "metadata": { | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "name": "monitoring", | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "selfLink": "/api/v1/namespaces/monitoring", | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "uid": "b66b0395-09fc-493c-978c-f5c5cc06ceaa", | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "resourceVersion": "2271409", | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "creationTimestamp": "2022-04-12T07:40:04Z", | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "annotations": { | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "name": "monitoring" | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }, | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "managedFields": [ | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: { | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "manager": "HashiCorp", | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "operation": "Update", | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "apiVersion": "v1", | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "time": "2022-04-12T07:40:04Z", | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "fieldsType": "FieldsV1", | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "fieldsV1": { | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:metadata": { | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:annotations": { | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ".": {}, | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:name": {} | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }, | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:status": { | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:phase": {} | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ] | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }, | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "spec": { | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "finalizers": [ | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "kubernetes" | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ] | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }, | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "status": { | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "phase": "Active" | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: } | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ----------------------------------------------------- | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:30 [INFO] Received namespace: &v1.Namespace{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ingress-nginx", GenerateName:"", Namespace:"", SelfLink:"/api/v1/namespaces/ingress-nginx", UID:"f49d9da0-9d62-4be9-9ccd-da9b83706f10", ResourceVersion:"2387607", Generation:0, CreationTimestamp:v1.Time{Time:time.Time{wall:0x0, ext:63785367115, loc:(*time.Location)(0x3d8ffc0)}}, DeletionTimestamp:(*v1.Time)(nil), DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string{"name":"ingress-nginx"}, OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:"HashiCorp", Operation:"Update", APIVersion:"v1", Time:(*v1.Time)(0xc00000d710), FieldsType:"FieldsV1", FieldsV1:(*v1.FieldsV1)(0xc00000d728), Subresource:""}}}, Spec:v1.NamespaceSpec{Finalizers:[]v1.FinalizerName{"kubernetes"}}, Status:v1.NamespaceStatus{Phase:"Active", Conditions:[]v1.NamespaceCondition(nil)}} | |
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:30 [INFO] Received namespace: &v1.Namespace{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"monitoring", GenerateName:"", Namespace:"", SelfLink:"/api/v1/namespaces/monitoring", UID:"b66b0395-09fc-493c-978c-f5c5cc06ceaa", ResourceVersion:"2271409", Generation:0, CreationTimestamp:v1.Time{Time:time.Time{wall:0x0, ext:63785346004, loc:(*time.Location)(0x3d8ffc0)}}, DeletionTimestamp:(*v1.Time)(nil), DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string{"name":"monitoring"}, OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:"HashiCorp", Operation:"Update", APIVersion:"v1", Time:(*v1.Time)(0xc00047f230), FieldsType:"FieldsV1", FieldsV1:(*v1.FieldsV1)(0xc00047f248), Subresource:""}}}, Spec:v1.NamespaceSpec{Finalizers:[]v1.FinalizerName{"kubernetes"}}, Status:v1.NamespaceStatus{Phase:"Active", Conditions:[]v1.NamespaceCondition(nil)}} | |
2022-04-13T09:49:30.012+0200 [WARN] Provider "registry.terraform.io/hashicorp/kubernetes" produced an invalid plan for kubernetes_namespace.ingress_namespace, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .metadata[0].labels: planned value cty.MapValEmpty(cty.String) for a non-computed attribute | |
- .metadata[0].generate_name: planned value cty.StringVal("") for a non-computed attribute | |
2022-04-13T09:49:30.012+0200 [WARN] Provider "registry.terraform.io/hashicorp/kubernetes" produced an invalid plan for kubernetes_namespace.monitoring_namespace, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .metadata[0].generate_name: planned value cty.StringVal("") for a non-computed attribute | |
- .metadata[0].labels: planned value cty.MapValEmpty(cty.String) for a non-computed attribute | |
2022-04-13T09:49:30.012+0200 [INFO] ReferenceTransformer: reference not found: "kubernetes_namespace.ingress_namespace" | |
2022-04-13T09:49:30.012+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.ingress_secret_docker_pull" references: [] | |
2022-04-13T09:49:30.013+0200 [INFO] ReferenceTransformer: reference not found: "kubernetes_namespace.monitoring_namespace" | |
2022-04-13T09:49:30.013+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.monitoring_secret_docker_pull" references: [] | |
2022-04-13T09:49:30.014+0200 [INFO] ReferenceTransformer: reference not found: "kubernetes_namespace.monitoring_namespace" | |
2022-04-13T09:49:30.014+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.monitoring_secret_basic_auth" references: [] | |
2022-04-13T09:49:30.014+0200 [INFO] ReferenceTransformer: reference not found: "kubernetes_namespace.monitoring_namespace" | |
2022-04-13T09:49:30.014+0200 [INFO] ReferenceTransformer: reference not found: "opentelekomcloud_evs_volume_v3.prometheus_volume" | |
2022-04-13T09:49:30.014+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.prometheus_volume_pv" references: [] | |
2022-04-13T09:49:30.015+0200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2022-04-13T09:49:30.019+0200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/kubernetes/2.10.0/darwin_amd64/terraform-provider-kubernetes_v2.10.0_x5 pid=5230 | |
2022-04-13T09:49:30.019+0200 [DEBUG] provider: plugin exited | |
2022-04-13T09:49:30.019+0200 [INFO] ReferenceTransformer: reference not found: "kubernetes_namespace.monitoring_namespace" | |
2022-04-13T09:49:30.019+0200 [INFO] ReferenceTransformer: reference not found: "opentelekomcloud_evs_volume_v3.grafana_volume" | |
2022-04-13T09:49:30.019+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.grafana_volume_pv" references: [] | |
kubectl_manifest.ingress_secret_docker_pull: Refreshing state... [id=/api/v1/namespaces/ingress-nginx/secrets/regcred] | |
kubectl_manifest.monitoring_secret_docker_pull: Refreshing state... [id=/api/v1/namespaces/monitoring/secrets/regcred] | |
2022-04-13T09:49:30.020+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] ingress-nginx/regcred Unstructed YAML: map[apiVersion:v1 data:map[.dockerconfigjson:eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJzaW1vbnN6dXRzeSIsInBhc3N3b3JkIjoiYzhkNmQzNHFjeHkiLCJlbWFpbCI6InNpbW9uLnN6dXN0a293c2tpQGV4dGVybmFsLnQtc3lzdGVtcy5jb20iLCJhdXRoIjoiYzJsdGIyNXplblYwYzNrNll6aGtObVF6TkhGamVIaz0ifX19] kind:Secret metadata:map[name:regcred namespace:ingress-nginx] type:kubernetes.io/dockerconfigjson] | |
2022-04-13T09:49:30.020+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/regcred Unstructed YAML: map[apiVersion:v1 data:map[.dockerconfigjson:eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJzaW1vbnN6dXRzeSIsInBhc3N3b3JkIjoiYzhkNmQzNHFjeHkiLCJlbWFpbCI6InNpbW9uLnN6dXN0a293c2tpQGV4dGVybmFsLnQtc3lzdGVtcy5jb20iLCJhdXRoIjoiYzJsdGIyNXplblYwYzNrNll6aGtObVF6TkhGamVIaz0ifX19] kind:Secret metadata:map[name:regcred namespace:monitoring] type:kubernetes.io/dockerconfigjson] | |
2022-04-13T09:49:30.021+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] ingress-nginx/regcred fetch from kubernetes | |
kubectl_manifest.grafana_volume_pv: Refreshing state... [id=/api/v1/persistentvolumes/cce-evs-grafana-pv] | |
2022-04-13T09:49:30.024+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/regcred fetch from kubernetes | |
kubectl_manifest.prometheus_volume_pv: Refreshing state... [id=/api/v1/persistentvolumes/cce-evs-prometheus-pv] | |
kubectl_manifest.monitoring_secret_basic_auth: Refreshing state... [id=/api/v1/namespaces/monitoring/secrets/basic-auth] | |
2022-04-13T09:49:30.025+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-grafana-pv Unstructed YAML: map[apiVersion:v1 kind:PersistentVolume metadata:map[annotations:map[everest.io/set-disk-metadata:true pv.kubernetes.io/provisioned-by:everest-csi-provisioner] finalizers:[kubernetes.io/pv-protection everest.io/disk-metadata-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-grafana-pv] spec:map[accessModes:[ReadWriteOnce] capacity:map[storage:10Gi] csi:map[driver:disk.csi.everest.io fsType:ext4 volumeAttributes:map[everest.io/disk-mode:SCSI everest.io/disk-volume-type:SATA storage.kubernetes.io/csiProvisionerIdentity:everest-csi-provisioner] volumeHandle:e5b2742f-25d4-4614-9f6d-c3edd4c537d5] nodeAffinity:map[required:map[nodeSelectorTerms:[map[matchExpressions:[map[key:failure-domain.beta.kubernetes.io/zone operator:In values:[eu-de-01]]]]]]] persistentVolumeReclaimPolicy:Delete storageClassName:csi-disk volumeMode:Filesystem]] | |
2022-04-13T09:49:30.026+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/basic-auth Unstructed YAML: map[apiVersion:v1 data:map[auth:bWNzX2NhbzokYXByMSRCMDFUWnRTcyR0V0lxODY1NjNOVXAxVTk3M2drbHkwCg==] kind:Secret metadata:map[name:basic-auth namespace:monitoring] type:Opaque] | |
2022-04-13T09:49:30.026+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-prometheus-pv Unstructed YAML: map[apiVersion:v1 kind:PersistentVolume metadata:map[annotations:map[everest.io/set-disk-metadata:true pv.kubernetes.io/provisioned-by:everest-csi-provisioner] finalizers:[kubernetes.io/pv-protection everest.io/disk-metadata-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-prometheus-pv] spec:map[accessModes:[ReadWriteOnce] capacity:map[storage:10Gi] csi:map[driver:disk.csi.everest.io fsType:ext4 volumeAttributes:map[everest.io/disk-mode:SCSI everest.io/disk-volume-type:SATA storage.kubernetes.io/csiProvisionerIdentity:everest-csi-provisioner] volumeHandle:d7f1a72a-bf91-4862-99d3-eb5305006b4b] nodeAffinity:map[required:map[nodeSelectorTerms:[map[matchExpressions:[map[key:failure-domain.beta.kubernetes.io/zone operator:In values:[eu-de-01]]]]]]] persistentVolumeReclaimPolicy:Delete storageClassName:csi-disk volumeMode:Filesystem]] | |
2022-04-13T09:49:30.027+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/basic-auth fetch from kubernetes | |
2022-04-13T09:49:30.028+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-prometheus-pv fetch from kubernetes | |
2022-04-13T09:49:30.029+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-grafana-pv fetch from kubernetes | |
2022-04-13T09:49:30.035+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] fluentd Unstructed YAML: map[apiVersion:rbac.authorization.k8s.io/v1 kind:ClusterRoleBinding metadata:map[name:fluentd] roleRef:map[apiGroup:rbac.authorization.k8s.io kind:ClusterRole name:fluentd] subjects:[map[kind:ServiceAccount name:fluentd namespace:kube-system]]] | |
2022-04-13T09:49:30.035+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] fluentd Unstructed YAML: map[apiVersion:rbac.authorization.k8s.io/v1 kind:ClusterRoleBinding metadata:map[name:fluentd] roleRef:map[apiGroup:rbac.authorization.k8s.io kind:ClusterRole name:fluentd] subjects:[map[kind:ServiceAccount name:fluentd namespace:kube-system]]] | |
2022-04-13T09:49:30.036+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.fluentd-clusterrolebinding, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .force_conflicts: planned value cty.False for a non-computed attribute | |
- .validate_schema: planned value cty.True for a non-computed attribute | |
- .wait_for_rollout: planned value cty.True for a non-computed attribute | |
- .force_new: planned value cty.False for a non-computed attribute | |
- .server_side_apply: planned value cty.False for a non-computed attribute | |
- .apply_only: planned value cty.False for a non-computed attribute | |
2022-04-13T09:49:30.053+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] ingress-nginx/regcred Unstructed YAML: map[apiVersion:v1 data:map[.dockerconfigjson:eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJzaW1vbnN6dXRzeSIsInBhc3N3b3JkIjoiYzhkNmQzNHFjeHkiLCJlbWFpbCI6InNpbW9uLnN6dXN0a293c2tpQGV4dGVybmFsLnQtc3lzdGVtcy5jb20iLCJhdXRoIjoiYzJsdGIyNXplblYwYzNrNll6aGtObVF6TkhGamVIaz0ifX19] kind:Secret metadata:map[name:regcred namespace:ingress-nginx] type:kubernetes.io/dockerconfigjson] | |
2022-04-13T09:49:30.053+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] ingress-nginx/regcred Unstructed YAML: map[apiVersion:v1 data:map[.dockerconfigjson:eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJzaW1vbnN6dXRzeSIsInBhc3N3b3JkIjoiYzhkNmQzNHFjeHkiLCJlbWFpbCI6InNpbW9uLnN6dXN0a293c2tpQGV4dGVybmFsLnQtc3lzdGVtcy5jb20iLCJhdXRoIjoiYzJsdGIyNXplblYwYzNrNll6aGtObVF6TkhGamVIaz0ifX19] kind:Secret metadata:map[name:regcred namespace:ingress-nginx] type:kubernetes.io/dockerconfigjson] | |
2022-04-13T09:49:30.053+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.ingress_secret_docker_pull, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .force_new: planned value cty.False for a non-computed attribute | |
- .server_side_apply: planned value cty.False for a non-computed attribute | |
- .apply_only: planned value cty.False for a non-computed attribute | |
- .force_conflicts: planned value cty.False for a non-computed attribute | |
- .validate_schema: planned value cty.True for a non-computed attribute | |
- .wait_for_rollout: planned value cty.True for a non-computed attribute | |
2022-04-13T09:49:30.061+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/regcred Unstructed YAML: map[apiVersion:v1 data:map[.dockerconfigjson:eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJzaW1vbnN6dXRzeSIsInBhc3N3b3JkIjoiYzhkNmQzNHFjeHkiLCJlbWFpbCI6InNpbW9uLnN6dXN0a293c2tpQGV4dGVybmFsLnQtc3lzdGVtcy5jb20iLCJhdXRoIjoiYzJsdGIyNXplblYwYzNrNll6aGtObVF6TkhGamVIaz0ifX19] kind:Secret metadata:map[name:regcred namespace:monitoring] type:kubernetes.io/dockerconfigjson] | |
2022-04-13T09:49:30.061+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.monitoring_secret_docker_pull, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .force_new: planned value cty.False for a non-computed attribute | |
- .server_side_apply: planned value cty.False for a non-computed attribute | |
- .apply_only: planned value cty.False for a non-computed attribute | |
- .force_conflicts: planned value cty.False for a non-computed attribute | |
- .validate_schema: planned value cty.True for a non-computed attribute | |
- .wait_for_rollout: planned value cty.True for a non-computed attribute | |
2022-04-13T09:49:30.061+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/regcred Unstructed YAML: map[apiVersion:v1 data:map[.dockerconfigjson:eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJzaW1vbnN6dXRzeSIsInBhc3N3b3JkIjoiYzhkNmQzNHFjeHkiLCJlbWFpbCI6InNpbW9uLnN6dXN0a293c2tpQGV4dGVybmFsLnQtc3lzdGVtcy5jb20iLCJhdXRoIjoiYzJsdGIyNXplblYwYzNrNll6aGtObVF6TkhGamVIaz0ifX19] kind:Secret metadata:map[name:regcred namespace:monitoring] type:kubernetes.io/dockerconfigjson] | |
2022-04-13T09:49:30.061+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/basic-auth Unstructed YAML: map[apiVersion:v1 data:map[auth:bWNzX2NhbzokYXByMSRCMDFUWnRTcyR0V0lxODY1NjNOVXAxVTk3M2drbHkwCg==] kind:Secret metadata:map[name:basic-auth namespace:monitoring] type:Opaque] | |
2022-04-13T09:49:30.061+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/basic-auth Unstructed YAML: map[apiVersion:v1 data:map[auth:bWNzX2NhbzokYXByMSRCMDFUWnRTcyR0V0lxODY1NjNOVXAxVTk3M2drbHkwCg==] kind:Secret metadata:map[name:basic-auth namespace:monitoring] type:Opaque] | |
2022-04-13T09:49:30.062+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-grafana-pv Unstructed YAML: map[apiVersion:v1 kind:PersistentVolume metadata:map[annotations:map[everest.io/set-disk-metadata:true pv.kubernetes.io/provisioned-by:everest-csi-provisioner] finalizers:[kubernetes.io/pv-protection everest.io/disk-metadata-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-grafana-pv] spec:map[accessModes:[ReadWriteOnce] capacity:map[storage:10Gi] csi:map[driver:disk.csi.everest.io fsType:ext4 volumeAttributes:map[everest.io/disk-mode:SCSI everest.io/disk-volume-type:SATA storage.kubernetes.io/csiProvisionerIdentity:everest-csi-provisioner] volumeHandle:e5b2742f-25d4-4614-9f6d-c3edd4c537d5] nodeAffinity:map[required:map[nodeSelectorTerms:[map[matchExpressions:[map[key:failure-domain.beta.kubernetes.io/zone operator:In values:[eu-de-01]]]]]]] persistentVolumeReclaimPolicy:Delete storageClassName:csi-disk volumeMode:Filesystem]] | |
2022-04-13T09:49:30.063+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-prometheus-pv Unstructed YAML: map[apiVersion:v1 kind:PersistentVolume metadata:map[annotations:map[everest.io/set-disk-metadata:true pv.kubernetes.io/provisioned-by:everest-csi-provisioner] finalizers:[kubernetes.io/pv-protection everest.io/disk-metadata-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-prometheus-pv] spec:map[accessModes:[ReadWriteOnce] capacity:map[storage:10Gi] csi:map[driver:disk.csi.everest.io fsType:ext4 volumeAttributes:map[everest.io/disk-mode:SCSI everest.io/disk-volume-type:SATA storage.kubernetes.io/csiProvisionerIdentity:everest-csi-provisioner] volumeHandle:d7f1a72a-bf91-4862-99d3-eb5305006b4b] nodeAffinity:map[required:map[nodeSelectorTerms:[map[matchExpressions:[map[key:failure-domain.beta.kubernetes.io/zone operator:In values:[eu-de-01]]]]]]] persistentVolumeReclaimPolicy:Delete storageClassName:csi-disk volumeMode:Filesystem]] | |
2022-04-13T09:49:30.063+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-grafana-pv Unstructed YAML: map[apiVersion:v1 kind:PersistentVolume metadata:map[annotations:map[everest.io/set-disk-metadata:true pv.kubernetes.io/provisioned-by:everest-csi-provisioner] finalizers:[kubernetes.io/pv-protection everest.io/disk-metadata-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-grafana-pv] spec:map[accessModes:[ReadWriteOnce] capacity:map[storage:10Gi] csi:map[driver:disk.csi.everest.io fsType:ext4 volumeAttributes:map[everest.io/disk-mode:SCSI everest.io/disk-volume-type:SATA storage.kubernetes.io/csiProvisionerIdentity:everest-csi-provisioner] volumeHandle:e5b2742f-25d4-4614-9f6d-c3edd4c537d5] nodeAffinity:map[required:map[nodeSelectorTerms:[map[matchExpressions:[map[key:failure-domain.beta.kubernetes.io/zone operator:In values:[eu-de-01]]]]]]] persistentVolumeReclaimPolicy:Delete storageClassName:csi-disk volumeMode:Filesystem]] | |
2022-04-13T09:49:30.064+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-prometheus-pv Unstructed YAML: map[apiVersion:v1 kind:PersistentVolume metadata:map[annotations:map[everest.io/set-disk-metadata:true pv.kubernetes.io/provisioned-by:everest-csi-provisioner] finalizers:[kubernetes.io/pv-protection everest.io/disk-metadata-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-prometheus-pv] spec:map[accessModes:[ReadWriteOnce] capacity:map[storage:10Gi] csi:map[driver:disk.csi.everest.io fsType:ext4 volumeAttributes:map[everest.io/disk-mode:SCSI everest.io/disk-volume-type:SATA storage.kubernetes.io/csiProvisionerIdentity:everest-csi-provisioner] volumeHandle:d7f1a72a-bf91-4862-99d3-eb5305006b4b] nodeAffinity:map[required:map[nodeSelectorTerms:[map[matchExpressions:[map[key:failure-domain.beta.kubernetes.io/zone operator:In values:[eu-de-01]]]]]]] persistentVolumeReclaimPolicy:Delete storageClassName:csi-disk volumeMode:Filesystem]] | |
2022-04-13T09:49:30.063+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.monitoring_secret_basic_auth, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .server_side_apply: planned value cty.False for a non-computed attribute | |
- .apply_only: planned value cty.False for a non-computed attribute | |
- .force_conflicts: planned value cty.False for a non-computed attribute | |
- .validate_schema: planned value cty.True for a non-computed attribute | |
- .wait_for_rollout: planned value cty.True for a non-computed attribute | |
- .force_new: planned value cty.False for a non-computed attribute | |
2022-04-13T09:49:30.065+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.grafana_volume_pv, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .force_new: planned value cty.False for a non-computed attribute | |
- .server_side_apply: planned value cty.False for a non-computed attribute | |
- .apply_only: planned value cty.False for a non-computed attribute | |
- .validate_schema: planned value cty.True for a non-computed attribute | |
- .wait_for_rollout: planned value cty.True for a non-computed attribute | |
- .force_conflicts: planned value cty.False for a non-computed attribute | |
2022-04-13T09:49:30.065+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.prometheus_volume_pv, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .apply_only: planned value cty.False for a non-computed attribute | |
- .server_side_apply: planned value cty.False for a non-computed attribute | |
- .wait_for_rollout: planned value cty.True for a non-computed attribute | |
- .force_conflicts: planned value cty.False for a non-computed attribute | |
- .validate_schema: planned value cty.True for a non-computed attribute | |
- .force_new: planned value cty.False for a non-computed attribute | |
2022-04-13T09:49:30.065+0200 [INFO] ReferenceTransformer: reference not found: "kubectl_manifest.grafana_volume_pv" | |
2022-04-13T09:49:30.065+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.grafana_volume_pvc" references: [] | |
2022-04-13T09:49:30.065+0200 [INFO] ReferenceTransformer: reference not found: "kubectl_manifest.prometheus_volume_pv" | |
2022-04-13T09:49:30.065+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.prometheus_volume_pvc" references: [] | |
kubectl_manifest.grafana_volume_pvc: Refreshing state... [id=/api/v1/namespaces/monitoring/persistentvolumeclaims/cce-evs-grafana] | |
kubectl_manifest.prometheus_volume_pvc: Refreshing state... [id=/api/v1/namespaces/monitoring/persistentvolumeclaims/cce-evs-prometheus] | |
2022-04-13T09:49:30.067+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-prometheus Unstructed YAML: map[apiVersion:v1 kind:PersistentVolumeClaim metadata:map[annotations:map[everest.io/disk-volume-type:SATA volume.beta.kubernetes.io/storage-provisioner:everest-csi-provisioner] finalizers:[kubernetes.io/pvc-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-prometheus namespace:monitoring] spec:map[accessModes:[ReadWriteOnce] resources:map[requests:map[storage:10Gi]] storageClassName:csi-disk volumeMode:Filesystem volumeName:cce-evs-prometheus-pv]] | |
2022-04-13T09:49:30.067+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-grafana Unstructed YAML: map[apiVersion:v1 kind:PersistentVolumeClaim metadata:map[annotations:map[everest.io/disk-volume-type:SATA volume.beta.kubernetes.io/storage-provisioner:everest-csi-provisioner] finalizers:[kubernetes.io/pvc-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-grafana namespace:monitoring] spec:map[accessModes:[ReadWriteOnce] resources:map[requests:map[storage:10Gi]] storageClassName:csi-disk volumeMode:Filesystem volumeName:cce-evs-grafana-pv]] | |
2022-04-13T09:49:30.068+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-prometheus fetch from kubernetes | |
2022-04-13T09:49:30.068+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-grafana fetch from kubernetes | |
2022-04-13T09:49:30.095+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-prometheus Unstructed YAML: map[apiVersion:v1 kind:PersistentVolumeClaim metadata:map[annotations:map[everest.io/disk-volume-type:SATA volume.beta.kubernetes.io/storage-provisioner:everest-csi-provisioner] finalizers:[kubernetes.io/pvc-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-prometheus namespace:monitoring] spec:map[accessModes:[ReadWriteOnce] resources:map[requests:map[storage:10Gi]] storageClassName:csi-disk volumeMode:Filesystem volumeName:cce-evs-prometheus-pv]] | |
2022-04-13T09:49:30.095+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-prometheus Unstructed YAML: map[apiVersion:v1 kind:PersistentVolumeClaim metadata:map[annotations:map[everest.io/disk-volume-type:SATA volume.beta.kubernetes.io/storage-provisioner:everest-csi-provisioner] finalizers:[kubernetes.io/pvc-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-prometheus namespace:monitoring] spec:map[accessModes:[ReadWriteOnce] resources:map[requests:map[storage:10Gi]] storageClassName:csi-disk volumeMode:Filesystem volumeName:cce-evs-prometheus-pv]] | |
2022-04-13T09:49:30.096+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.prometheus_volume_pvc, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .force_conflicts: planned value cty.False for a non-computed attribute | |
- .validate_schema: planned value cty.True for a non-computed attribute | |
- .wait_for_rollout: planned value cty.True for a non-computed attribute | |
- .force_new: planned value cty.False for a non-computed attribute | |
- .server_side_apply: planned value cty.False for a non-computed attribute | |
- .apply_only: planned value cty.False for a non-computed attribute | |
2022-04-13T09:49:30.096+0200 [INFO] ReferenceTransformer: reference not found: "kubectl_manifest.prometheus_volume_pvc" | |
2022-04-13T09:49:30.096+0200 [INFO] ReferenceTransformer: reference not found: "kubectl_manifest.monitoring_secret_docker_pull" | |
2022-04-13T09:49:30.096+0200 [DEBUG] ReferenceTransformer: "helm_release.monitoring_prometheus" references: [] | |
2022-04-13T09:49:30.102+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-grafana Unstructed YAML: map[apiVersion:v1 kind:PersistentVolumeClaim metadata:map[annotations:map[everest.io/disk-volume-type:SATA volume.beta.kubernetes.io/storage-provisioner:everest-csi-provisioner] finalizers:[kubernetes.io/pvc-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-grafana namespace:monitoring] spec:map[accessModes:[ReadWriteOnce] resources:map[requests:map[storage:10Gi]] storageClassName:csi-disk volumeMode:Filesystem volumeName:cce-evs-grafana-pv]] | |
2022-04-13T09:49:30.102+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-grafana Unstructed YAML: map[apiVersion:v1 kind:PersistentVolumeClaim metadata:map[annotations:map[everest.io/disk-volume-type:SATA volume.beta.kubernetes.io/storage-provisioner:everest-csi-provisioner] finalizers:[kubernetes.io/pvc-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-grafana namespace:monitoring] spec:map[accessModes:[ReadWriteOnce] resources:map[requests:map[storage:10Gi]] storageClassName:csi-disk volumeMode:Filesystem volumeName:cce-evs-grafana-pv]] | |
2022-04-13T09:49:30.103+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.grafana_volume_pvc, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .force_new: planned value cty.False for a non-computed attribute | |
- .apply_only: planned value cty.False for a non-computed attribute | |
- .server_side_apply: planned value cty.False for a non-computed attribute | |
- .wait_for_rollout: planned value cty.True for a non-computed attribute | |
- .force_conflicts: planned value cty.False for a non-computed attribute | |
- .validate_schema: planned value cty.True for a non-computed attribute | |
helm_release.monitoring_prometheus: Refreshing state... [id=prometheus] | |
2022-04-13T09:49:30.107+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [resourceReleaseExists: prometheus] Start: timestamp=2022-04-13T09:49:30.107+0200 | |
2022-04-13T09:49:30.107+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:30.107+0200 | |
2022-04-13T09:49:30.108+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:30.108+0200 | |
2022-04-13T09:49:30.108+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:30.108+0200 | |
2022-04-13T09:49:30.108+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease wait for lock: timestamp=2022-04-13T09:49:30.108+0200 | |
2022-04-13T09:49:30.108+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease got lock, started: timestamp=2022-04-13T09:49:30.108+0200 | |
2022-04-13T09:49:30.108+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease post action created: timestamp=2022-04-13T09:49:30.108+0200 | |
2022-04-13T09:49:30.248+0200 [INFO] provider.terraform-provider-opentelekomcloud_v1.29.0: 2022/04/13 09:49:30 [DEBUG] Retrieved loadbalancer 7b0ba8d1-13ae-4409-ae33-073712bbe251: &loadbalancers.LoadBalancer{Description:"", AdminStateUp:true, TenantID:"bb084a5f9a2642a2be3697eb197f17ad", ProvisioningStatus:"ACTIVE", VipAddress:"192.168.1.182", VipPortID:"8987d026-8578-403b-80b3-f4cf4e553df2", VipSubnetID:"f7a7ee1f-455c-4b40-9968-f17340c45140", ID:"7b0ba8d1-13ae-4409-ae33-073712bbe251", OperatingStatus:"ONLINE", Name:"dLS-test-cce-elb", Flavor:"", Provider:"vlb", Listeners:[]listeners.Listener{listeners.Listener{ID:"67b9c2af-ac8f-451f-bb43-ac9a1a870c31", TenantID:"", Name:"", Description:"", Protocol:"", ProtocolPort:0, DefaultPoolID:"", Loadbalancers:[]listeners.LoadBalancerID(nil), ConnLimit:0, Http2Enable:false, SniContainerRefs:[]string(nil), CAContainerRef:"", DefaultTlsContainerRef:"", TlsCiphersPolicy:"", AdminStateUp:false, Pools:[]pools.Pool(nil), L7Policies:[]l7policies.L7Policy(nil), ProvisioningStatus:""}, listeners.Listener{ID:"04cc991b-427b-43d4-afa6-3eb8c23a13e9", TenantID:"", Name:"", Description:"", Protocol:"", ProtocolPort:0, DefaultPoolID:"", Loadbalancers:[]listeners.LoadBalancerID(nil), ConnLimit:0, Http2Enable:false, SniContainerRefs:[]string(nil), CAContainerRef:"", DefaultTlsContainerRef:"", TlsCiphersPolicy:"", AdminStateUp:false, Pools:[]pools.Pool(nil), L7Policies:[]l7policies.L7Policy(nil), ProvisioningStatus:""}}, Pools:[]pools.Pool{pools.Pool{LBMethod:"", Protocol:"", Description:"", Listeners:[]pools.ListenerID(nil), Members:[]pools.Member(nil), MonitorID:"", SubnetID:"", TenantID:"", AdminStateUp:false, Name:"", ID:"a0897881-4a15-47d7-97db-3b176f84ad0c", Loadbalancers:[]pools.LoadBalancerID(nil), Persistence:pools.SessionPersistence{Type:"", CookieName:""}, Provider:"", Monitor:monitors.Monitor{ID:"", Name:"", TenantID:"", Type:"", Delay:0, DomainName:"", Timeout:0, MaxRetries:0, HTTPMethod:"", URLPath:"", ExpectedCodes:"", AdminStateUp:false, MonitorPort:0, Status:"", Pools:[]monitors.PoolID(nil), ProvisioningStatus:""}, ProvisioningStatus:""}, pools.Pool{LBMethod:"", Protocol:"", Description:"", Listeners:[]pools.ListenerID(nil), Members:[]pools.Member(nil), MonitorID:"", SubnetID:"", TenantID:"", AdminStateUp:false, Name:"", ID:"0fd45f89-04e3-423c-bd00-5123ba201f43", Loadbalancers:[]pools.LoadBalancerID(nil), Persistence:pools.SessionPersistence{Type:"", CookieName:""}, Provider:"", Monitor:monitors.Monitor{ID:"", Name:"", TenantID:"", Type:"", Delay:0, DomainName:"", Timeout:0, MaxRetries:0, HTTPMethod:"", URLPath:"", ExpectedCodes:"", AdminStateUp:false, MonitorPort:0, Status:"", Pools:[]monitors.PoolID(nil), ProvisioningStatus:""}, ProvisioningStatus:""}}}: timestamp=2022-04-13T09:49:30.247+0200 | |
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease post run: timestamp=2022-04-13T09:49:30.451+0200 | |
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease done: timestamp=2022-04-13T09:49:30.451+0200 | |
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [resourceReleaseExists: prometheus] Done: timestamp=2022-04-13T09:49:30.451+0200 | |
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [resourceReleaseRead: prometheus] Started: timestamp=2022-04-13T09:49:30.451+0200 | |
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:30.451+0200 | |
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:30.452+0200 | |
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:30.452+0200 | |
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease wait for lock: timestamp=2022-04-13T09:49:30.452+0200 | |
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease got lock, started: timestamp=2022-04-13T09:49:30.452+0200 | |
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease post action created: timestamp=2022-04-13T09:49:30.452+0200 | |
2022-04-13T09:49:30.509+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease post run: timestamp=2022-04-13T09:49:30.509+0200 | |
2022-04-13T09:49:30.509+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease done: timestamp=2022-04-13T09:49:30.509+0200 | |
2022-04-13T09:49:30.510+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [resourceReleaseRead: prometheus] Done: timestamp=2022-04-13T09:49:30.510+0200 | |
2022-04-13T09:49:30.533+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [resourceDiff: prometheus] Start: timestamp=2022-04-13T09:49:30.533+0200 | |
2022-04-13T09:49:30.533+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:30.533+0200 | |
2022-04-13T09:49:30.533+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:30.533+0200 | |
2022-04-13T09:49:30.533+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:30.533+0200 | |
2022-04-13T09:49:30.695+0200 [WARN] Provider "registry.terraform.io/opentelekomcloud/opentelekomcloud" produced an invalid plan for opentelekomcloud_lb_loadbalancer_v2.cce_elb, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .description: planned value cty.StringVal("") for a non-computed attribute | |
- .admin_state_up: planned value cty.True for a non-computed attribute | |
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "var.application" | |
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "var.env" | |
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "var.env" | |
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "var.cce_ingress_bandwidth" | |
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "var.application" | |
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "var.env" | |
2022-04-13T09:49:30.695+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_vpc_eip_v1.cce_ingress_eip" references: [] | |
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "kubectl_manifest.ingress_secret_docker_pull" | |
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "var.cce_node_pool_initial_node_count" | |
2022-04-13T09:49:30.695+0200 [DEBUG] ReferenceTransformer: "helm_release.ingress_nginx" references: [] | |
opentelekomcloud_vpc_eip_v1.cce_ingress_eip: Refreshing state... [id=0a16b98f-7297-4639-a35a-80fdcf4fb864] | |
helm_release.ingress_nginx: Refreshing state... [id=ingress-nginx] | |
2022-04-13T09:49:30.698+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [resourceReleaseExists: ingress-nginx] Start: timestamp=2022-04-13T09:49:30.698+0200 | |
2022-04-13T09:49:31.278+0200 [WARN] Provider "registry.terraform.io/opentelekomcloud/opentelekomcloud" produced an invalid plan for opentelekomcloud_cce_node_pool_v3.cce_node_pool, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .root_volume[0].extend_param: planned value cty.StringVal("") for a non-computed attribute | |
- .data_volumes[0].extend_param: planned value cty.StringVal("") for a non-computed attribute | |
- .data_volumes[0].kms_id: planned value cty.StringVal("") for a non-computed attribute | |
2022-04-13T09:49:31.468+0200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2022-04-13T09:49:31.472+0200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/opentelekomcloud/opentelekomcloud/1.29.0/darwin_amd64/terraform-provider-opentelekomcloud_v1.29.0 pid=5226 | |
2022-04-13T09:49:31.472+0200 [DEBUG] provider: plugin exited | |
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] [resourceDiff: prometheus] Got chart: timestamp=2022-04-13T09:49:32.953+0200 | |
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:32.953+0200 | |
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] [resourceDiff: prometheus] Release validated: timestamp=2022-04-13T09:49:32.953+0200 | |
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] [resourceDiff: prometheus] Done: timestamp=2022-04-13T09:49:32.953+0200 | |
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:32.953+0200 | |
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:32.953+0200 | |
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] ingress-nginx getRelease wait for lock: timestamp=2022-04-13T09:49:32.953+0200 | |
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] ingress-nginx getRelease got lock, started: timestamp=2022-04-13T09:49:32.953+0200 | |
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] ingress-nginx getRelease post action created: timestamp=2022-04-13T09:49:32.953+0200 | |
2022-04-13T09:49:32.954+0200 [WARN] Provider "registry.terraform.io/hashicorp/helm" produced an invalid plan for helm_release.monitoring_prometheus, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .recreate_pods: planned value cty.False for a non-computed attribute | |
- .dependency_update: planned value cty.False for a non-computed attribute | |
- .max_history: planned value cty.NumberIntVal(0) for a non-computed attribute | |
- .verify: planned value cty.False for a non-computed attribute | |
- .force_update: planned value cty.False for a non-computed attribute | |
- .skip_crds: planned value cty.False for a non-computed attribute | |
- .wait: planned value cty.True for a non-computed attribute | |
- .disable_openapi_validation: planned value cty.False for a non-computed attribute | |
- .reset_values: planned value cty.False for a non-computed attribute | |
- .reuse_values: planned value cty.False for a non-computed attribute | |
- .cleanup_on_fail: planned value cty.False for a non-computed attribute | |
- .replace: planned value cty.False for a non-computed attribute | |
- .atomic: planned value cty.False for a non-computed attribute | |
- .render_subchart_notes: planned value cty.True for a non-computed attribute | |
- .wait_for_jobs: planned value cty.False for a non-computed attribute | |
- .create_namespace: planned value cty.False for a non-computed attribute | |
- .disable_crd_hooks: planned value cty.False for a non-computed attribute | |
- .disable_webhooks: planned value cty.False for a non-computed attribute | |
- .timeout: planned value cty.NumberIntVal(300) for a non-computed attribute | |
- .lint: planned value cty.False for a non-computed attribute | |
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] ingress-nginx getRelease post run: timestamp=2022-04-13T09:49:33.066+0200 | |
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] ingress-nginx getRelease done: timestamp=2022-04-13T09:49:33.066+0200 | |
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [resourceReleaseExists: ingress-nginx] Done: timestamp=2022-04-13T09:49:33.066+0200 | |
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [resourceReleaseRead: ingress-nginx] Started: timestamp=2022-04-13T09:49:33.066+0200 | |
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:33.066+0200 | |
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:33.066+0200 | |
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:33.066+0200 | |
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] ingress-nginx getRelease wait for lock: timestamp=2022-04-13T09:49:33.066+0200 | |
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] ingress-nginx getRelease got lock, started: timestamp=2022-04-13T09:49:33.066+0200 | |
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] ingress-nginx getRelease post action created: timestamp=2022-04-13T09:49:33.066+0200 | |
2022-04-13T09:49:33.129+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] ingress-nginx getRelease post run: timestamp=2022-04-13T09:49:33.129+0200 | |
2022-04-13T09:49:33.129+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] ingress-nginx getRelease done: timestamp=2022-04-13T09:49:33.129+0200 | |
2022-04-13T09:49:33.129+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [resourceReleaseRead: ingress-nginx] Done: timestamp=2022-04-13T09:49:33.129+0200 | |
2022-04-13T09:49:33.134+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [resourceDiff: ingress-nginx] Start: timestamp=2022-04-13T09:49:33.134+0200 | |
2022-04-13T09:49:33.134+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:33.134+0200 | |
2022-04-13T09:49:33.134+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:33.134+0200 | |
2022-04-13T09:49:33.134+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:33.134+0200 | |
2022-04-13T09:49:35.271+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceDiff: ingress-nginx] Got chart: timestamp=2022-04-13T09:49:35.271+0200 | |
2022-04-13T09:49:35.271+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceDiff: ingress-nginx] Release validated: timestamp=2022-04-13T09:49:35.271+0200 | |
2022-04-13T09:49:35.271+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceDiff: ingress-nginx] Done: timestamp=2022-04-13T09:49:35.271+0200 | |
2022-04-13T09:49:35.272+0200 [WARN] Provider "registry.terraform.io/hashicorp/helm" produced an invalid plan for helm_release.ingress_nginx, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .lint: planned value cty.False for a non-computed attribute | |
- .timeout: planned value cty.NumberIntVal(300) for a non-computed attribute | |
- .dependency_update: planned value cty.False for a non-computed attribute | |
- .max_history: planned value cty.NumberIntVal(0) for a non-computed attribute | |
- .recreate_pods: planned value cty.False for a non-computed attribute | |
- .force_update: planned value cty.False for a non-computed attribute | |
- .skip_crds: planned value cty.False for a non-computed attribute | |
- .verify: planned value cty.False for a non-computed attribute | |
- .disable_openapi_validation: planned value cty.False for a non-computed attribute | |
- .reset_values: planned value cty.False for a non-computed attribute | |
- .wait: planned value cty.True for a non-computed attribute | |
- .cleanup_on_fail: planned value cty.False for a non-computed attribute | |
- .reuse_values: planned value cty.False for a non-computed attribute | |
- .atomic: planned value cty.False for a non-computed attribute | |
- .render_subchart_notes: planned value cty.True for a non-computed attribute | |
- .replace: planned value cty.False for a non-computed attribute | |
- .wait_for_jobs: planned value cty.False for a non-computed attribute | |
- .create_namespace: planned value cty.False for a non-computed attribute | |
- .disable_crd_hooks: planned value cty.False for a non-computed attribute | |
- .disable_webhooks: planned value cty.False for a non-computed attribute | |
2022-04-13T09:49:35.272+0200 [INFO] ReferenceTransformer: reference not found: "helm_release.ingress_nginx" | |
2022-04-13T09:49:35.272+0200 [DEBUG] ReferenceTransformer: "helm_release.ingress_certmanager" references: [] | |
helm_release.ingress_certmanager: Refreshing state... [id=cert-manager] | |
2022-04-13T09:49:35.275+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceReleaseExists: cert-manager] Start: timestamp=2022-04-13T09:49:35.275+0200 | |
2022-04-13T09:49:35.275+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:35.275+0200 | |
2022-04-13T09:49:35.275+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:35.275+0200 | |
2022-04-13T09:49:35.275+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:35.275+0200 | |
2022-04-13T09:49:35.275+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease wait for lock: timestamp=2022-04-13T09:49:35.275+0200 | |
2022-04-13T09:49:35.275+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease got lock, started: timestamp=2022-04-13T09:49:35.275+0200 | |
2022-04-13T09:49:35.275+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease post action created: timestamp=2022-04-13T09:49:35.275+0200 | |
2022-04-13T09:49:35.415+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease post run: timestamp=2022-04-13T09:49:35.415+0200 | |
2022-04-13T09:49:35.415+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease done: timestamp=2022-04-13T09:49:35.415+0200 | |
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceReleaseExists: cert-manager] Done: timestamp=2022-04-13T09:49:35.415+0200 | |
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceReleaseRead: cert-manager] Started: timestamp=2022-04-13T09:49:35.415+0200 | |
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:35.415+0200 | |
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:35.416+0200 | |
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:35.416+0200 | |
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease wait for lock: timestamp=2022-04-13T09:49:35.416+0200 | |
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease got lock, started: timestamp=2022-04-13T09:49:35.416+0200 | |
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease post action created: timestamp=2022-04-13T09:49:35.416+0200 | |
2022-04-13T09:49:35.520+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease post run: timestamp=2022-04-13T09:49:35.520+0200 | |
2022-04-13T09:49:35.520+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease done: timestamp=2022-04-13T09:49:35.520+0200 | |
2022-04-13T09:49:35.520+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceReleaseRead: cert-manager] Done: timestamp=2022-04-13T09:49:35.520+0200 | |
2022-04-13T09:49:35.523+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceDiff: cert-manager] Start: timestamp=2022-04-13T09:49:35.523+0200 | |
2022-04-13T09:49:35.523+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:35.523+0200 | |
2022-04-13T09:49:35.523+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:35.523+0200 | |
2022-04-13T09:49:35.523+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:35.523+0200 | |
2022-04-13T09:49:37.300+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:37 [DEBUG] [resourceDiff: cert-manager] Got chart: timestamp=2022-04-13T09:49:37.300+0200 | |
2022-04-13T09:49:37.300+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:37 [DEBUG] [resourceDiff: cert-manager] Release validated: timestamp=2022-04-13T09:49:37.300+0200 | |
2022-04-13T09:49:37.300+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:37 [DEBUG] [resourceDiff: cert-manager] Done: timestamp=2022-04-13T09:49:37.300+0200 | |
2022-04-13T09:49:37.300+0200 [WARN] Provider "registry.terraform.io/hashicorp/helm" produced an invalid plan for helm_release.ingress_certmanager, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .reuse_values: planned value cty.False for a non-computed attribute | |
- .cleanup_on_fail: planned value cty.False for a non-computed attribute | |
- .render_subchart_notes: planned value cty.True for a non-computed attribute | |
- .replace: planned value cty.False for a non-computed attribute | |
- .atomic: planned value cty.False for a non-computed attribute | |
- .disable_webhooks: planned value cty.False for a non-computed attribute | |
- .wait_for_jobs: planned value cty.False for a non-computed attribute | |
- .create_namespace: planned value cty.False for a non-computed attribute | |
- .disable_crd_hooks: planned value cty.False for a non-computed attribute | |
- .timeout: planned value cty.NumberIntVal(300) for a non-computed attribute | |
- .lint: planned value cty.False for a non-computed attribute | |
- .recreate_pods: planned value cty.False for a non-computed attribute | |
- .dependency_update: planned value cty.False for a non-computed attribute | |
- .max_history: planned value cty.NumberIntVal(0) for a non-computed attribute | |
- .skip_crds: planned value cty.False for a non-computed attribute | |
- .verify: planned value cty.False for a non-computed attribute | |
- .force_update: planned value cty.False for a non-computed attribute | |
- .reset_values: planned value cty.False for a non-computed attribute | |
- .wait: planned value cty.True for a non-computed attribute | |
- .disable_openapi_validation: planned value cty.False for a non-computed attribute | |
2022-04-13T09:49:37.301+0200 [INFO] ReferenceTransformer: reference not found: "helm_release.ingress_certmanager" | |
2022-04-13T09:49:37.301+0200 [INFO] ReferenceTransformer: reference not found: "var.letsencrypt_email" | |
2022-04-13T09:49:37.301+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.letsencrypt_staging_issuer" references: [] | |
2022-04-13T09:49:37.301+0200 [INFO] ReferenceTransformer: reference not found: "helm_release.ingress_certmanager" | |
2022-04-13T09:49:37.301+0200 [INFO] ReferenceTransformer: reference not found: "var.letsencrypt_email" | |
2022-04-13T09:49:37.301+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.letsencrypt_prod_issuer" references: [] | |
2022-04-13T09:49:37.301+0200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2022-04-13T09:49:37.335+0200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/helm/2.5.0/darwin_amd64/terraform-provider-helm_v2.5.0_x5 pid=5232 | |
2022-04-13T09:49:37.335+0200 [DEBUG] provider: plugin exited | |
kubectl_manifest.letsencrypt_prod_issuer: Refreshing state... [id=/apis/cert-manager.io/v1/clusterissuers/letsencrypt-prod] | |
kubectl_manifest.letsencrypt_staging_issuer: Refreshing state... [id=/apis/cert-manager.io/v1/clusterissuers/letsencrypt-staging] | |
2022-04-13T09:49:37.336+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-staging Unstructed YAML: map[apiVersion:cert-manager.io/v1 kind:ClusterIssuer metadata:map[name:letsencrypt-staging namespace:ingress-nginx] spec:map[acme:map[email:[email protected] privateKeySecretRef:map[name:letsencrypt-staging-accountkey] server:https://acme-staging-v02.api.letsencrypt.org/directory solvers:[map[http01:map[ingress:map[class:nginx]]]]]]] | |
2022-04-13T09:49:37.336+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-prod Unstructed YAML: map[apiVersion:cert-manager.io/v1 kind:ClusterIssuer metadata:map[name:letsencrypt-prod namespace:ingress-nginx] spec:map[acme:map[email:[email protected] privateKeySecretRef:map[name:letsencrypt-prod-accountkey] server:https://acme-v02.api.letsencrypt.org/directory solvers:[map[http01:map[ingress:map[class:nginx]]]]]]] | |
2022-04-13T09:49:37.338+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-staging fetch from kubernetes | |
2022-04-13T09:49:37.338+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-prod fetch from kubernetes | |
2022-04-13T09:49:37.363+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [TRACE] yaml drift detected in /apis/cert-manager.io/v1/namespaces/ingress-nginx/clusterissuers/letsencrypt-staging for metadata.namespace, was ingress-nginx now blank | |
2022-04-13T09:49:37.366+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-staging Unstructed YAML: map[apiVersion:cert-manager.io/v1 kind:ClusterIssuer metadata:map[name:letsencrypt-staging namespace:ingress-nginx] spec:map[acme:map[email:[email protected] privateKeySecretRef:map[name:letsencrypt-staging-accountkey] server:https://acme-staging-v02.api.letsencrypt.org/directory solvers:[map[http01:map[ingress:map[class:nginx]]]]]]] | |
2022-04-13T09:49:37.366+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-staging Unstructed YAML: map[apiVersion:cert-manager.io/v1 kind:ClusterIssuer metadata:map[name:letsencrypt-staging namespace:ingress-nginx] spec:map[acme:map[email:[email protected] privateKeySecretRef:map[name:letsencrypt-staging-accountkey] server:https://acme-staging-v02.api.letsencrypt.org/directory solvers:[map[http01:map[ingress:map[class:nginx]]]]]]] | |
2022-04-13T09:49:37.366+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.letsencrypt_staging_issuer, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .force_new: planned value cty.False for a non-computed attribute | |
- .server_side_apply: planned value cty.False for a non-computed attribute | |
- .apply_only: planned value cty.False for a non-computed attribute | |
- .validate_schema: planned value cty.True for a non-computed attribute | |
- .wait_for_rollout: planned value cty.True for a non-computed attribute | |
- .force_conflicts: planned value cty.False for a non-computed attribute | |
2022-04-13T09:49:37.370+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [TRACE] yaml drift detected in /apis/cert-manager.io/v1/namespaces/ingress-nginx/clusterissuers/letsencrypt-prod for metadata.namespace, was ingress-nginx now blank | |
2022-04-13T09:49:37.373+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-prod Unstructed YAML: map[apiVersion:cert-manager.io/v1 kind:ClusterIssuer metadata:map[name:letsencrypt-prod namespace:ingress-nginx] spec:map[acme:map[email:[email protected] privateKeySecretRef:map[name:letsencrypt-prod-accountkey] server:https://acme-v02.api.letsencrypt.org/directory solvers:[map[http01:map[ingress:map[class:nginx]]]]]]] | |
2022-04-13T09:49:37.373+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-prod Unstructed YAML: map[apiVersion:cert-manager.io/v1 kind:ClusterIssuer metadata:map[name:letsencrypt-prod namespace:ingress-nginx] spec:map[acme:map[email:[email protected] privateKeySecretRef:map[name:letsencrypt-prod-accountkey] server:https://acme-v02.api.letsencrypt.org/directory solvers:[map[http01:map[ingress:map[class:nginx]]]]]]] | |
2022-04-13T09:49:37.373+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.letsencrypt_prod_issuer, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .apply_only: planned value cty.False for a non-computed attribute | |
- .server_side_apply: planned value cty.False for a non-computed attribute | |
- .wait_for_rollout: planned value cty.True for a non-computed attribute | |
- .force_conflicts: planned value cty.False for a non-computed attribute | |
- .validate_schema: planned value cty.True for a non-computed attribute | |
- .force_new: planned value cty.False for a non-computed attribute | |
2022-04-13T09:49:37.374+0200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2022-04-13T09:49:37.377+0200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/gavinbunney/kubectl/1.14.0/darwin_amd64/terraform-provider-kubectl_v1.14.0 pid=5231 | |
2022-04-13T09:49:37.377+0200 [DEBUG] provider: plugin exited | |
Terraform used the selected providers to generate the following execution | |
plan. Resource actions are indicated with the following symbols: | |
+ create | |
Terraform will perform the following actions: | |
2022-04-13T09:49:37.378+0200 [DEBUG] command: asking for input: "\nDo you want to perform these actions?" | |
# opentelekomcloud_dns_recordset_v2.k8s_api_record will be created | |
+ resource "opentelekomcloud_dns_recordset_v2" "k8s_api_record" { | |
+ description = "The A record for the CCE k8s API" | |
+ id = (known after apply) | |
+ name = "k8s.test.cloud4log.dev" | |
+ records = [ | |
+ "https://80.158.88.119:5443", | |
] | |
+ region = (known after apply) | |
+ shared = false | |
+ tags = { | |
+ "Application" = "dLS" | |
+ "Environment" = "test" | |
+ "Name" = "cloud4log-dev-test-k8s-api-record" | |
} | |
+ ttl = 3600 | |
+ type = "A" | |
+ zone_id = "ff80808275f5fc0f018021c4af121480" | |
} | |
Plan: 1 to add, 0 to change, 0 to destroy. | |
Do you want to perform these actions? | |
Terraform will perform the actions described above. | |
Only 'yes' will be accepted to approve. | |
Enter a value: yes | |
2022-04-13T09:49:39.529+0200 [INFO] backend/local: apply calling Apply | |
2022-04-13T09:49:39.529+0200 [DEBUG] Building and walking apply graph for NormalMode plan | |
2022-04-13T09:49:39.532+0200 [DEBUG] Resource state not found for node "opentelekomcloud_dns_recordset_v2.k8s_api_record", instance opentelekomcloud_dns_recordset_v2.k8s_api_record | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.prometheus_volume_pv (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_evs_volume_v3.prometheus_volume (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.fluentd_serviceaccount (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.grafana_volume_pvc (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_vpc_subnet_v1.subnet (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_networking_secgroup_rule_v2.css_rule_inbound_icmp (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_compute_keypair_v2.cce_node_keypair (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "helm_release.monitoring_prometheus (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/helm"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.monitoring_secret_docker_pull (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubernetes_namespace.ingress_namespace (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/kubernetes"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.grafana_volume_pv (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "data.template_file.kubeconfig (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/template"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_evs_volume_v3.grafana_volume (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_lb_loadbalancer_v2.cce_elb (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.letsencrypt_staging_issuer (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_vpc_eip_v1.cce_cli_eip (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_cce_node_pool_v3.cce_node_pool (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_css_cluster_v1.css (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "helm_release.ingress_nginx (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/helm"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "local_sensitive_file.privkey (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/local"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_dns_zone_v2.public_dns (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.fluentd-clusterrolebinding (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_cce_addon_v3.cce_autoscaler_addon (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "helm_release.ingress_certmanager (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/helm"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_cce_cluster_v3.cce (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.fluentd-daemonset (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.prometheus_volume_pvc (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "local_sensitive_file.kubeconfig (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/local"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_networking_secgroup_v2.css_secgroup (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.ingress_secret_docker_pull (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_networking_secgroup_rule_v2.css_rule_css_inbound_9200 (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.letsencrypt_prod_issuer (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_vpc_v1.vpc (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.fluentd_clusterrole (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.monitoring_secret_basic_auth (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubernetes_namespace.monitoring_namespace (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/kubernetes"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "random_password.css_admin_password (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/random"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_dns_recordset_v2.k8s_api_record (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_dns_recordset_v2.k8s_api_record" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_vpc_eip_v1.cce_ingress_eip (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_networking_secgroup_rule_v2.css_rule_inbound_9300 (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"] | |
2022-04-13T09:49:39.535+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_initial_node_count" references: [] | |
2022-04-13T09:49:39.535+0200 [DEBUG] ReferenceTransformer: "var.env" references: [] | |
2022-04-13T09:49:39.535+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_root_volumetype" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_vpc_eip_v1.cce_ingress_eip (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.letsencrypt_prod_issuer (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.prometheus_volume_pvc (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_vpc_v1.vpc (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "output.dns_info" references: [var.env var.dns_domain] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/kubernetes\"]" references: [opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand)] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_networking_secgroup_rule_v2.css_rule_inbound_icmp (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.grafana_volume_size" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_max_node_count" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/helm\"]" references: [opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand)] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_networking_secgroup_v2.css_secgroup (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.ingress_secret_docker_pull (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.domain_name" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_subnet_cidr" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "output.css_indexpattern_notify" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_dns_zone_v2.public_dns (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.css_flavor" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/gavinbunney/kubectl\"]" references: [opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand)] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.fluentd-clusterrolebinding (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "local_sensitive_file.kubeconfig (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.fluentd_serviceaccount (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_subnet_gateway_ip" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_min_node_count" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.OTC_ACCESS_KEY" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_cce_node_pool_v3.cce_node_pool (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "helm_release.ingress_nginx (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_cce_addon_v3.cce_autoscaler_addon (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_data_volumetype" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_flavor" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "output.cce_ingress_ip_address" references: [opentelekomcloud_vpc_eip_v1.cce_ingress_eip (expand)] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_networking_secgroup_rule_v2.css_rule_inbound_9300 (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_css_cluster_v1.css (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.fluentd_clusterrole (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.monitoring_secret_basic_auth (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.grafana_volume_pv (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.application" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubernetes_namespace.monitoring_namespace (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.grafana_volume_pvc (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_scale_down_cooldown_time" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.OTC_SECRET_KEY" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.letsencrypt_email" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_ingress_bandwidth" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_compute_keypair_v2.cce_node_keypair (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_evs_volume_v3.grafana_volume (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.prometheus_volume_pv (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.css_volume_size" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.dns_admin_email" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.dns_domain" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.vpc_cidr" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_lb_loadbalancer_v2.cce_elb (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "helm_release.ingress_certmanager (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_evs_volume_v3.prometheus_volume (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "data.template_file.kubeconfig (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_root_volume_size" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.prometheus_volume_size" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "output.cce_cli_ip_address" references: [opentelekomcloud_vpc_eip_v1.cce_cli_eip (expand)] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_data_volumes_size" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/local\"]" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "helm_release.monitoring_prometheus (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "random_password.css_admin_password (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.monitoring_secret_docker_pull (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_cce_cluster_v3.cce (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_dns_recordset_v2.k8s_api_record (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_availability_zone" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/random\"]" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "local_sensitive_file.privkey (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.letsencrypt_staging_issuer (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.tenant_name" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.fluentd-daemonset (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_vpc_subnet_v1.subnet (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_vpc_eip_v1.cce_cli_eip (expand)" references: [] | |
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "output.css_admin_password" references: [random_password.css_admin_password (expand)] | |
2022-04-13T09:49:39.537+0200 [INFO] ReferenceTransformer: reference not found: "opentelekomcloud_cce_cluster_v3.cce#destroy" | |
2022-04-13T09:49:39.537+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_dns_recordset_v2.k8s_api_record" references: [opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_dns_zone_v2.public_dns (expand) var.dns_domain var.env var.application var.env var.env var.dns_domain] | |
2022-04-13T09:49:39.537+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/template\"]" references: [] | |
2022-04-13T09:49:39.537+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_networking_secgroup_rule_v2.css_rule_css_inbound_9200 (expand)" references: [] | |
2022-04-13T09:49:39.537+0200 [DEBUG] ReferenceTransformer: "kubernetes_namespace.ingress_namespace (expand)" references: [] | |
2022-04-13T09:49:39.537+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_flavor" references: [] | |
2022-04-13T09:49:39.537+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/opentelekomcloud/opentelekomcloud\"]" references: [var.OTC_SECRET_KEY var.domain_name var.tenant_name var.OTC_ACCESS_KEY] | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: helm_release.ingress_nginx (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_cce_addon_v3.cce_autoscaler_addon (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_cce_node_pool_v3.cce_node_pool (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_css_cluster_v1.css (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.fluentd_clusterrole (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.monitoring_secret_basic_auth (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.grafana_volume_pv (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_networking_secgroup_rule_v2.css_rule_inbound_9300 (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.grafana_volume_pvc (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubernetes_namespace.monitoring_namespace (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_evs_volume_v3.grafana_volume (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.prometheus_volume_pv (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_compute_keypair_v2.cce_node_keypair (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: helm_release.ingress_certmanager (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_evs_volume_v3.prometheus_volume (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: data.template_file.kubeconfig (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_lb_loadbalancer_v2.cce_elb (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: random_password.css_admin_password (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.monitoring_secret_docker_pull (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: helm_release.monitoring_prometheus (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: provider["registry.terraform.io/hashicorp/random"] is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.letsencrypt_staging_issuer (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: local_sensitive_file.privkey (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_vpc_subnet_v1.subnet (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_vpc_eip_v1.cce_cli_eip (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: provider["registry.terraform.io/hashicorp/template"] is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.fluentd-daemonset (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubernetes_namespace.ingress_namespace (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.fluentd-clusterrolebinding (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.fluentd_serviceaccount (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: local_sensitive_file.kubeconfig (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_networking_secgroup_v2.css_secgroup (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.ingress_secret_docker_pull (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_networking_secgroup_rule_v2.css_rule_inbound_icmp (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: provider["registry.terraform.io/hashicorp/helm"] is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_vpc_eip_v1.cce_ingress_eip (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: provider["registry.terraform.io/hashicorp/local"] is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: provider["registry.terraform.io/hashicorp/kubernetes"] is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_vpc_v1.vpc (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_networking_secgroup_rule_v2.css_rule_css_inbound_9200 (expand) is no longer needed, removing | |
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.letsencrypt_prod_issuer (expand) is no longer needed, removing | |
2022-04-13T09:49:39.539+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.prometheus_volume_pvc (expand) is no longer needed, removing | |
2022-04-13T09:49:39.539+0200 [DEBUG] pruneUnusedNodes: provider["registry.terraform.io/gavinbunney/kubectl"] is no longer needed, removing | |
2022-04-13T09:49:39.540+0200 [DEBUG] Starting graph walk: walkApply | |
2022-04-13T09:49:39.546+0200 [DEBUG] created provider logger: level=debug | |
2022-04-13T09:49:39.546+0200 [INFO] provider: configuring client automatic mTLS | |
2022-04-13T09:49:39.563+0200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/opentelekomcloud/opentelekomcloud/1.29.0/darwin_amd64/terraform-provider-opentelekomcloud_v1.29.0 args=[.terraform/providers/registry.terraform.io/opentelekomcloud/opentelekomcloud/1.29.0/darwin_amd64/terraform-provider-opentelekomcloud_v1.29.0] | |
2022-04-13T09:49:39.568+0200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/opentelekomcloud/opentelekomcloud/1.29.0/darwin_amd64/terraform-provider-opentelekomcloud_v1.29.0 pid=5240 | |
2022-04-13T09:49:39.569+0200 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/opentelekomcloud/opentelekomcloud/1.29.0/darwin_amd64/terraform-provider-opentelekomcloud_v1.29.0 | |
2022-04-13T09:49:39.585+0200 [INFO] provider.terraform-provider-opentelekomcloud_v1.29.0: configuring server automatic mTLS: timestamp=2022-04-13T09:49:39.584+0200 | |
2022-04-13T09:49:39.619+0200 [DEBUG] provider.terraform-provider-opentelekomcloud_v1.29.0: plugin address: address=/var/folders/9x/_9sr4dkx4s133y82cbvmzfqr0000gn/T/plugin205929039 network=unix timestamp=2022-04-13T09:49:39.619+0200 | |
2022-04-13T09:49:39.619+0200 [DEBUG] provider: using plugin: version=5 | |
2022-04-13T09:49:39.677+0200 [WARN] ValidateProviderConfig from "provider[\"registry.terraform.io/opentelekomcloud/opentelekomcloud\"]" changed the config value, but that value is unused | |
2022-04-13T09:49:41.046+0200 [INFO] provider.terraform-provider-opentelekomcloud_v1.29.0: 2022/04/13 09:49:41 [INFO] Building Swift S3 auth structure: timestamp=2022-04-13T09:49:41.046+0200 | |
2022-04-13T09:49:41.046+0200 [INFO] provider.terraform-provider-opentelekomcloud_v1.29.0: 2022/04/13 09:49:41 [INFO] Setting AWS metadata API timeout to 100ms: timestamp=2022-04-13T09:49:41.046+0200 | |
2022-04-13T09:49:42.475+0200 [INFO] provider.terraform-provider-opentelekomcloud_v1.29.0: 2022/04/13 09:49:42 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id: timestamp=2022-04-13T09:49:42.474+0200 | |
2022-04-13T09:49:42.475+0200 [INFO] provider.terraform-provider-opentelekomcloud_v1.29.0: 2022/04/13 09:49:42 [INFO] Swift S3 Auth provider used: "StaticProvider": timestamp=2022-04-13T09:49:42.475+0200 | |
opentelekomcloud_dns_recordset_v2.k8s_api_record: Creating... | |
2022-04-13T09:49:43.019+0200 [INFO] Starting apply for opentelekomcloud_dns_recordset_v2.k8s_api_record | |
2022-04-13T09:49:43.020+0200 [DEBUG] opentelekomcloud_dns_recordset_v2.k8s_api_record: applying the planned Create change | |
2022-04-13T09:49:43.021+0200 [INFO] provider.terraform-provider-opentelekomcloud_v1.29.0: 2022/04/13 09:49:43 [DEBUG] Create Options: dns.RecordSetCreateOpts{CreateOpts:recordsets.CreateOpts{Name:"k8s.test.cloud4log.dev", Description:"The A record for the CCE k8s API", Records:[]string{"https://80.158.88.119:5443"}, TTL:3600, Type:"A"}, ValueSpecs:map[string]string{}}: timestamp=2022-04-13T09:49:43.021+0200 | |
2022-04-13T09:49:43.306+0200 [ERROR] vertex "opentelekomcloud_dns_recordset_v2.k8s_api_record" error: error creating OpenTelekomCloud DNS record set: Bad request with: [POST https://dns.eu-de.otc.t-systems.com/v2/zones/ff80808275f5fc0f018021c4af121480/recordsets], error message: {"code":"DNS.0308","message":"Attribute 'records' is invalid. When type is 'A', records should be ipv4 address list."} | |
╷ | |
│ Error: error creating OpenTelekomCloud DNS record set: Bad request with: [POST https://dns.eu-de.otc.t-systems.com/v2/zones/ff80808275f5fc0f018021c4af121480/recordsets], error message: {"code":"DNS.0308","message":"Attribute 'records' is invalid. When type is 'A', records should be ipv4 address list."} | |
│ | |
│ with opentelekomcloud_dns_recordset_v2.k8s_api_record, | |
│ on dns.tf line 14, in resource "opentelekomcloud_dns_recordset_v2" "k8s_api_record": | |
│ 14: resource "opentelekomcloud_dns_recordset_v2" "k8s_api_record" { | |
│ | |
╵ | |
2022-04-13T09:49:43.345+0200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2022-04-13T09:49:43.348+0200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/opentelekomcloud/opentelekomcloud/1.29.0/darwin_amd64/terraform-provider-opentelekomcloud_v1.29.0 pid=5240 | |
2022-04-13T09:49:43.348+0200 [DEBUG] provider: plugin exited |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment