Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 5 error(s) occurred:
- * plan operation: Real and shadow states do not match! Real state:
- <no state>
- module.child:
- <no state>
- Outputs:
- received = 1GB
- module.instances:
- aws_eip.zk.0:
- ID = eipalloc-3eb04400
- association_id = eipassoc-b5def18a
- domain = vpc
- instance = 74D93920-ED26-11E3-AC10-0800200C9A66
- network_interface = eni-a3aae15d
- private_ip = 10.0.1.231
- public_ip = 34.194.147.231
- vpc = true
- Dependencies:
- aws_instance.zk_node
- aws_instance.priv_networktest:
- ID = i-6ec81f79
- ami = ami-02417f15
- associate_public_ip_address = false
- availability_zone = us-east-1b
- disable_api_termination = false
- ebs_block_device.# = 0
- ebs_optimized = false
- ephemeral_block_device.# = 0
- iam_instance_profile =
- instance_state = running
- instance_type = t2.micro
- key_name = test-infrastructure
- monitoring = false
- network_interface_id = eni-bba9e245
- private_dns = ip-10-0-1-46.ec2.internal
- private_ip = 10.0.1.46
- public_dns =
- public_ip =
- root_block_device.# = 1
- root_block_device.0.delete_on_termination = true
- root_block_device.0.iops = 100
- root_block_device.0.volume_size = 8
- root_block_device.0.volume_type = gp2
- security_groups.# = 0
- source_dest_check = true
- subnet_id = subnet-7d992750
- tags.% = 1
- tags.Name = priv_networktest
- tenancy = default
- vpc_security_group_ids.# = 1
- vpc_security_group_ids.699898438 = sg-f7470d8a
- Dependencies:
- aws_security_group.pub_networktest_sg
- aws_instance.pub_networktest:
- ID = i-69c81f7e
- ami = ami-02417f15
- associate_public_ip_address = true
- availability_zone = us-east-1b
- disable_api_termination = false
- ebs_block_device.# = 0
- ebs_optimized = false
- ephemeral_block_device.# = 0
- iam_instance_profile =
- instance_state = running
- instance_type = t2.micro
- key_name = test-infrastructure
- monitoring = false
- network_interface_id = eni-8fade671
- private_dns = ip-10-0-0-61.ec2.internal
- private_ip = 10.0.0.61
- public_dns = ec2-54-90-79-184.compute-1.amazonaws.com
- public_ip = 54.90.79.184
- root_block_device.# = 1
- root_block_device.0.delete_on_termination = true
- root_block_device.0.iops = 100
- root_block_device.0.volume_size = 8
- root_block_device.0.volume_type = gp2
- security_groups.# = 0
- source_dest_check = true
- subnet_id = subnet-6299274f
- tags.% = 1
- tags.Name = pub_networktest
- tenancy = default
- vpc_security_group_ids.# = 1
- vpc_security_group_ids.699898438 = sg-f7470d8a
- Dependencies:
- aws_security_group.pub_networktest_sg
- aws_instance.pub_odrive:
- ID = i-c634fdd1
- ami = ami-bcd0d7ab
- associate_public_ip_address = true
- availability_zone = us-east-1b
- disable_api_termination = false
- ebs_block_device.# = 0
- ebs_optimized = false
- ephemeral_block_device.# = 0
- iam_instance_profile =
- instance_state = running
- instance_type = t2.micro
- key_name = test-infrastructure
- monitoring = false
- network_interface_id = eni-118df1ef
- private_dns = ip-10-0-0-22.ec2.internal
- private_ip = 10.0.0.22
- public_dns = ec2-107-21-158-0.compute-1.amazonaws.com
- public_ip = 107.21.158.0
- root_block_device.# = 1
- root_block_device.0.delete_on_termination = false
- root_block_device.0.iops = 0
- root_block_device.0.volume_size = 8
- root_block_device.0.volume_type = standard
- security_groups.# = 0
- source_dest_check = true
- subnet_id = subnet-6299274f
- tags.% = 1
- tags.Name = pub_odrive
- tenancy = default
- vpc_security_group_ids.# = 1
- vpc_security_group_ids.1135247480 = sg-185e1d65
- Dependencies:
- aws_security_group.odrive_microservices_sg
- aws_instance.zk_node.0:
- ID = i-68c81f7f
- ami = ami-97a7a180
- associate_public_ip_address = true
- availability_zone = us-east-1b
- disable_api_termination = false
- ebs_block_device.# = 0
- ebs_optimized = false
- ephemeral_block_device.# = 0
- iam_instance_profile =
- instance_state = running
- instance_type = t2.micro
- key_name = test-infrastructure
- monitoring = false
- network_interface_id = eni-a3aae15d
- private_dns = ip-10-0-1-231.ec2.internal
- private_ip = 10.0.1.231
- public_dns = ec2-34-194-147-231.compute-1.amazonaws.com
- public_ip = 34.194.147.231
- root_block_device.# = 1
- root_block_device.0.delete_on_termination = true
- root_block_device.0.iops = 100
- root_block_device.0.volume_size = 8
- root_block_device.0.volume_type = gp2
- security_groups.# = 0
- source_dest_check = true
- subnet_id = subnet-7d992750
- tags.% = 1
- tags.Name = zk_node
- tenancy = default
- vpc_security_group_ids.# = 1
- vpc_security_group_ids.2112837917 = sg-f4470d89
- Dependencies:
- aws_security_group.zk_sg
- aws_security_group.odrive_microservices_sg:
- ID = sg-185e1d65
- description = Required open ports for object-drive and other microservices
- egress.# = 1
- egress.482069346.cidr_blocks.# = 1
- egress.482069346.cidr_blocks.0 = 0.0.0.0/0
- egress.482069346.from_port = 0
- egress.482069346.prefix_list_ids.# = 0
- egress.482069346.protocol = -1
- egress.482069346.security_groups.# = 0
- egress.482069346.self = false
- egress.482069346.to_port = 0
- ingress.# = 5
- ingress.1203902316.cidr_blocks.# = 1
- ingress.1203902316.cidr_blocks.0 = 0.0.0.0/0
- ingress.1203902316.from_port = 4430
- ingress.1203902316.protocol = tcp
- ingress.1203902316.security_groups.# = 0
- ingress.1203902316.self = false
- ingress.1203902316.to_port = 4430
- ingress.1799340084.cidr_blocks.# = 1
- ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
- ingress.1799340084.from_port = -1
- ingress.1799340084.protocol = icmp
- ingress.1799340084.security_groups.# = 0
- ingress.1799340084.self = false
- ingress.1799340084.to_port = -1
- ingress.2172623744.cidr_blocks.# = 1
- ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0
- ingress.2172623744.from_port = 9999
- ingress.2172623744.protocol = tcp
- ingress.2172623744.security_groups.# = 0
- ingress.2172623744.self = false
- ingress.2172623744.to_port = 9999
- ingress.2541437006.cidr_blocks.# = 1
- ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
- ingress.2541437006.from_port = 22
- ingress.2541437006.protocol = tcp
- ingress.2541437006.security_groups.# = 0
- ingress.2541437006.self = false
- ingress.2541437006.to_port = 22
- ingress.2617001939.cidr_blocks.# = 1
- ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0
- ingress.2617001939.from_port = 443
- ingress.2617001939.protocol = tcp
- ingress.2617001939.security_groups.# = 0
- ingress.2617001939.self = false
- ingress.2617001939.to_port = 443
- name = odrive_microservices_sg
- owner_id = 706634194319
- tags.% = 1
- tags.Name = odrive_sg
- vpc_id = vpc-50fe0336
- aws_security_group.pub_networktest_sg:
- ID = sg-f7470d8a
- description = Allow traffic to pass from the private subnet to the internet
- egress.# = 1
- egress.482069346.cidr_blocks.# = 1
- egress.482069346.cidr_blocks.0 = 0.0.0.0/0
- egress.482069346.from_port = 0
- egress.482069346.prefix_list_ids.# = 0
- egress.482069346.protocol = -1
- egress.482069346.security_groups.# = 0
- egress.482069346.self = false
- egress.482069346.to_port = 0
- ingress.# = 6
- ingress.1799340084.cidr_blocks.# = 1
- ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
- ingress.1799340084.from_port = -1
- ingress.1799340084.protocol = icmp
- ingress.1799340084.security_groups.# = 0
- ingress.1799340084.self = false
- ingress.1799340084.to_port = -1
- ingress.2172623744.cidr_blocks.# = 1
- ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0
- ingress.2172623744.from_port = 9999
- ingress.2172623744.protocol = tcp
- ingress.2172623744.security_groups.# = 0
- ingress.2172623744.self = false
- ingress.2172623744.to_port = 9999
- ingress.2214680975.cidr_blocks.# = 1
- ingress.2214680975.cidr_blocks.0 = 0.0.0.0/0
- ingress.2214680975.from_port = 80
- ingress.2214680975.protocol = tcp
- ingress.2214680975.security_groups.# = 0
- ingress.2214680975.self = false
- ingress.2214680975.to_port = 80
- ingress.2541437006.cidr_blocks.# = 1
- ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
- ingress.2541437006.from_port = 22
- ingress.2541437006.protocol = tcp
- ingress.2541437006.security_groups.# = 0
- ingress.2541437006.self = false
- ingress.2541437006.to_port = 22
- ingress.2617001939.cidr_blocks.# = 1
- ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0
- ingress.2617001939.from_port = 443
- ingress.2617001939.protocol = tcp
- ingress.2617001939.security_groups.# = 0
- ingress.2617001939.self = false
- ingress.2617001939.to_port = 443
- ingress.516175195.cidr_blocks.# = 1
- ingress.516175195.cidr_blocks.0 = 0.0.0.0/0
- ingress.516175195.from_port = 8080
- ingress.516175195.protocol = tcp
- ingress.516175195.security_groups.# = 0
- ingress.516175195.self = false
- ingress.516175195.to_port = 8080
- name = pub_networktest_sg
- owner_id = 706634194319
- tags.% = 1
- tags.Name = terraform
- vpc_id = vpc-50fe0336
- aws_security_group.zk_sg:
- ID = sg-f4470d89
- description = Zookeeper ports
- egress.# = 1
- egress.482069346.cidr_blocks.# = 1
- egress.482069346.cidr_blocks.0 = 0.0.0.0/0
- egress.482069346.from_port = 0
- egress.482069346.prefix_list_ids.# = 0
- egress.482069346.protocol = -1
- egress.482069346.security_groups.# = 0
- egress.482069346.self = false
- egress.482069346.to_port = 0
- ingress.# = 3
- ingress.1799340084.cidr_blocks.# = 1
- ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
- ingress.1799340084.from_port = -1
- ingress.1799340084.protocol = icmp
- ingress.1799340084.security_groups.# = 0
- ingress.1799340084.self = false
- ingress.1799340084.to_port = -1
- ingress.2541437006.cidr_blocks.# = 1
- ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
- ingress.2541437006.from_port = 22
- ingress.2541437006.protocol = tcp
- ingress.2541437006.security_groups.# = 0
- ingress.2541437006.self = false
- ingress.2541437006.to_port = 22
- ingress.4023360382.cidr_blocks.# = 1
- ingress.4023360382.cidr_blocks.0 = 10.0.0.0/16
- ingress.4023360382.from_port = 2181
- ingress.4023360382.protocol = tcp
- ingress.4023360382.security_groups.# = 0
- ingress.4023360382.self = false
- ingress.4023360382.to_port = 2181
- name = zk_sg
- owner_id = 706634194319
- tags.% = 1
- tags.Name = zk_sg
- vpc_id = vpc-50fe0336
- Outputs:
- odrive_microservices_sg = sg-185e1d65
- pub_networktest_sg = sg-f7470d8a
- zk_sg = sg-f4470d89
- module.rds:
- aws_db_instance.odrive:
- ID = tf-20161207154908631239504b4t
- address = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com
- allocated_storage = 10
- apply_immediately = true
- arn = arn:aws:rds:us-east-1:706634194319:db:tf-20161207154908631239504b4t
- auto_minor_version_upgrade = true
- availability_zone = us-east-1b
- backup_retention_period = 0
- backup_window = 07:37-08:07
- copy_tags_to_snapshot = false
- db_subnet_group_name = main
- endpoint = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com:3306
- engine = mysql
- engine_version = 5.6.27
- hosted_zone_id = Z2R2ITUGPM61AM
- identifier = tf-20161207154908631239504b4t
- instance_class = db.t2.micro
- iops = 0
- kms_key_id =
- license_model = general-public-license
- maintenance_window = mon:10:19-mon:10:49
- monitoring_interval = 0
- multi_az = false
- name = metadatadb
- option_group_name = default:mysql-5-6
- parameter_group_name = odrive-pg
- password = dbRootPassword
- port = 3306
- publicly_accessible = true
- replicas.# = 0
- replicate_source_db =
- security_group_names.# = 0
- skip_final_snapshot = true
- status = available
- storage_encrypted = false
- storage_type = standard
- tags.% = 0
- username = dbRootUser
- vpc_security_group_ids.# = 1
- vpc_security_group_ids.955802421 = sg-76b5ca0b
- Dependencies:
- aws_db_subnet_group.main
- aws_db_parameter_group.odrive_pg
- aws_db_parameter_group.odrive_pg:
- ID = odrive-pg
- arn = arn:aws:rds:us-east-1:706634194319:pg:odrive-pg
- description = Custom Parameter Group for Object Drive
- family = mysql5.6
- name = odrive-pg
- parameter.# = 1
- parameter.950177639.apply_method = immediate
- parameter.950177639.name = log_bin_trust_function_creators
- parameter.950177639.value = 1
- tags.% = 0
- aws_db_subnet_group.main:
- ID = main
- arn = arn:aws:rds:us-east-1:706634194319:subgrp:main
- description = Managed by Terraform
- name = main
- subnet_ids.# = 3
- subnet_ids.2727810170 = subnet-72bac73b
- subnet_ids.741755728 = subnet-7d992750
- subnet_ids.998920899 = subnet-6299274f
- tags.% = 1
- tags.Name = terraform_db_subnet_group
- module.vpc:
- aws_eip.nat:
- ID = eipalloc-c15748fe
- association_id = eipassoc-56c7e869
- domain = vpc
- instance = 74D93920-ED26-11E3-AC10-0800200C9A66
- network_interface = eni-73c78c8d
- private_ip = 10.0.0.34
- public_ip = 34.193.25.59
- vpc = true
- Dependencies:
- aws_instance.nat
- aws_instance.nat:
- ID = i-e8fe29ff
- ami = ami-0dd7e61a
- associate_public_ip_address = true
- availability_zone = us-east-1b
- disable_api_termination = false
- ebs_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
- ebs_optimized = false
- ephemeral_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
- iam_instance_profile =
- instance_state = 74D93920-ED26-11E3-AC10-0800200C9A66
- instance_type = t2.small
- key_name = test-infrastructure
- monitoring = false
- network_interface_id = 74D93920-ED26-11E3-AC10-0800200C9A66
- placement_group = 74D93920-ED26-11E3-AC10-0800200C9A66
- private_dns = 74D93920-ED26-11E3-AC10-0800200C9A66
- private_ip = 74D93920-ED26-11E3-AC10-0800200C9A66
- public_dns = 74D93920-ED26-11E3-AC10-0800200C9A66
- public_ip = 74D93920-ED26-11E3-AC10-0800200C9A66
- root_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
- root_block_device.0.delete_on_termination = true
- root_block_device.0.iops = 100
- root_block_device.0.volume_size = 8
- root_block_device.0.volume_type = gp2
- security_groups.# = 2
- security_groups.2513725979 = sg-79119b04
- security_groups.955802421 = sg-76b5ca0b
- source_dest_check = false
- subnet_id = subnet-6299274f
- tags.% = 1
- tags.Name = terraform_nat_instance
- tenancy = 74D93920-ED26-11E3-AC10-0800200C9A66
- vpc_security_group_ids.# = 74D93920-ED26-11E3-AC10-0800200C9A66
- vpc_security_group_ids.2513725979 = sg-79119b04
- vpc_security_group_ids.955802421 = sg-76b5ca0b
- Dependencies:
- aws_security_group.rds_mysql_sg
- aws_subnet.decipher_public
- aws_security_group.nat
- aws_internet_gateway.default:
- ID = igw-51883236
- tags.% = 1
- tags.Name = terraform_igw
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_route_table.decipher_private:
- ID = rtb-6afddf0c
- propagating_vgws.# = 0
- route.# = 1
- route.~2469360411.cidr_block = 0.0.0.0/0
- route.~2469360411.gateway_id =
- route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66
- route.~2469360411.nat_gateway_id =
- route.~2469360411.network_interface_id =
- route.~2469360411.vpc_peering_connection_id =
- tags.% = 1
- tags.Name = terraform_private_subnet_route_table
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_instance.nat
- aws_route_table.decipher_private_2:
- ID = rtb-56a39130
- propagating_vgws.# = 0
- route.# = 1
- route.~2469360411.cidr_block = 0.0.0.0/0
- route.~2469360411.gateway_id =
- route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66
- route.~2469360411.nat_gateway_id =
- route.~2469360411.network_interface_id =
- route.~2469360411.vpc_peering_connection_id =
- tags.% = 1
- tags.Name = terraform_private_subnet_2_route_table
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_instance.nat
- aws_vpc.default
- aws_route_table.decipher_public:
- ID = rtb-8efedce8
- propagating_vgws.# = 0
- route.# = 1
- route.3761165403.cidr_block = 0.0.0.0/0
- route.3761165403.gateway_id = igw-51883236
- route.3761165403.instance_id =
- route.3761165403.nat_gateway_id =
- route.3761165403.network_interface_id =
- route.3761165403.vpc_peering_connection_id =
- tags.% = 1
- tags.Name = terraform_public_subnet_route_table
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_internet_gateway.default
- aws_route_table_association.decipher_private:
- ID = rtbassoc-b8c0f5c1
- route_table_id = rtb-6afddf0c
- subnet_id = subnet-7d992750
- Dependencies:
- aws_subnet.decipher_private
- aws_route_table.decipher_private
- aws_route_table_association.decipher_private_2:
- ID = rtbassoc-c0e4e5b9
- route_table_id = rtb-56a39130
- subnet_id = subnet-72bac73b
- Dependencies:
- aws_route_table.decipher_private_2
- aws_subnet.decipher_private_2
- aws_route_table_association.decipher_public:
- ID = rtbassoc-29c6f350
- route_table_id = rtb-8efedce8
- subnet_id = subnet-6299274f
- Dependencies:
- aws_subnet.decipher_public
- aws_route_table.decipher_public
- aws_security_group.bastion_ssh_sg:
- ID = sg-78119b05
- description = Allow SSH to Bastion host from approved ranges
- egress.# = 1
- egress.482069346.cidr_blocks.# = 1
- egress.482069346.cidr_blocks.0 = 0.0.0.0/0
- egress.482069346.from_port = 0
- egress.482069346.prefix_list_ids.# = 0
- egress.482069346.protocol = -1
- egress.482069346.security_groups.# = 0
- egress.482069346.self = false
- egress.482069346.to_port = 0
- ingress.# = 1
- ingress.2541437006.cidr_blocks.# = 1
- ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
- ingress.2541437006.from_port = 22
- ingress.2541437006.protocol = tcp
- ingress.2541437006.security_groups.# = 0
- ingress.2541437006.self = false
- ingress.2541437006.to_port = 22
- name = bastion_ssh
- owner_id = 706634194319
- tags.% = 1
- tags.Name = terraform_bastion_ssh
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_security_group.nat:
- ID = sg-79119b04
- description = Allow traffic to pass from the private subnet to the internet
- egress.# = 1
- egress.482069346.cidr_blocks.# = 1
- egress.482069346.cidr_blocks.0 = 0.0.0.0/0
- egress.482069346.from_port = 0
- egress.482069346.prefix_list_ids.# = 0
- egress.482069346.protocol = -1
- egress.482069346.security_groups.# = 0
- egress.482069346.self = false
- egress.482069346.to_port = 0
- ingress.# = 3
- ingress.2582209309.cidr_blocks.# = 1
- ingress.2582209309.cidr_blocks.0 = 10.0.1.0/24
- ingress.2582209309.from_port = -1
- ingress.2582209309.protocol = icmp
- ingress.2582209309.security_groups.# = 0
- ingress.2582209309.self = false
- ingress.2582209309.to_port = -1
- ingress.386650288.cidr_blocks.# = 1
- ingress.386650288.cidr_blocks.0 = 10.0.1.0/24
- ingress.386650288.from_port = 80
- ingress.386650288.protocol = tcp
- ingress.386650288.security_groups.# = 0
- ingress.386650288.self = false
- ingress.386650288.to_port = 80
- ingress.4211794038.cidr_blocks.# = 1
- ingress.4211794038.cidr_blocks.0 = 10.0.1.0/24
- ingress.4211794038.from_port = 443
- ingress.4211794038.protocol = tcp
- ingress.4211794038.security_groups.# = 0
- ingress.4211794038.self = false
- ingress.4211794038.to_port = 443
- name = vpc_nat
- owner_id = 706634194319
- tags.% = 1
- tags.Name = terraform
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_security_group.rds_mysql_sg:
- ID = sg-76b5ca0b
- description = Allow traffic to pass from internet to RDS MySQL
- egress.# = 1
- egress.482069346.cidr_blocks.# = 1
- egress.482069346.cidr_blocks.0 = 0.0.0.0/0
- egress.482069346.from_port = 0
- egress.482069346.prefix_list_ids.# = 0
- egress.482069346.protocol = -1
- egress.482069346.security_groups.# = 0
- egress.482069346.self = false
- egress.482069346.to_port = 0
- ingress.# = 1
- ingress.1163740523.cidr_blocks.# = 1
- ingress.1163740523.cidr_blocks.0 = 0.0.0.0/0
- ingress.1163740523.from_port = 3306
- ingress.1163740523.protocol = tcp
- ingress.1163740523.security_groups.# = 0
- ingress.1163740523.self = false
- ingress.1163740523.to_port = 3306
- name = rds_mysql
- owner_id = 706634194319
- tags.% = 1
- tags.Name = terraform
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_security_group.ssh_from_bastion_sg:
- ID = sg-72119b0f
- description = Allow SSH from Bastion host(s)
- egress.# = 0
- ingress.# = 1
- ingress.3517505807.cidr_blocks.# = 0
- ingress.3517505807.from_port = 22
- ingress.3517505807.protocol = tcp
- ingress.3517505807.security_groups.# = 2
- ingress.3517505807.security_groups.1151619385 = sg-78119b05
- ingress.3517505807.security_groups.2513725979 = sg-79119b04
- ingress.3517505807.self = false
- ingress.3517505807.to_port = 22
- name = ssh_from_bastion
- owner_id = 706634194319
- tags.% = 1
- tags.Name = terraform_ssh_from_bastion
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_security_group.bastion_ssh_sg
- aws_security_group.nat
- aws_vpc.default
- aws_security_group.web_access_from_nat_sg:
- ID = sg-70119b0d
- description = Allow web access to the private subnet from the public subnet (via NAT instance)
- egress.# = 1
- egress.482069346.cidr_blocks.# = 1
- egress.482069346.cidr_blocks.0 = 0.0.0.0/0
- egress.482069346.from_port = 0
- egress.482069346.prefix_list_ids.# = 0
- egress.482069346.protocol = -1
- egress.482069346.security_groups.# = 0
- egress.482069346.self = false
- egress.482069346.to_port = 0
- ingress.# = 3
- ingress.1067346089.cidr_blocks.# = 1
- ingress.1067346089.cidr_blocks.0 = 10.0.0.0/24
- ingress.1067346089.from_port = -1
- ingress.1067346089.protocol = icmp
- ingress.1067346089.security_groups.# = 0
- ingress.1067346089.self = false
- ingress.1067346089.to_port = -1
- ingress.1568533442.cidr_blocks.# = 1
- ingress.1568533442.cidr_blocks.0 = 10.0.0.0/24
- ingress.1568533442.from_port = 443
- ingress.1568533442.protocol = tcp
- ingress.1568533442.security_groups.# = 0
- ingress.1568533442.self = false
- ingress.1568533442.to_port = 443
- ingress.2977749764.cidr_blocks.# = 1
- ingress.2977749764.cidr_blocks.0 = 10.0.0.0/24
- ingress.2977749764.from_port = 80
- ingress.2977749764.protocol = tcp
- ingress.2977749764.security_groups.# = 0
- ingress.2977749764.self = false
- ingress.2977749764.to_port = 80
- name = private_subnet_web_access
- owner_id = 706634194319
- tags.% = 1
- tags.Name = terraform
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_subnet.decipher_public
- aws_subnet.decipher_private:
- ID = subnet-7d992750
- availability_zone = us-east-1b
- cidr_block = 10.0.1.0/24
- map_public_ip_on_launch = false
- tags.% = 1
- tags.Name = terraform_private_subnet
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_subnet.decipher_private_2:
- ID = subnet-72bac73b
- availability_zone = us-east-1c
- cidr_block = 10.0.2.0/24
- map_public_ip_on_launch = false
- tags.% = 1
- tags.Name = terraform_private_subnet_2
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_subnet.decipher_public:
- ID = subnet-6299274f
- availability_zone = us-east-1b
- cidr_block = 10.0.0.0/24
- map_public_ip_on_launch = false
- tags.% = 1
- tags.Name = terraform_public_subnet
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_vpc.default:
- ID = vpc-50fe0336
- cidr_block = 10.0.0.0/16
- default_network_acl_id = acl-c18d31a7
- default_route_table_id = rtb-82fedce4
- default_security_group_id = sg-7d119b00
- dhcp_options_id = dopt-857b9be0
- enable_classiclink = false
- enable_dns_hostnames = true
- enable_dns_support = true
- instance_tenancy = default
- main_route_table_id = rtb-82fedce4
- tags.% = 1
- tags.Name = terraform_vpc
- Outputs:
- bastion_ssh_sg_id = sg-78119b05
- nat_sg_id = sg-79119b04
- private_subnet_2_id = subnet-72bac73b
- private_subnet_id = subnet-7d992750
- public_subnet_id = subnet-6299274f
- rds_mysql_sg = sg-76b5ca0b
- ssh_from_bastion_sg_id = sg-72119b0f
- vpc_id = vpc-50fe0336
- web_access_from_nat_sg_id = sg-70119b0d
- Shadow state:
- <no state>
- module.child:
- <no state>
- Outputs:
- received = 1GB
- module.instances:
- aws_eip.zk.0:
- ID = eipalloc-3eb04400
- association_id = eipassoc-b5def18a
- domain = vpc
- instance = i-68c81f7f
- network_interface = eni-a3aae15d
- private_ip = 10.0.1.231
- public_ip = 34.194.147.231
- vpc = true
- Dependencies:
- aws_instance.zk_node
- aws_instance.priv_networktest:
- ID = i-6ec81f79
- ami = ami-02417f15
- associate_public_ip_address = false
- availability_zone = us-east-1b
- disable_api_termination = false
- ebs_block_device.# = 0
- ebs_optimized = false
- ephemeral_block_device.# = 0
- iam_instance_profile =
- instance_state = running
- instance_type = t2.micro
- key_name = test-infrastructure
- monitoring = false
- network_interface_id = eni-bba9e245
- private_dns = ip-10-0-1-46.ec2.internal
- private_ip = 10.0.1.46
- public_dns =
- public_ip =
- root_block_device.# = 1
- root_block_device.0.delete_on_termination = true
- root_block_device.0.iops = 100
- root_block_device.0.volume_size = 8
- root_block_device.0.volume_type = gp2
- security_groups.# = 0
- source_dest_check = true
- subnet_id = subnet-7d992750
- tags.% = 1
- tags.Name = priv_networktest
- tenancy = default
- vpc_security_group_ids.# = 1
- vpc_security_group_ids.699898438 = sg-f7470d8a
- Dependencies:
- aws_security_group.pub_networktest_sg
- aws_instance.pub_networktest:
- ID = i-69c81f7e
- ami = ami-02417f15
- associate_public_ip_address = true
- availability_zone = us-east-1b
- disable_api_termination = false
- ebs_block_device.# = 0
- ebs_optimized = false
- ephemeral_block_device.# = 0
- iam_instance_profile =
- instance_state = running
- instance_type = t2.micro
- key_name = test-infrastructure
- monitoring = false
- network_interface_id = eni-8fade671
- private_dns = ip-10-0-0-61.ec2.internal
- private_ip = 10.0.0.61
- public_dns = ec2-54-90-79-184.compute-1.amazonaws.com
- public_ip = 54.90.79.184
- root_block_device.# = 1
- root_block_device.0.delete_on_termination = true
- root_block_device.0.iops = 100
- root_block_device.0.volume_size = 8
- root_block_device.0.volume_type = gp2
- security_groups.# = 0
- source_dest_check = true
- subnet_id = subnet-6299274f
- tags.% = 1
- tags.Name = pub_networktest
- tenancy = default
- vpc_security_group_ids.# = 1
- vpc_security_group_ids.699898438 = sg-f7470d8a
- Dependencies:
- aws_security_group.pub_networktest_sg
- aws_instance.pub_odrive:
- ID = i-c634fdd1
- ami = ami-bcd0d7ab
- associate_public_ip_address = true
- availability_zone = us-east-1b
- disable_api_termination = false
- ebs_block_device.# = 0
- ebs_optimized = false
- ephemeral_block_device.# = 0
- iam_instance_profile =
- instance_state = running
- instance_type = t2.micro
- key_name = test-infrastructure
- monitoring = false
- network_interface_id = eni-118df1ef
- private_dns = ip-10-0-0-22.ec2.internal
- private_ip = 10.0.0.22
- public_dns = ec2-107-21-158-0.compute-1.amazonaws.com
- public_ip = 107.21.158.0
- root_block_device.# = 1
- root_block_device.0.delete_on_termination = false
- root_block_device.0.iops = 0
- root_block_device.0.volume_size = 8
- root_block_device.0.volume_type = standard
- security_groups.# = 0
- source_dest_check = true
- subnet_id = subnet-6299274f
- tags.% = 1
- tags.Name = pub_odrive
- tenancy = default
- vpc_security_group_ids.# = 1
- vpc_security_group_ids.1135247480 = sg-185e1d65
- Dependencies:
- aws_security_group.odrive_microservices_sg
- aws_instance.zk_node.0:
- ID = i-68c81f7f
- ami = ami-97a7a180
- associate_public_ip_address = true
- availability_zone = us-east-1b
- disable_api_termination = false
- ebs_block_device.# = 0
- ebs_optimized = false
- ephemeral_block_device.# = 0
- iam_instance_profile =
- instance_state = running
- instance_type = t2.micro
- key_name = test-infrastructure
- monitoring = false
- network_interface_id = eni-a3aae15d
- private_dns = ip-10-0-1-231.ec2.internal
- private_ip = 10.0.1.231
- public_dns = ec2-34-194-147-231.compute-1.amazonaws.com
- public_ip = 34.194.147.231
- root_block_device.# = 1
- root_block_device.0.delete_on_termination = true
- root_block_device.0.iops = 100
- root_block_device.0.volume_size = 8
- root_block_device.0.volume_type = gp2
- security_groups.# = 0
- source_dest_check = true
- subnet_id = subnet-7d992750
- tags.% = 1
- tags.Name = zk_node
- tenancy = default
- vpc_security_group_ids.# = 1
- vpc_security_group_ids.2112837917 = sg-f4470d89
- Dependencies:
- aws_security_group.zk_sg
- aws_security_group.odrive_microservices_sg:
- ID = sg-185e1d65
- description = Required open ports for object-drive and other microservices
- egress.# = 1
- egress.482069346.cidr_blocks.# = 1
- egress.482069346.cidr_blocks.0 = 0.0.0.0/0
- egress.482069346.from_port = 0
- egress.482069346.prefix_list_ids.# = 0
- egress.482069346.protocol = -1
- egress.482069346.security_groups.# = 0
- egress.482069346.self = false
- egress.482069346.to_port = 0
- ingress.# = 5
- ingress.1203902316.cidr_blocks.# = 1
- ingress.1203902316.cidr_blocks.0 = 0.0.0.0/0
- ingress.1203902316.from_port = 4430
- ingress.1203902316.protocol = tcp
- ingress.1203902316.security_groups.# = 0
- ingress.1203902316.self = false
- ingress.1203902316.to_port = 4430
- ingress.1799340084.cidr_blocks.# = 1
- ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
- ingress.1799340084.from_port = -1
- ingress.1799340084.protocol = icmp
- ingress.1799340084.security_groups.# = 0
- ingress.1799340084.self = false
- ingress.1799340084.to_port = -1
- ingress.2172623744.cidr_blocks.# = 1
- ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0
- ingress.2172623744.from_port = 9999
- ingress.2172623744.protocol = tcp
- ingress.2172623744.security_groups.# = 0
- ingress.2172623744.self = false
- ingress.2172623744.to_port = 9999
- ingress.2541437006.cidr_blocks.# = 1
- ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
- ingress.2541437006.from_port = 22
- ingress.2541437006.protocol = tcp
- ingress.2541437006.security_groups.# = 0
- ingress.2541437006.self = false
- ingress.2541437006.to_port = 22
- ingress.2617001939.cidr_blocks.# = 1
- ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0
- ingress.2617001939.from_port = 443
- ingress.2617001939.protocol = tcp
- ingress.2617001939.security_groups.# = 0
- ingress.2617001939.self = false
- ingress.2617001939.to_port = 443
- name = odrive_microservices_sg
- owner_id = 706634194319
- tags.% = 1
- tags.Name = odrive_sg
- vpc_id = vpc-50fe0336
- aws_security_group.pub_networktest_sg:
- ID = sg-f7470d8a
- description = Allow traffic to pass from the private subnet to the internet
- egress.# = 1
- egress.482069346.cidr_blocks.# = 1
- egress.482069346.cidr_blocks.0 = 0.0.0.0/0
- egress.482069346.from_port = 0
- egress.482069346.prefix_list_ids.# = 0
- egress.482069346.protocol = -1
- egress.482069346.security_groups.# = 0
- egress.482069346.self = false
- egress.482069346.to_port = 0
- ingress.# = 6
- ingress.1799340084.cidr_blocks.# = 1
- ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
- ingress.1799340084.from_port = -1
- ingress.1799340084.protocol = icmp
- ingress.1799340084.security_groups.# = 0
- ingress.1799340084.self = false
- ingress.1799340084.to_port = -1
- ingress.2172623744.cidr_blocks.# = 1
- ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0
- ingress.2172623744.from_port = 9999
- ingress.2172623744.protocol = tcp
- ingress.2172623744.security_groups.# = 0
- ingress.2172623744.self = false
- ingress.2172623744.to_port = 9999
- ingress.2214680975.cidr_blocks.# = 1
- ingress.2214680975.cidr_blocks.0 = 0.0.0.0/0
- ingress.2214680975.from_port = 80
- ingress.2214680975.protocol = tcp
- ingress.2214680975.security_groups.# = 0
- ingress.2214680975.self = false
- ingress.2214680975.to_port = 80
- ingress.2541437006.cidr_blocks.# = 1
- ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
- ingress.2541437006.from_port = 22
- ingress.2541437006.protocol = tcp
- ingress.2541437006.security_groups.# = 0
- ingress.2541437006.self = false
- ingress.2541437006.to_port = 22
- ingress.2617001939.cidr_blocks.# = 1
- ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0
- ingress.2617001939.from_port = 443
- ingress.2617001939.protocol = tcp
- ingress.2617001939.security_groups.# = 0
- ingress.2617001939.self = false
- ingress.2617001939.to_port = 443
- ingress.516175195.cidr_blocks.# = 1
- ingress.516175195.cidr_blocks.0 = 0.0.0.0/0
- ingress.516175195.from_port = 8080
- ingress.516175195.protocol = tcp
- ingress.516175195.security_groups.# = 0
- ingress.516175195.self = false
- ingress.516175195.to_port = 8080
- name = pub_networktest_sg
- owner_id = 706634194319
- tags.% = 1
- tags.Name = terraform
- vpc_id = vpc-50fe0336
- aws_security_group.zk_sg:
- ID = sg-f4470d89
- description = Zookeeper ports
- egress.# = 1
- egress.482069346.cidr_blocks.# = 1
- egress.482069346.cidr_blocks.0 = 0.0.0.0/0
- egress.482069346.from_port = 0
- egress.482069346.prefix_list_ids.# = 0
- egress.482069346.protocol = -1
- egress.482069346.security_groups.# = 0
- egress.482069346.self = false
- egress.482069346.to_port = 0
- ingress.# = 3
- ingress.1799340084.cidr_blocks.# = 1
- ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
- ingress.1799340084.from_port = -1
- ingress.1799340084.protocol = icmp
- ingress.1799340084.security_groups.# = 0
- ingress.1799340084.self = false
- ingress.1799340084.to_port = -1
- ingress.2541437006.cidr_blocks.# = 1
- ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
- ingress.2541437006.from_port = 22
- ingress.2541437006.protocol = tcp
- ingress.2541437006.security_groups.# = 0
- ingress.2541437006.self = false
- ingress.2541437006.to_port = 22
- ingress.4023360382.cidr_blocks.# = 1
- ingress.4023360382.cidr_blocks.0 = 10.0.0.0/16
- ingress.4023360382.from_port = 2181
- ingress.4023360382.protocol = tcp
- ingress.4023360382.security_groups.# = 0
- ingress.4023360382.self = false
- ingress.4023360382.to_port = 2181
- name = zk_sg
- owner_id = 706634194319
- tags.% = 1
- tags.Name = zk_sg
- vpc_id = vpc-50fe0336
- Outputs:
- odrive_microservices_sg = sg-185e1d65
- pub_networktest_sg = sg-f7470d8a
- zk_sg = sg-f4470d89
- module.rds:
- aws_db_instance.odrive:
- ID = tf-20161207154908631239504b4t
- address = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com
- allocated_storage = 10
- apply_immediately = true
- arn = arn:aws:rds:us-east-1:706634194319:db:tf-20161207154908631239504b4t
- auto_minor_version_upgrade = true
- availability_zone = us-east-1b
- backup_retention_period = 0
- backup_window = 07:37-08:07
- copy_tags_to_snapshot = false
- db_subnet_group_name = main
- endpoint = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com:3306
- engine = mysql
- engine_version = 5.6.27
- hosted_zone_id = Z2R2ITUGPM61AM
- identifier = tf-20161207154908631239504b4t
- instance_class = db.t2.micro
- iops = 0
- kms_key_id =
- license_model = general-public-license
- maintenance_window = mon:10:19-mon:10:49
- monitoring_interval = 0
- multi_az = false
- name = metadatadb
- option_group_name = default:mysql-5-6
- parameter_group_name = odrive-pg
- password = dbRootPassword
- port = 3306
- publicly_accessible = true
- replicas.# = 0
- replicate_source_db =
- security_group_names.# = 0
- skip_final_snapshot = true
- status = available
- storage_encrypted = false
- storage_type = standard
- tags.% = 0
- username = dbRootUser
- vpc_security_group_ids.# = 1
- vpc_security_group_ids.955802421 = sg-76b5ca0b
- Dependencies:
- aws_db_subnet_group.main
- aws_db_parameter_group.odrive_pg
- aws_db_parameter_group.odrive_pg:
- ID = odrive-pg
- arn = arn:aws:rds:us-east-1:706634194319:pg:odrive-pg
- description = Custom Parameter Group for Object Drive
- family = mysql5.6
- name = odrive-pg
- parameter.# = 1
- parameter.950177639.apply_method = immediate
- parameter.950177639.name = log_bin_trust_function_creators
- parameter.950177639.value = 1
- tags.% = 0
- aws_db_subnet_group.main:
- ID = main
- arn = arn:aws:rds:us-east-1:706634194319:subgrp:main
- description = Managed by Terraform
- name = main
- subnet_ids.# = 3
- subnet_ids.2727810170 = subnet-72bac73b
- subnet_ids.741755728 = subnet-7d992750
- subnet_ids.998920899 = subnet-6299274f
- tags.% = 1
- tags.Name = terraform_db_subnet_group
- module.vpc:
- aws_eip.nat:
- ID = eipalloc-c15748fe
- association_id = eipassoc-56c7e869
- domain = vpc
- instance = 74D93920-ED26-11E3-AC10-0800200C9A66
- network_interface = eni-73c78c8d
- private_ip = 10.0.0.34
- public_ip = 34.193.25.59
- vpc = true
- Dependencies:
- aws_instance.nat
- aws_instance.nat:
- ID = i-e8fe29ff
- ami = ami-0dd7e61a
- associate_public_ip_address = true
- availability_zone = us-east-1b
- disable_api_termination = false
- ebs_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
- ebs_optimized = false
- ephemeral_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
- iam_instance_profile =
- instance_state = 74D93920-ED26-11E3-AC10-0800200C9A66
- instance_type = t2.small
- key_name = test-infrastructure
- monitoring = false
- network_interface_id = 74D93920-ED26-11E3-AC10-0800200C9A66
- placement_group = 74D93920-ED26-11E3-AC10-0800200C9A66
- private_dns = 74D93920-ED26-11E3-AC10-0800200C9A66
- private_ip = 74D93920-ED26-11E3-AC10-0800200C9A66
- public_dns = 74D93920-ED26-11E3-AC10-0800200C9A66
- public_ip = 74D93920-ED26-11E3-AC10-0800200C9A66
- root_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
- root_block_device.0.delete_on_termination = true
- root_block_device.0.iops = 100
- root_block_device.0.volume_size = 8
- root_block_device.0.volume_type = gp2
- security_groups.# = 2
- security_groups.2513725979 = sg-79119b04
- security_groups.955802421 = sg-76b5ca0b
- source_dest_check = false
- subnet_id = subnet-6299274f
- tags.% = 1
- tags.Name = terraform_nat_instance
- tenancy = 74D93920-ED26-11E3-AC10-0800200C9A66
- vpc_security_group_ids.# = 74D93920-ED26-11E3-AC10-0800200C9A66
- vpc_security_group_ids.2513725979 = sg-79119b04
- vpc_security_group_ids.955802421 = sg-76b5ca0b
- Dependencies:
- aws_security_group.rds_mysql_sg
- aws_subnet.decipher_public
- aws_security_group.nat
- aws_internet_gateway.default:
- ID = igw-51883236
- tags.% = 1
- tags.Name = terraform_igw
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_route_table.decipher_private:
- ID = rtb-6afddf0c
- propagating_vgws.# = 0
- route.# = 1
- route.~2469360411.cidr_block = 0.0.0.0/0
- route.~2469360411.gateway_id =
- route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66
- route.~2469360411.nat_gateway_id =
- route.~2469360411.network_interface_id =
- route.~2469360411.vpc_peering_connection_id =
- tags.% = 1
- tags.Name = terraform_private_subnet_route_table
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_instance.nat
- aws_route_table.decipher_private_2:
- ID = rtb-56a39130
- propagating_vgws.# = 0
- route.# = 1
- route.~2469360411.cidr_block = 0.0.0.0/0
- route.~2469360411.gateway_id =
- route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66
- route.~2469360411.nat_gateway_id =
- route.~2469360411.network_interface_id =
- route.~2469360411.vpc_peering_connection_id =
- tags.% = 1
- tags.Name = terraform_private_subnet_2_route_table
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_instance.nat
- aws_vpc.default
- aws_route_table.decipher_public:
- ID = rtb-8efedce8
- propagating_vgws.# = 0
- route.# = 1
- route.3761165403.cidr_block = 0.0.0.0/0
- route.3761165403.gateway_id = igw-51883236
- route.3761165403.instance_id =
- route.3761165403.nat_gateway_id =
- route.3761165403.network_interface_id =
- route.3761165403.vpc_peering_connection_id =
- tags.% = 1
- tags.Name = terraform_public_subnet_route_table
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_internet_gateway.default
- aws_route_table_association.decipher_private:
- ID = rtbassoc-b8c0f5c1
- route_table_id = rtb-6afddf0c
- subnet_id = subnet-7d992750
- Dependencies:
- aws_subnet.decipher_private
- aws_route_table.decipher_private
- aws_route_table_association.decipher_private_2:
- ID = rtbassoc-c0e4e5b9
- route_table_id = rtb-56a39130
- subnet_id = subnet-72bac73b
- Dependencies:
- aws_subnet.decipher_private_2
- aws_route_table.decipher_private_2
- aws_route_table_association.decipher_public:
- ID = rtbassoc-29c6f350
- route_table_id = rtb-8efedce8
- subnet_id = subnet-6299274f
- Dependencies:
- aws_subnet.decipher_public
- aws_route_table.decipher_public
- aws_security_group.bastion_ssh_sg:
- ID = sg-78119b05
- description = Allow SSH to Bastion host from approved ranges
- egress.# = 1
- egress.482069346.cidr_blocks.# = 1
- egress.482069346.cidr_blocks.0 = 0.0.0.0/0
- egress.482069346.from_port = 0
- egress.482069346.prefix_list_ids.# = 0
- egress.482069346.protocol = -1
- egress.482069346.security_groups.# = 0
- egress.482069346.self = false
- egress.482069346.to_port = 0
- ingress.# = 1
- ingress.2541437006.cidr_blocks.# = 1
- ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
- ingress.2541437006.from_port = 22
- ingress.2541437006.protocol = tcp
- ingress.2541437006.security_groups.# = 0
- ingress.2541437006.self = false
- ingress.2541437006.to_port = 22
- name = bastion_ssh
- owner_id = 706634194319
- tags.% = 1
- tags.Name = terraform_bastion_ssh
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_security_group.nat:
- ID = sg-79119b04
- description = Allow traffic to pass from the private subnet to the internet
- egress.# = 1
- egress.482069346.cidr_blocks.# = 1
- egress.482069346.cidr_blocks.0 = 0.0.0.0/0
- egress.482069346.from_port = 0
- egress.482069346.prefix_list_ids.# = 0
- egress.482069346.protocol = -1
- egress.482069346.security_groups.# = 0
- egress.482069346.self = false
- egress.482069346.to_port = 0
- ingress.# = 3
- ingress.2582209309.cidr_blocks.# = 1
- ingress.2582209309.cidr_blocks.0 = 10.0.1.0/24
- ingress.2582209309.from_port = -1
- ingress.2582209309.protocol = icmp
- ingress.2582209309.security_groups.# = 0
- ingress.2582209309.self = false
- ingress.2582209309.to_port = -1
- ingress.386650288.cidr_blocks.# = 1
- ingress.386650288.cidr_blocks.0 = 10.0.1.0/24
- ingress.386650288.from_port = 80
- ingress.386650288.protocol = tcp
- ingress.386650288.security_groups.# = 0
- ingress.386650288.self = false
- ingress.386650288.to_port = 80
- ingress.4211794038.cidr_blocks.# = 1
- ingress.4211794038.cidr_blocks.0 = 10.0.1.0/24
- ingress.4211794038.from_port = 443
- ingress.4211794038.protocol = tcp
- ingress.4211794038.security_groups.# = 0
- ingress.4211794038.self = false
- ingress.4211794038.to_port = 443
- name = vpc_nat
- owner_id = 706634194319
- tags.% = 1
- tags.Name = terraform
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_security_group.rds_mysql_sg:
- ID = sg-76b5ca0b
- description = Allow traffic to pass from internet to RDS MySQL
- egress.# = 1
- egress.482069346.cidr_blocks.# = 1
- egress.482069346.cidr_blocks.0 = 0.0.0.0/0
- egress.482069346.from_port = 0
- egress.482069346.prefix_list_ids.# = 0
- egress.482069346.protocol = -1
- egress.482069346.security_groups.# = 0
- egress.482069346.self = false
- egress.482069346.to_port = 0
- ingress.# = 1
- ingress.1163740523.cidr_blocks.# = 1
- ingress.1163740523.cidr_blocks.0 = 0.0.0.0/0
- ingress.1163740523.from_port = 3306
- ingress.1163740523.protocol = tcp
- ingress.1163740523.security_groups.# = 0
- ingress.1163740523.self = false
- ingress.1163740523.to_port = 3306
- name = rds_mysql
- owner_id = 706634194319
- tags.% = 1
- tags.Name = terraform
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_security_group.ssh_from_bastion_sg:
- ID = sg-72119b0f
- description = Allow SSH from Bastion host(s)
- egress.# = 0
- ingress.# = 1
- ingress.3517505807.cidr_blocks.# = 0
- ingress.3517505807.from_port = 22
- ingress.3517505807.protocol = tcp
- ingress.3517505807.security_groups.# = 2
- ingress.3517505807.security_groups.1151619385 = sg-78119b05
- ingress.3517505807.security_groups.2513725979 = sg-79119b04
- ingress.3517505807.self = false
- ingress.3517505807.to_port = 22
- name = ssh_from_bastion
- owner_id = 706634194319
- tags.% = 1
- tags.Name = terraform_ssh_from_bastion
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_security_group.bastion_ssh_sg
- aws_security_group.nat
- aws_vpc.default
- aws_security_group.web_access_from_nat_sg:
- ID = sg-70119b0d
- description = Allow web access to the private subnet from the public subnet (via NAT instance)
- egress.# = 1
- egress.482069346.cidr_blocks.# = 1
- egress.482069346.cidr_blocks.0 = 0.0.0.0/0
- egress.482069346.from_port = 0
- egress.482069346.prefix_list_ids.# = 0
- egress.482069346.protocol = -1
- egress.482069346.security_groups.# = 0
- egress.482069346.self = false
- egress.482069346.to_port = 0
- ingress.# = 3
- ingress.1067346089.cidr_blocks.# = 1
- ingress.1067346089.cidr_blocks.0 = 10.0.0.0/24
- ingress.1067346089.from_port = -1
- ingress.1067346089.protocol = icmp
- ingress.1067346089.security_groups.# = 0
- ingress.1067346089.self = false
- ingress.1067346089.to_port = -1
- ingress.1568533442.cidr_blocks.# = 1
- ingress.1568533442.cidr_blocks.0 = 10.0.0.0/24
- ingress.1568533442.from_port = 443
- ingress.1568533442.protocol = tcp
- ingress.1568533442.security_groups.# = 0
- ingress.1568533442.self = false
- ingress.1568533442.to_port = 443
- ingress.2977749764.cidr_blocks.# = 1
- ingress.2977749764.cidr_blocks.0 = 10.0.0.0/24
- ingress.2977749764.from_port = 80
- ingress.2977749764.protocol = tcp
- ingress.2977749764.security_groups.# = 0
- ingress.2977749764.self = false
- ingress.2977749764.to_port = 80
- name = private_subnet_web_access
- owner_id = 706634194319
- tags.% = 1
- tags.Name = terraform
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_subnet.decipher_public
- aws_subnet.decipher_private:
- ID = subnet-7d992750
- availability_zone = us-east-1b
- cidr_block = 10.0.1.0/24
- map_public_ip_on_launch = false
- tags.% = 1
- tags.Name = terraform_private_subnet
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_subnet.decipher_private_2:
- ID = subnet-72bac73b
- availability_zone = us-east-1c
- cidr_block = 10.0.2.0/24
- map_public_ip_on_launch = false
- tags.% = 1
- tags.Name = terraform_private_subnet_2
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_subnet.decipher_public:
- ID = subnet-6299274f
- availability_zone = us-east-1b
- cidr_block = 10.0.0.0/24
- map_public_ip_on_launch = false
- tags.% = 1
- tags.Name = terraform_public_subnet
- vpc_id = vpc-50fe0336
- Dependencies:
- aws_vpc.default
- aws_vpc.default:
- ID = vpc-50fe0336
- cidr_block = 10.0.0.0/16
- default_network_acl_id = acl-c18d31a7
- default_route_table_id = rtb-82fedce4
- default_security_group_id = sg-7d119b00
- dhcp_options_id = dopt-857b9be0
- enable_classiclink = false
- enable_dns_hostnames = true
- enable_dns_support = true
- instance_tenancy = default
- main_route_table_id = rtb-82fedce4
- tags.% = 1
- tags.Name = terraform_vpc
- Outputs:
- bastion_ssh_sg_id = sg-78119b05
- nat_sg_id = sg-79119b04
- private_subnet_2_id = subnet-72bac73b
- private_subnet_id = subnet-7d992750
- public_subnet_id = subnet-6299274f
- rds_mysql_sg = sg-76b5ca0b
- ssh_from_bastion_sg_id = sg-72119b0f
- vpc_id = vpc-50fe0336
- web_access_from_nat_sg_id = sg-70119b0d
- * plan operation: Real and shadow diffs do not match! Real diff:
- module.instances:
- UPDATE: aws_eip.zk.0
- instance: "i-68c81f7f" => "<computed>"
- CREATE: aws_eip.zk.1
- allocation_id: "" => "<computed>"
- association_id: "" => "<computed>"
- domain: "" => "<computed>"
- instance: "" => "<computed>"
- network_interface: "" => "<computed>"
- private_ip: "" => "<computed>"
- public_ip: "" => "<computed>"
- vpc: "" => "true" (forces new resource)
- CREATE: aws_eip.zk.2
- allocation_id: "" => "<computed>"
- association_id: "" => "<computed>"
- domain: "" => "<computed>"
- instance: "" => "<computed>"
- network_interface: "" => "<computed>"
- private_ip: "" => "<computed>"
- public_ip: "" => "<computed>"
- vpc: "" => "true" (forces new resource)
- CREATE: aws_instance.zk_node.1
- ami: "" => "ami-97a7a180" (forces new resource)
- associate_public_ip_address: "" => "true" (forces new resource)
- availability_zone: "" => "us-east-1b" (forces new resource)
- ebs_block_device.#: "" => "<computed>"
- ephemeral_block_device.#: "" => "<computed>" (forces new resource)
- instance_state: "" => "<computed>"
- instance_type: "" => "t2.micro" (forces new resource)
- key_name: "" => "test-infrastructure" (forces new resource)
- network_interface_id: "" => "<computed>"
- placement_group: "" => "<computed>" (forces new resource)
- private_dns: "" => "<computed>"
- private_ip: "" => "<computed>" (forces new resource)
- public_dns: "" => "<computed>"
- public_ip: "" => "<computed>"
- root_block_device.#: "" => "<computed>"
- security_groups.#: "" => "<computed>" (forces new resource)
- source_dest_check: "" => "true"
- subnet_id: "" => "subnet-7d992750" (forces new resource)
- tags.%: "" => "1"
- tags.Name: "" => "zk_node"
- tenancy: "" => "<computed>" (forces new resource)
- vpc_security_group_ids.#: "" => "1"
- vpc_security_group_ids.2112837917: "" => "sg-f4470d89"
- CREATE: aws_instance.zk_node.2
- ami: "" => "ami-97a7a180" (forces new resource)
- associate_public_ip_address: "" => "true" (forces new resource)
- availability_zone: "" => "us-east-1b" (forces new resource)
- ebs_block_device.#: "" => "<computed>"
- ephemeral_block_device.#: "" => "<computed>" (forces new resource)
- instance_state: "" => "<computed>"
- instance_type: "" => "t2.micro" (forces new resource)
- key_name: "" => "test-infrastructure" (forces new resource)
- network_interface_id: "" => "<computed>"
- placement_group: "" => "<computed>" (forces new resource)
- private_dns: "" => "<computed>"
- private_ip: "" => "<computed>" (forces new resource)
- public_dns: "" => "<computed>"
- public_ip: "" => "<computed>"
- root_block_device.#: "" => "<computed>"
- security_groups.#: "" => "<computed>" (forces new resource)
- source_dest_check: "" => "true"
- subnet_id: "" => "subnet-7d992750" (forces new resource)
- tags.%: "" => "1"
- tags.Name: "" => "zk_node"
- tenancy: "" => "<computed>" (forces new resource)
- vpc_security_group_ids.#: "" => "1"
- vpc_security_group_ids.2112837917: "" => "sg-f4470d89"
- module.rds:
- module.vpc:
- UPDATE: aws_eip.nat
- instance: "i-e8fe29ff" => "<computed>"
- DESTROY/CREATE: aws_instance.nat
- ami: "ami-0dd7e61a" => "ami-0dd7e61a"
- associate_public_ip_address: "true" => "true"
- availability_zone: "us-east-1b" => "us-east-1b"
- ebs_block_device.#: "0" => "<computed>"
- ephemeral_block_device.#: "0" => "<computed>"
- instance_state: "running" => "<computed>"
- instance_type: "t2.small" => "t2.small"
- key_name: "test-infrastructure" => "test-infrastructure"
- network_interface_id: "eni-73c78c8d" => "<computed>"
- placement_group: "" => "<computed>"
- private_dns: "ip-10-0-0-34.ec2.internal" => "<computed>"
- private_ip: "10.0.0.34" => "<computed>"
- public_dns: "ec2-34-193-25-59.compute-1.amazonaws.com" => "<computed>"
- public_ip: "34.193.25.59" => "<computed>"
- root_block_device.#: "1" => "<computed>"
- security_groups.#: "0" => "2" (forces new resource)
- security_groups.2513725979: "" => "sg-79119b04" (forces new resource)
- security_groups.955802421: "" => "sg-76b5ca0b" (forces new resource)
- source_dest_check: "false" => "false"
- subnet_id: "subnet-6299274f" => "subnet-6299274f"
- tags.%: "1" => "1"
- tags.Name: "terraform_nat_instance" => "terraform_nat_instance"
- tenancy: "default" => "<computed>"
- vpc_security_group_ids.#: "2" => "<computed>"
- UPDATE: aws_route_table.decipher_private
- route.924992980.cidr_block: "0.0.0.0/0" => ""
- route.924992980.gateway_id: "" => ""
- route.924992980.instance_id: "i-e8fe29ff" => ""
- route.924992980.nat_gateway_id: "" => ""
- route.924992980.network_interface_id: "eni-73c78c8d" => ""
- route.924992980.vpc_peering_connection_id: "" => ""
- route.~2469360411.cidr_block: "" => "0.0.0.0/0"
- route.~2469360411.gateway_id: "" => ""
- route.~2469360411.instance_id: "" => "<computed>"
- route.~2469360411.nat_gateway_id: "" => ""
- route.~2469360411.network_interface_id: "" => ""
- route.~2469360411.vpc_peering_connection_id: "" => ""
- UPDATE: aws_route_table.decipher_private_2
- route.924992980.cidr_block: "0.0.0.0/0" => ""
- route.924992980.gateway_id: "" => ""
- route.924992980.instance_id: "i-e8fe29ff" => ""
- route.924992980.nat_gateway_id: "" => ""
- route.924992980.network_interface_id: "eni-73c78c8d" => ""
- route.924992980.vpc_peering_connection_id: "" => ""
- route.~2469360411.cidr_block: "" => "0.0.0.0/0"
- route.~2469360411.gateway_id: "" => ""
- route.~2469360411.instance_id: "" => "<computed>"
- route.~2469360411.nat_gateway_id: "" => ""
- route.~2469360411.network_interface_id: "" => ""
- route.~2469360411.vpc_peering_connection_id: "" => ""
- Shadow diff:
- module.instances:
- CREATE: aws_instance.zk_node.1
- ami: "" => "ami-97a7a180" (forces new resource)
- associate_public_ip_address: "" => "true" (forces new resource)
- availability_zone: "" => "us-east-1b" (forces new resource)
- ebs_block_device.#: "" => "<computed>"
- ephemeral_block_device.#: "" => "<computed>" (forces new resource)
- instance_state: "" => "<computed>"
- instance_type: "" => "t2.micro" (forces new resource)
- key_name: "" => "test-infrastructure" (forces new resource)
- network_interface_id: "" => "<computed>"
- placement_group: "" => "<computed>" (forces new resource)
- private_dns: "" => "<computed>"
- private_ip: "" => "<computed>" (forces new resource)
- public_dns: "" => "<computed>"
- public_ip: "" => "<computed>"
- root_block_device.#: "" => "<computed>"
- security_groups.#: "" => "<computed>" (forces new resource)
- source_dest_check: "" => "true"
- subnet_id: "" => "subnet-7d992750" (forces new resource)
- tags.%: "" => "1"
- tags.Name: "" => "zk_node"
- tenancy: "" => "<computed>" (forces new resource)
- vpc_security_group_ids.#: "" => "1"
- vpc_security_group_ids.2112837917: "" => "sg-f4470d89"
- CREATE: aws_instance.zk_node.2
- ami: "" => "ami-97a7a180" (forces new resource)
- associate_public_ip_address: "" => "true" (forces new resource)
- availability_zone: "" => "us-east-1b" (forces new resource)
- ebs_block_device.#: "" => "<computed>"
- ephemeral_block_device.#: "" => "<computed>" (forces new resource)
- instance_state: "" => "<computed>"
- instance_type: "" => "t2.micro" (forces new resource)
- key_name: "" => "test-infrastructure" (forces new resource)
- network_interface_id: "" => "<computed>"
- placement_group: "" => "<computed>" (forces new resource)
- private_dns: "" => "<computed>"
- private_ip: "" => "<computed>" (forces new resource)
- public_dns: "" => "<computed>"
- public_ip: "" => "<computed>"
- root_block_device.#: "" => "<computed>"
- security_groups.#: "" => "<computed>" (forces new resource)
- source_dest_check: "" => "true"
- subnet_id: "" => "subnet-7d992750" (forces new resource)
- tags.%: "" => "1"
- tags.Name: "" => "zk_node"
- tenancy: "" => "<computed>" (forces new resource)
- vpc_security_group_ids.#: "" => "1"
- vpc_security_group_ids.2112837917: "" => "sg-f4470d89"
- module.rds:
- module.vpc:
- UPDATE: aws_eip.nat
- instance: "i-e8fe29ff" => "<computed>"
- DESTROY/CREATE: aws_instance.nat
- ami: "ami-0dd7e61a" => "ami-0dd7e61a"
- associate_public_ip_address: "true" => "true"
- availability_zone: "us-east-1b" => "us-east-1b"
- ebs_block_device.#: "0" => "<computed>"
- ephemeral_block_device.#: "0" => "<computed>"
- instance_state: "running" => "<computed>"
- instance_type: "t2.small" => "t2.small"
- key_name: "test-infrastructure" => "test-infrastructure"
- network_interface_id: "eni-73c78c8d" => "<computed>"
- placement_group: "" => "<computed>"
- private_dns: "ip-10-0-0-34.ec2.internal" => "<computed>"
- private_ip: "10.0.0.34" => "<computed>"
- public_dns: "ec2-34-193-25-59.compute-1.amazonaws.com" => "<computed>"
- public_ip: "34.193.25.59" => "<computed>"
- root_block_device.#: "1" => "<computed>"
- security_groups.#: "0" => "2" (forces new resource)
- security_groups.2513725979: "" => "sg-79119b04" (forces new resource)
- security_groups.955802421: "" => "sg-76b5ca0b" (forces new resource)
- source_dest_check: "false" => "false"
- subnet_id: "subnet-6299274f" => "subnet-6299274f"
- tags.%: "1" => "1"
- tags.Name: "terraform_nat_instance" => "terraform_nat_instance"
- tenancy: "default" => "<computed>"
- vpc_security_group_ids.#: "2" => "<computed>"
- UPDATE: aws_route_table.decipher_private
- route.924992980.cidr_block: "0.0.0.0/0" => ""
- route.924992980.gateway_id: "" => ""
- route.924992980.instance_id: "i-e8fe29ff" => ""
- route.924992980.nat_gateway_id: "" => ""
- route.924992980.network_interface_id: "eni-73c78c8d" => ""
- route.924992980.vpc_peering_connection_id: "" => ""
- route.~2469360411.cidr_block: "" => "0.0.0.0/0"
- route.~2469360411.gateway_id: "" => ""
- route.~2469360411.instance_id: "" => "<computed>"
- route.~2469360411.nat_gateway_id: "" => ""
- route.~2469360411.network_interface_id: "" => ""
- route.~2469360411.vpc_peering_connection_id: "" => ""
- UPDATE: aws_route_table.decipher_private_2
- route.924992980.cidr_block: "0.0.0.0/0" => ""
- route.924992980.gateway_id: "" => ""
- route.924992980.instance_id: "i-e8fe29ff" => ""
- route.924992980.nat_gateway_id: "" => ""
- route.924992980.network_interface_id: "eni-73c78c8d" => ""
- route.924992980.vpc_peering_connection_id: "" => ""
- route.~2469360411.cidr_block: "" => "0.0.0.0/0"
- route.~2469360411.gateway_id: "" => ""
- route.~2469360411.instance_id: "" => "<computed>"
- route.~2469360411.nat_gateway_id: "" => ""
- route.~2469360411.network_interface_id: "" => ""
- route.~2469360411.vpc_peering_connection_id: "" => ""
- * plan operation: Resource 'aws_instance.zk_node.1' does not have attribute 'id' for variable 'aws_instance.zk_node.1.id'
- * plan operation: Resource 'aws_instance.zk_node.1' does not have attribute 'id' for variable 'aws_instance.zk_node.1.id'
- * plan operation: Resource 'aws_instance.zk_node.1' does not have attribute 'id' for variable 'aws_instance.zk_node.1.id'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement