Advertisement
Guest User

Untitled

a guest
Dec 7th, 2016
124
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 61.93 KB | None | 0 0
  1. 5 error(s) occurred:
  2.  
  3. * plan operation: Real and shadow states do not match! Real state:
  4.  
  5. <no state>
  6. module.child:
  7. <no state>
  8. Outputs:
  9.  
  10. received = 1GB
  11. module.instances:
  12. aws_eip.zk.0:
  13. ID = eipalloc-3eb04400
  14. association_id = eipassoc-b5def18a
  15. domain = vpc
  16. instance = 74D93920-ED26-11E3-AC10-0800200C9A66
  17. network_interface = eni-a3aae15d
  18. private_ip = 10.0.1.231
  19. public_ip = 34.194.147.231
  20. vpc = true
  21.  
  22. Dependencies:
  23. aws_instance.zk_node
  24. aws_instance.priv_networktest:
  25. ID = i-6ec81f79
  26. ami = ami-02417f15
  27. associate_public_ip_address = false
  28. availability_zone = us-east-1b
  29. disable_api_termination = false
  30. ebs_block_device.# = 0
  31. ebs_optimized = false
  32. ephemeral_block_device.# = 0
  33. iam_instance_profile =
  34. instance_state = running
  35. instance_type = t2.micro
  36. key_name = test-infrastructure
  37. monitoring = false
  38. network_interface_id = eni-bba9e245
  39. private_dns = ip-10-0-1-46.ec2.internal
  40. private_ip = 10.0.1.46
  41. public_dns =
  42. public_ip =
  43. root_block_device.# = 1
  44. root_block_device.0.delete_on_termination = true
  45. root_block_device.0.iops = 100
  46. root_block_device.0.volume_size = 8
  47. root_block_device.0.volume_type = gp2
  48. security_groups.# = 0
  49. source_dest_check = true
  50. subnet_id = subnet-7d992750
  51. tags.% = 1
  52. tags.Name = priv_networktest
  53. tenancy = default
  54. vpc_security_group_ids.# = 1
  55. vpc_security_group_ids.699898438 = sg-f7470d8a
  56.  
  57. Dependencies:
  58. aws_security_group.pub_networktest_sg
  59. aws_instance.pub_networktest:
  60. ID = i-69c81f7e
  61. ami = ami-02417f15
  62. associate_public_ip_address = true
  63. availability_zone = us-east-1b
  64. disable_api_termination = false
  65. ebs_block_device.# = 0
  66. ebs_optimized = false
  67. ephemeral_block_device.# = 0
  68. iam_instance_profile =
  69. instance_state = running
  70. instance_type = t2.micro
  71. key_name = test-infrastructure
  72. monitoring = false
  73. network_interface_id = eni-8fade671
  74. private_dns = ip-10-0-0-61.ec2.internal
  75. private_ip = 10.0.0.61
  76. public_dns = ec2-54-90-79-184.compute-1.amazonaws.com
  77. public_ip = 54.90.79.184
  78. root_block_device.# = 1
  79. root_block_device.0.delete_on_termination = true
  80. root_block_device.0.iops = 100
  81. root_block_device.0.volume_size = 8
  82. root_block_device.0.volume_type = gp2
  83. security_groups.# = 0
  84. source_dest_check = true
  85. subnet_id = subnet-6299274f
  86. tags.% = 1
  87. tags.Name = pub_networktest
  88. tenancy = default
  89. vpc_security_group_ids.# = 1
  90. vpc_security_group_ids.699898438 = sg-f7470d8a
  91.  
  92. Dependencies:
  93. aws_security_group.pub_networktest_sg
  94. aws_instance.pub_odrive:
  95. ID = i-c634fdd1
  96. ami = ami-bcd0d7ab
  97. associate_public_ip_address = true
  98. availability_zone = us-east-1b
  99. disable_api_termination = false
  100. ebs_block_device.# = 0
  101. ebs_optimized = false
  102. ephemeral_block_device.# = 0
  103. iam_instance_profile =
  104. instance_state = running
  105. instance_type = t2.micro
  106. key_name = test-infrastructure
  107. monitoring = false
  108. network_interface_id = eni-118df1ef
  109. private_dns = ip-10-0-0-22.ec2.internal
  110. private_ip = 10.0.0.22
  111. public_dns = ec2-107-21-158-0.compute-1.amazonaws.com
  112. public_ip = 107.21.158.0
  113. root_block_device.# = 1
  114. root_block_device.0.delete_on_termination = false
  115. root_block_device.0.iops = 0
  116. root_block_device.0.volume_size = 8
  117. root_block_device.0.volume_type = standard
  118. security_groups.# = 0
  119. source_dest_check = true
  120. subnet_id = subnet-6299274f
  121. tags.% = 1
  122. tags.Name = pub_odrive
  123. tenancy = default
  124. vpc_security_group_ids.# = 1
  125. vpc_security_group_ids.1135247480 = sg-185e1d65
  126.  
  127. Dependencies:
  128. aws_security_group.odrive_microservices_sg
  129. aws_instance.zk_node.0:
  130. ID = i-68c81f7f
  131. ami = ami-97a7a180
  132. associate_public_ip_address = true
  133. availability_zone = us-east-1b
  134. disable_api_termination = false
  135. ebs_block_device.# = 0
  136. ebs_optimized = false
  137. ephemeral_block_device.# = 0
  138. iam_instance_profile =
  139. instance_state = running
  140. instance_type = t2.micro
  141. key_name = test-infrastructure
  142. monitoring = false
  143. network_interface_id = eni-a3aae15d
  144. private_dns = ip-10-0-1-231.ec2.internal
  145. private_ip = 10.0.1.231
  146. public_dns = ec2-34-194-147-231.compute-1.amazonaws.com
  147. public_ip = 34.194.147.231
  148. root_block_device.# = 1
  149. root_block_device.0.delete_on_termination = true
  150. root_block_device.0.iops = 100
  151. root_block_device.0.volume_size = 8
  152. root_block_device.0.volume_type = gp2
  153. security_groups.# = 0
  154. source_dest_check = true
  155. subnet_id = subnet-7d992750
  156. tags.% = 1
  157. tags.Name = zk_node
  158. tenancy = default
  159. vpc_security_group_ids.# = 1
  160. vpc_security_group_ids.2112837917 = sg-f4470d89
  161.  
  162. Dependencies:
  163. aws_security_group.zk_sg
  164. aws_security_group.odrive_microservices_sg:
  165. ID = sg-185e1d65
  166. description = Required open ports for object-drive and other microservices
  167. egress.# = 1
  168. egress.482069346.cidr_blocks.# = 1
  169. egress.482069346.cidr_blocks.0 = 0.0.0.0/0
  170. egress.482069346.from_port = 0
  171. egress.482069346.prefix_list_ids.# = 0
  172. egress.482069346.protocol = -1
  173. egress.482069346.security_groups.# = 0
  174. egress.482069346.self = false
  175. egress.482069346.to_port = 0
  176. ingress.# = 5
  177. ingress.1203902316.cidr_blocks.# = 1
  178. ingress.1203902316.cidr_blocks.0 = 0.0.0.0/0
  179. ingress.1203902316.from_port = 4430
  180. ingress.1203902316.protocol = tcp
  181. ingress.1203902316.security_groups.# = 0
  182. ingress.1203902316.self = false
  183. ingress.1203902316.to_port = 4430
  184. ingress.1799340084.cidr_blocks.# = 1
  185. ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
  186. ingress.1799340084.from_port = -1
  187. ingress.1799340084.protocol = icmp
  188. ingress.1799340084.security_groups.# = 0
  189. ingress.1799340084.self = false
  190. ingress.1799340084.to_port = -1
  191. ingress.2172623744.cidr_blocks.# = 1
  192. ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0
  193. ingress.2172623744.from_port = 9999
  194. ingress.2172623744.protocol = tcp
  195. ingress.2172623744.security_groups.# = 0
  196. ingress.2172623744.self = false
  197. ingress.2172623744.to_port = 9999
  198. ingress.2541437006.cidr_blocks.# = 1
  199. ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
  200. ingress.2541437006.from_port = 22
  201. ingress.2541437006.protocol = tcp
  202. ingress.2541437006.security_groups.# = 0
  203. ingress.2541437006.self = false
  204. ingress.2541437006.to_port = 22
  205. ingress.2617001939.cidr_blocks.# = 1
  206. ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0
  207. ingress.2617001939.from_port = 443
  208. ingress.2617001939.protocol = tcp
  209. ingress.2617001939.security_groups.# = 0
  210. ingress.2617001939.self = false
  211. ingress.2617001939.to_port = 443
  212. name = odrive_microservices_sg
  213. owner_id = 706634194319
  214. tags.% = 1
  215. tags.Name = odrive_sg
  216. vpc_id = vpc-50fe0336
  217. aws_security_group.pub_networktest_sg:
  218. ID = sg-f7470d8a
  219. description = Allow traffic to pass from the private subnet to the internet
  220. egress.# = 1
  221. egress.482069346.cidr_blocks.# = 1
  222. egress.482069346.cidr_blocks.0 = 0.0.0.0/0
  223. egress.482069346.from_port = 0
  224. egress.482069346.prefix_list_ids.# = 0
  225. egress.482069346.protocol = -1
  226. egress.482069346.security_groups.# = 0
  227. egress.482069346.self = false
  228. egress.482069346.to_port = 0
  229. ingress.# = 6
  230. ingress.1799340084.cidr_blocks.# = 1
  231. ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
  232. ingress.1799340084.from_port = -1
  233. ingress.1799340084.protocol = icmp
  234. ingress.1799340084.security_groups.# = 0
  235. ingress.1799340084.self = false
  236. ingress.1799340084.to_port = -1
  237. ingress.2172623744.cidr_blocks.# = 1
  238. ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0
  239. ingress.2172623744.from_port = 9999
  240. ingress.2172623744.protocol = tcp
  241. ingress.2172623744.security_groups.# = 0
  242. ingress.2172623744.self = false
  243. ingress.2172623744.to_port = 9999
  244. ingress.2214680975.cidr_blocks.# = 1
  245. ingress.2214680975.cidr_blocks.0 = 0.0.0.0/0
  246. ingress.2214680975.from_port = 80
  247. ingress.2214680975.protocol = tcp
  248. ingress.2214680975.security_groups.# = 0
  249. ingress.2214680975.self = false
  250. ingress.2214680975.to_port = 80
  251. ingress.2541437006.cidr_blocks.# = 1
  252. ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
  253. ingress.2541437006.from_port = 22
  254. ingress.2541437006.protocol = tcp
  255. ingress.2541437006.security_groups.# = 0
  256. ingress.2541437006.self = false
  257. ingress.2541437006.to_port = 22
  258. ingress.2617001939.cidr_blocks.# = 1
  259. ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0
  260. ingress.2617001939.from_port = 443
  261. ingress.2617001939.protocol = tcp
  262. ingress.2617001939.security_groups.# = 0
  263. ingress.2617001939.self = false
  264. ingress.2617001939.to_port = 443
  265. ingress.516175195.cidr_blocks.# = 1
  266. ingress.516175195.cidr_blocks.0 = 0.0.0.0/0
  267. ingress.516175195.from_port = 8080
  268. ingress.516175195.protocol = tcp
  269. ingress.516175195.security_groups.# = 0
  270. ingress.516175195.self = false
  271. ingress.516175195.to_port = 8080
  272. name = pub_networktest_sg
  273. owner_id = 706634194319
  274. tags.% = 1
  275. tags.Name = terraform
  276. vpc_id = vpc-50fe0336
  277. aws_security_group.zk_sg:
  278. ID = sg-f4470d89
  279. description = Zookeeper ports
  280. egress.# = 1
  281. egress.482069346.cidr_blocks.# = 1
  282. egress.482069346.cidr_blocks.0 = 0.0.0.0/0
  283. egress.482069346.from_port = 0
  284. egress.482069346.prefix_list_ids.# = 0
  285. egress.482069346.protocol = -1
  286. egress.482069346.security_groups.# = 0
  287. egress.482069346.self = false
  288. egress.482069346.to_port = 0
  289. ingress.# = 3
  290. ingress.1799340084.cidr_blocks.# = 1
  291. ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
  292. ingress.1799340084.from_port = -1
  293. ingress.1799340084.protocol = icmp
  294. ingress.1799340084.security_groups.# = 0
  295. ingress.1799340084.self = false
  296. ingress.1799340084.to_port = -1
  297. ingress.2541437006.cidr_blocks.# = 1
  298. ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
  299. ingress.2541437006.from_port = 22
  300. ingress.2541437006.protocol = tcp
  301. ingress.2541437006.security_groups.# = 0
  302. ingress.2541437006.self = false
  303. ingress.2541437006.to_port = 22
  304. ingress.4023360382.cidr_blocks.# = 1
  305. ingress.4023360382.cidr_blocks.0 = 10.0.0.0/16
  306. ingress.4023360382.from_port = 2181
  307. ingress.4023360382.protocol = tcp
  308. ingress.4023360382.security_groups.# = 0
  309. ingress.4023360382.self = false
  310. ingress.4023360382.to_port = 2181
  311. name = zk_sg
  312. owner_id = 706634194319
  313. tags.% = 1
  314. tags.Name = zk_sg
  315. vpc_id = vpc-50fe0336
  316.  
  317. Outputs:
  318.  
  319. odrive_microservices_sg = sg-185e1d65
  320. pub_networktest_sg = sg-f7470d8a
  321. zk_sg = sg-f4470d89
  322. module.rds:
  323. aws_db_instance.odrive:
  324. ID = tf-20161207154908631239504b4t
  325. address = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com
  326. allocated_storage = 10
  327. apply_immediately = true
  328. arn = arn:aws:rds:us-east-1:706634194319:db:tf-20161207154908631239504b4t
  329. auto_minor_version_upgrade = true
  330. availability_zone = us-east-1b
  331. backup_retention_period = 0
  332. backup_window = 07:37-08:07
  333. copy_tags_to_snapshot = false
  334. db_subnet_group_name = main
  335. endpoint = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com:3306
  336. engine = mysql
  337. engine_version = 5.6.27
  338. hosted_zone_id = Z2R2ITUGPM61AM
  339. identifier = tf-20161207154908631239504b4t
  340. instance_class = db.t2.micro
  341. iops = 0
  342. kms_key_id =
  343. license_model = general-public-license
  344. maintenance_window = mon:10:19-mon:10:49
  345. monitoring_interval = 0
  346. multi_az = false
  347. name = metadatadb
  348. option_group_name = default:mysql-5-6
  349. parameter_group_name = odrive-pg
  350. password = dbRootPassword
  351. port = 3306
  352. publicly_accessible = true
  353. replicas.# = 0
  354. replicate_source_db =
  355. security_group_names.# = 0
  356. skip_final_snapshot = true
  357. status = available
  358. storage_encrypted = false
  359. storage_type = standard
  360. tags.% = 0
  361. username = dbRootUser
  362. vpc_security_group_ids.# = 1
  363. vpc_security_group_ids.955802421 = sg-76b5ca0b
  364.  
  365. Dependencies:
  366. aws_db_subnet_group.main
  367. aws_db_parameter_group.odrive_pg
  368. aws_db_parameter_group.odrive_pg:
  369. ID = odrive-pg
  370. arn = arn:aws:rds:us-east-1:706634194319:pg:odrive-pg
  371. description = Custom Parameter Group for Object Drive
  372. family = mysql5.6
  373. name = odrive-pg
  374. parameter.# = 1
  375. parameter.950177639.apply_method = immediate
  376. parameter.950177639.name = log_bin_trust_function_creators
  377. parameter.950177639.value = 1
  378. tags.% = 0
  379. aws_db_subnet_group.main:
  380. ID = main
  381. arn = arn:aws:rds:us-east-1:706634194319:subgrp:main
  382. description = Managed by Terraform
  383. name = main
  384. subnet_ids.# = 3
  385. subnet_ids.2727810170 = subnet-72bac73b
  386. subnet_ids.741755728 = subnet-7d992750
  387. subnet_ids.998920899 = subnet-6299274f
  388. tags.% = 1
  389. tags.Name = terraform_db_subnet_group
  390. module.vpc:
  391. aws_eip.nat:
  392. ID = eipalloc-c15748fe
  393. association_id = eipassoc-56c7e869
  394. domain = vpc
  395. instance = 74D93920-ED26-11E3-AC10-0800200C9A66
  396. network_interface = eni-73c78c8d
  397. private_ip = 10.0.0.34
  398. public_ip = 34.193.25.59
  399. vpc = true
  400.  
  401. Dependencies:
  402. aws_instance.nat
  403. aws_instance.nat:
  404. ID = i-e8fe29ff
  405. ami = ami-0dd7e61a
  406. associate_public_ip_address = true
  407. availability_zone = us-east-1b
  408. disable_api_termination = false
  409. ebs_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
  410. ebs_optimized = false
  411. ephemeral_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
  412. iam_instance_profile =
  413. instance_state = 74D93920-ED26-11E3-AC10-0800200C9A66
  414. instance_type = t2.small
  415. key_name = test-infrastructure
  416. monitoring = false
  417. network_interface_id = 74D93920-ED26-11E3-AC10-0800200C9A66
  418. placement_group = 74D93920-ED26-11E3-AC10-0800200C9A66
  419. private_dns = 74D93920-ED26-11E3-AC10-0800200C9A66
  420. private_ip = 74D93920-ED26-11E3-AC10-0800200C9A66
  421. public_dns = 74D93920-ED26-11E3-AC10-0800200C9A66
  422. public_ip = 74D93920-ED26-11E3-AC10-0800200C9A66
  423. root_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
  424. root_block_device.0.delete_on_termination = true
  425. root_block_device.0.iops = 100
  426. root_block_device.0.volume_size = 8
  427. root_block_device.0.volume_type = gp2
  428. security_groups.# = 2
  429. security_groups.2513725979 = sg-79119b04
  430. security_groups.955802421 = sg-76b5ca0b
  431. source_dest_check = false
  432. subnet_id = subnet-6299274f
  433. tags.% = 1
  434. tags.Name = terraform_nat_instance
  435. tenancy = 74D93920-ED26-11E3-AC10-0800200C9A66
  436. vpc_security_group_ids.# = 74D93920-ED26-11E3-AC10-0800200C9A66
  437. vpc_security_group_ids.2513725979 = sg-79119b04
  438. vpc_security_group_ids.955802421 = sg-76b5ca0b
  439.  
  440. Dependencies:
  441. aws_security_group.rds_mysql_sg
  442. aws_subnet.decipher_public
  443. aws_security_group.nat
  444. aws_internet_gateway.default:
  445. ID = igw-51883236
  446. tags.% = 1
  447. tags.Name = terraform_igw
  448. vpc_id = vpc-50fe0336
  449.  
  450. Dependencies:
  451. aws_vpc.default
  452. aws_route_table.decipher_private:
  453. ID = rtb-6afddf0c
  454. propagating_vgws.# = 0
  455. route.# = 1
  456. route.~2469360411.cidr_block = 0.0.0.0/0
  457. route.~2469360411.gateway_id =
  458. route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66
  459. route.~2469360411.nat_gateway_id =
  460. route.~2469360411.network_interface_id =
  461. route.~2469360411.vpc_peering_connection_id =
  462. tags.% = 1
  463. tags.Name = terraform_private_subnet_route_table
  464. vpc_id = vpc-50fe0336
  465.  
  466. Dependencies:
  467. aws_vpc.default
  468. aws_instance.nat
  469. aws_route_table.decipher_private_2:
  470. ID = rtb-56a39130
  471. propagating_vgws.# = 0
  472. route.# = 1
  473. route.~2469360411.cidr_block = 0.0.0.0/0
  474. route.~2469360411.gateway_id =
  475. route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66
  476. route.~2469360411.nat_gateway_id =
  477. route.~2469360411.network_interface_id =
  478. route.~2469360411.vpc_peering_connection_id =
  479. tags.% = 1
  480. tags.Name = terraform_private_subnet_2_route_table
  481. vpc_id = vpc-50fe0336
  482.  
  483. Dependencies:
  484. aws_instance.nat
  485. aws_vpc.default
  486. aws_route_table.decipher_public:
  487. ID = rtb-8efedce8
  488. propagating_vgws.# = 0
  489. route.# = 1
  490. route.3761165403.cidr_block = 0.0.0.0/0
  491. route.3761165403.gateway_id = igw-51883236
  492. route.3761165403.instance_id =
  493. route.3761165403.nat_gateway_id =
  494. route.3761165403.network_interface_id =
  495. route.3761165403.vpc_peering_connection_id =
  496. tags.% = 1
  497. tags.Name = terraform_public_subnet_route_table
  498. vpc_id = vpc-50fe0336
  499.  
  500. Dependencies:
  501. aws_vpc.default
  502. aws_internet_gateway.default
  503. aws_route_table_association.decipher_private:
  504. ID = rtbassoc-b8c0f5c1
  505. route_table_id = rtb-6afddf0c
  506. subnet_id = subnet-7d992750
  507.  
  508. Dependencies:
  509. aws_subnet.decipher_private
  510. aws_route_table.decipher_private
  511. aws_route_table_association.decipher_private_2:
  512. ID = rtbassoc-c0e4e5b9
  513. route_table_id = rtb-56a39130
  514. subnet_id = subnet-72bac73b
  515.  
  516. Dependencies:
  517. aws_route_table.decipher_private_2
  518. aws_subnet.decipher_private_2
  519. aws_route_table_association.decipher_public:
  520. ID = rtbassoc-29c6f350
  521. route_table_id = rtb-8efedce8
  522. subnet_id = subnet-6299274f
  523.  
  524. Dependencies:
  525. aws_subnet.decipher_public
  526. aws_route_table.decipher_public
  527. aws_security_group.bastion_ssh_sg:
  528. ID = sg-78119b05
  529. description = Allow SSH to Bastion host from approved ranges
  530. egress.# = 1
  531. egress.482069346.cidr_blocks.# = 1
  532. egress.482069346.cidr_blocks.0 = 0.0.0.0/0
  533. egress.482069346.from_port = 0
  534. egress.482069346.prefix_list_ids.# = 0
  535. egress.482069346.protocol = -1
  536. egress.482069346.security_groups.# = 0
  537. egress.482069346.self = false
  538. egress.482069346.to_port = 0
  539. ingress.# = 1
  540. ingress.2541437006.cidr_blocks.# = 1
  541. ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
  542. ingress.2541437006.from_port = 22
  543. ingress.2541437006.protocol = tcp
  544. ingress.2541437006.security_groups.# = 0
  545. ingress.2541437006.self = false
  546. ingress.2541437006.to_port = 22
  547. name = bastion_ssh
  548. owner_id = 706634194319
  549. tags.% = 1
  550. tags.Name = terraform_bastion_ssh
  551. vpc_id = vpc-50fe0336
  552.  
  553. Dependencies:
  554. aws_vpc.default
  555. aws_security_group.nat:
  556. ID = sg-79119b04
  557. description = Allow traffic to pass from the private subnet to the internet
  558. egress.# = 1
  559. egress.482069346.cidr_blocks.# = 1
  560. egress.482069346.cidr_blocks.0 = 0.0.0.0/0
  561. egress.482069346.from_port = 0
  562. egress.482069346.prefix_list_ids.# = 0
  563. egress.482069346.protocol = -1
  564. egress.482069346.security_groups.# = 0
  565. egress.482069346.self = false
  566. egress.482069346.to_port = 0
  567. ingress.# = 3
  568. ingress.2582209309.cidr_blocks.# = 1
  569. ingress.2582209309.cidr_blocks.0 = 10.0.1.0/24
  570. ingress.2582209309.from_port = -1
  571. ingress.2582209309.protocol = icmp
  572. ingress.2582209309.security_groups.# = 0
  573. ingress.2582209309.self = false
  574. ingress.2582209309.to_port = -1
  575. ingress.386650288.cidr_blocks.# = 1
  576. ingress.386650288.cidr_blocks.0 = 10.0.1.0/24
  577. ingress.386650288.from_port = 80
  578. ingress.386650288.protocol = tcp
  579. ingress.386650288.security_groups.# = 0
  580. ingress.386650288.self = false
  581. ingress.386650288.to_port = 80
  582. ingress.4211794038.cidr_blocks.# = 1
  583. ingress.4211794038.cidr_blocks.0 = 10.0.1.0/24
  584. ingress.4211794038.from_port = 443
  585. ingress.4211794038.protocol = tcp
  586. ingress.4211794038.security_groups.# = 0
  587. ingress.4211794038.self = false
  588. ingress.4211794038.to_port = 443
  589. name = vpc_nat
  590. owner_id = 706634194319
  591. tags.% = 1
  592. tags.Name = terraform
  593. vpc_id = vpc-50fe0336
  594.  
  595. Dependencies:
  596. aws_vpc.default
  597. aws_security_group.rds_mysql_sg:
  598. ID = sg-76b5ca0b
  599. description = Allow traffic to pass from internet to RDS MySQL
  600. egress.# = 1
  601. egress.482069346.cidr_blocks.# = 1
  602. egress.482069346.cidr_blocks.0 = 0.0.0.0/0
  603. egress.482069346.from_port = 0
  604. egress.482069346.prefix_list_ids.# = 0
  605. egress.482069346.protocol = -1
  606. egress.482069346.security_groups.# = 0
  607. egress.482069346.self = false
  608. egress.482069346.to_port = 0
  609. ingress.# = 1
  610. ingress.1163740523.cidr_blocks.# = 1
  611. ingress.1163740523.cidr_blocks.0 = 0.0.0.0/0
  612. ingress.1163740523.from_port = 3306
  613. ingress.1163740523.protocol = tcp
  614. ingress.1163740523.security_groups.# = 0
  615. ingress.1163740523.self = false
  616. ingress.1163740523.to_port = 3306
  617. name = rds_mysql
  618. owner_id = 706634194319
  619. tags.% = 1
  620. tags.Name = terraform
  621. vpc_id = vpc-50fe0336
  622.  
  623. Dependencies:
  624. aws_vpc.default
  625. aws_security_group.ssh_from_bastion_sg:
  626. ID = sg-72119b0f
  627. description = Allow SSH from Bastion host(s)
  628. egress.# = 0
  629. ingress.# = 1
  630. ingress.3517505807.cidr_blocks.# = 0
  631. ingress.3517505807.from_port = 22
  632. ingress.3517505807.protocol = tcp
  633. ingress.3517505807.security_groups.# = 2
  634. ingress.3517505807.security_groups.1151619385 = sg-78119b05
  635. ingress.3517505807.security_groups.2513725979 = sg-79119b04
  636. ingress.3517505807.self = false
  637. ingress.3517505807.to_port = 22
  638. name = ssh_from_bastion
  639. owner_id = 706634194319
  640. tags.% = 1
  641. tags.Name = terraform_ssh_from_bastion
  642. vpc_id = vpc-50fe0336
  643.  
  644. Dependencies:
  645. aws_security_group.bastion_ssh_sg
  646. aws_security_group.nat
  647. aws_vpc.default
  648. aws_security_group.web_access_from_nat_sg:
  649. ID = sg-70119b0d
  650. description = Allow web access to the private subnet from the public subnet (via NAT instance)
  651. egress.# = 1
  652. egress.482069346.cidr_blocks.# = 1
  653. egress.482069346.cidr_blocks.0 = 0.0.0.0/0
  654. egress.482069346.from_port = 0
  655. egress.482069346.prefix_list_ids.# = 0
  656. egress.482069346.protocol = -1
  657. egress.482069346.security_groups.# = 0
  658. egress.482069346.self = false
  659. egress.482069346.to_port = 0
  660. ingress.# = 3
  661. ingress.1067346089.cidr_blocks.# = 1
  662. ingress.1067346089.cidr_blocks.0 = 10.0.0.0/24
  663. ingress.1067346089.from_port = -1
  664. ingress.1067346089.protocol = icmp
  665. ingress.1067346089.security_groups.# = 0
  666. ingress.1067346089.self = false
  667. ingress.1067346089.to_port = -1
  668. ingress.1568533442.cidr_blocks.# = 1
  669. ingress.1568533442.cidr_blocks.0 = 10.0.0.0/24
  670. ingress.1568533442.from_port = 443
  671. ingress.1568533442.protocol = tcp
  672. ingress.1568533442.security_groups.# = 0
  673. ingress.1568533442.self = false
  674. ingress.1568533442.to_port = 443
  675. ingress.2977749764.cidr_blocks.# = 1
  676. ingress.2977749764.cidr_blocks.0 = 10.0.0.0/24
  677. ingress.2977749764.from_port = 80
  678. ingress.2977749764.protocol = tcp
  679. ingress.2977749764.security_groups.# = 0
  680. ingress.2977749764.self = false
  681. ingress.2977749764.to_port = 80
  682. name = private_subnet_web_access
  683. owner_id = 706634194319
  684. tags.% = 1
  685. tags.Name = terraform
  686. vpc_id = vpc-50fe0336
  687.  
  688. Dependencies:
  689. aws_vpc.default
  690. aws_subnet.decipher_public
  691. aws_subnet.decipher_private:
  692. ID = subnet-7d992750
  693. availability_zone = us-east-1b
  694. cidr_block = 10.0.1.0/24
  695. map_public_ip_on_launch = false
  696. tags.% = 1
  697. tags.Name = terraform_private_subnet
  698. vpc_id = vpc-50fe0336
  699.  
  700. Dependencies:
  701. aws_vpc.default
  702. aws_subnet.decipher_private_2:
  703. ID = subnet-72bac73b
  704. availability_zone = us-east-1c
  705. cidr_block = 10.0.2.0/24
  706. map_public_ip_on_launch = false
  707. tags.% = 1
  708. tags.Name = terraform_private_subnet_2
  709. vpc_id = vpc-50fe0336
  710.  
  711. Dependencies:
  712. aws_vpc.default
  713. aws_subnet.decipher_public:
  714. ID = subnet-6299274f
  715. availability_zone = us-east-1b
  716. cidr_block = 10.0.0.0/24
  717. map_public_ip_on_launch = false
  718. tags.% = 1
  719. tags.Name = terraform_public_subnet
  720. vpc_id = vpc-50fe0336
  721.  
  722. Dependencies:
  723. aws_vpc.default
  724. aws_vpc.default:
  725. ID = vpc-50fe0336
  726. cidr_block = 10.0.0.0/16
  727. default_network_acl_id = acl-c18d31a7
  728. default_route_table_id = rtb-82fedce4
  729. default_security_group_id = sg-7d119b00
  730. dhcp_options_id = dopt-857b9be0
  731. enable_classiclink = false
  732. enable_dns_hostnames = true
  733. enable_dns_support = true
  734. instance_tenancy = default
  735. main_route_table_id = rtb-82fedce4
  736. tags.% = 1
  737. tags.Name = terraform_vpc
  738.  
  739. Outputs:
  740.  
  741. bastion_ssh_sg_id = sg-78119b05
  742. nat_sg_id = sg-79119b04
  743. private_subnet_2_id = subnet-72bac73b
  744. private_subnet_id = subnet-7d992750
  745. public_subnet_id = subnet-6299274f
  746. rds_mysql_sg = sg-76b5ca0b
  747. ssh_from_bastion_sg_id = sg-72119b0f
  748. vpc_id = vpc-50fe0336
  749. web_access_from_nat_sg_id = sg-70119b0d
  750.  
  751. Shadow state:
  752.  
  753. <no state>
  754. module.child:
  755. <no state>
  756. Outputs:
  757.  
  758. received = 1GB
  759. module.instances:
  760. aws_eip.zk.0:
  761. ID = eipalloc-3eb04400
  762. association_id = eipassoc-b5def18a
  763. domain = vpc
  764. instance = i-68c81f7f
  765. network_interface = eni-a3aae15d
  766. private_ip = 10.0.1.231
  767. public_ip = 34.194.147.231
  768. vpc = true
  769.  
  770. Dependencies:
  771. aws_instance.zk_node
  772. aws_instance.priv_networktest:
  773. ID = i-6ec81f79
  774. ami = ami-02417f15
  775. associate_public_ip_address = false
  776. availability_zone = us-east-1b
  777. disable_api_termination = false
  778. ebs_block_device.# = 0
  779. ebs_optimized = false
  780. ephemeral_block_device.# = 0
  781. iam_instance_profile =
  782. instance_state = running
  783. instance_type = t2.micro
  784. key_name = test-infrastructure
  785. monitoring = false
  786. network_interface_id = eni-bba9e245
  787. private_dns = ip-10-0-1-46.ec2.internal
  788. private_ip = 10.0.1.46
  789. public_dns =
  790. public_ip =
  791. root_block_device.# = 1
  792. root_block_device.0.delete_on_termination = true
  793. root_block_device.0.iops = 100
  794. root_block_device.0.volume_size = 8
  795. root_block_device.0.volume_type = gp2
  796. security_groups.# = 0
  797. source_dest_check = true
  798. subnet_id = subnet-7d992750
  799. tags.% = 1
  800. tags.Name = priv_networktest
  801. tenancy = default
  802. vpc_security_group_ids.# = 1
  803. vpc_security_group_ids.699898438 = sg-f7470d8a
  804.  
  805. Dependencies:
  806. aws_security_group.pub_networktest_sg
  807. aws_instance.pub_networktest:
  808. ID = i-69c81f7e
  809. ami = ami-02417f15
  810. associate_public_ip_address = true
  811. availability_zone = us-east-1b
  812. disable_api_termination = false
  813. ebs_block_device.# = 0
  814. ebs_optimized = false
  815. ephemeral_block_device.# = 0
  816. iam_instance_profile =
  817. instance_state = running
  818. instance_type = t2.micro
  819. key_name = test-infrastructure
  820. monitoring = false
  821. network_interface_id = eni-8fade671
  822. private_dns = ip-10-0-0-61.ec2.internal
  823. private_ip = 10.0.0.61
  824. public_dns = ec2-54-90-79-184.compute-1.amazonaws.com
  825. public_ip = 54.90.79.184
  826. root_block_device.# = 1
  827. root_block_device.0.delete_on_termination = true
  828. root_block_device.0.iops = 100
  829. root_block_device.0.volume_size = 8
  830. root_block_device.0.volume_type = gp2
  831. security_groups.# = 0
  832. source_dest_check = true
  833. subnet_id = subnet-6299274f
  834. tags.% = 1
  835. tags.Name = pub_networktest
  836. tenancy = default
  837. vpc_security_group_ids.# = 1
  838. vpc_security_group_ids.699898438 = sg-f7470d8a
  839.  
  840. Dependencies:
  841. aws_security_group.pub_networktest_sg
  842. aws_instance.pub_odrive:
  843. ID = i-c634fdd1
  844. ami = ami-bcd0d7ab
  845. associate_public_ip_address = true
  846. availability_zone = us-east-1b
  847. disable_api_termination = false
  848. ebs_block_device.# = 0
  849. ebs_optimized = false
  850. ephemeral_block_device.# = 0
  851. iam_instance_profile =
  852. instance_state = running
  853. instance_type = t2.micro
  854. key_name = test-infrastructure
  855. monitoring = false
  856. network_interface_id = eni-118df1ef
  857. private_dns = ip-10-0-0-22.ec2.internal
  858. private_ip = 10.0.0.22
  859. public_dns = ec2-107-21-158-0.compute-1.amazonaws.com
  860. public_ip = 107.21.158.0
  861. root_block_device.# = 1
  862. root_block_device.0.delete_on_termination = false
  863. root_block_device.0.iops = 0
  864. root_block_device.0.volume_size = 8
  865. root_block_device.0.volume_type = standard
  866. security_groups.# = 0
  867. source_dest_check = true
  868. subnet_id = subnet-6299274f
  869. tags.% = 1
  870. tags.Name = pub_odrive
  871. tenancy = default
  872. vpc_security_group_ids.# = 1
  873. vpc_security_group_ids.1135247480 = sg-185e1d65
  874.  
  875. Dependencies:
  876. aws_security_group.odrive_microservices_sg
  877. aws_instance.zk_node.0:
  878. ID = i-68c81f7f
  879. ami = ami-97a7a180
  880. associate_public_ip_address = true
  881. availability_zone = us-east-1b
  882. disable_api_termination = false
  883. ebs_block_device.# = 0
  884. ebs_optimized = false
  885. ephemeral_block_device.# = 0
  886. iam_instance_profile =
  887. instance_state = running
  888. instance_type = t2.micro
  889. key_name = test-infrastructure
  890. monitoring = false
  891. network_interface_id = eni-a3aae15d
  892. private_dns = ip-10-0-1-231.ec2.internal
  893. private_ip = 10.0.1.231
  894. public_dns = ec2-34-194-147-231.compute-1.amazonaws.com
  895. public_ip = 34.194.147.231
  896. root_block_device.# = 1
  897. root_block_device.0.delete_on_termination = true
  898. root_block_device.0.iops = 100
  899. root_block_device.0.volume_size = 8
  900. root_block_device.0.volume_type = gp2
  901. security_groups.# = 0
  902. source_dest_check = true
  903. subnet_id = subnet-7d992750
  904. tags.% = 1
  905. tags.Name = zk_node
  906. tenancy = default
  907. vpc_security_group_ids.# = 1
  908. vpc_security_group_ids.2112837917 = sg-f4470d89
  909.  
  910. Dependencies:
  911. aws_security_group.zk_sg
  912. aws_security_group.odrive_microservices_sg:
  913. ID = sg-185e1d65
  914. description = Required open ports for object-drive and other microservices
  915. egress.# = 1
  916. egress.482069346.cidr_blocks.# = 1
  917. egress.482069346.cidr_blocks.0 = 0.0.0.0/0
  918. egress.482069346.from_port = 0
  919. egress.482069346.prefix_list_ids.# = 0
  920. egress.482069346.protocol = -1
  921. egress.482069346.security_groups.# = 0
  922. egress.482069346.self = false
  923. egress.482069346.to_port = 0
  924. ingress.# = 5
  925. ingress.1203902316.cidr_blocks.# = 1
  926. ingress.1203902316.cidr_blocks.0 = 0.0.0.0/0
  927. ingress.1203902316.from_port = 4430
  928. ingress.1203902316.protocol = tcp
  929. ingress.1203902316.security_groups.# = 0
  930. ingress.1203902316.self = false
  931. ingress.1203902316.to_port = 4430
  932. ingress.1799340084.cidr_blocks.# = 1
  933. ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
  934. ingress.1799340084.from_port = -1
  935. ingress.1799340084.protocol = icmp
  936. ingress.1799340084.security_groups.# = 0
  937. ingress.1799340084.self = false
  938. ingress.1799340084.to_port = -1
  939. ingress.2172623744.cidr_blocks.# = 1
  940. ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0
  941. ingress.2172623744.from_port = 9999
  942. ingress.2172623744.protocol = tcp
  943. ingress.2172623744.security_groups.# = 0
  944. ingress.2172623744.self = false
  945. ingress.2172623744.to_port = 9999
  946. ingress.2541437006.cidr_blocks.# = 1
  947. ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
  948. ingress.2541437006.from_port = 22
  949. ingress.2541437006.protocol = tcp
  950. ingress.2541437006.security_groups.# = 0
  951. ingress.2541437006.self = false
  952. ingress.2541437006.to_port = 22
  953. ingress.2617001939.cidr_blocks.# = 1
  954. ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0
  955. ingress.2617001939.from_port = 443
  956. ingress.2617001939.protocol = tcp
  957. ingress.2617001939.security_groups.# = 0
  958. ingress.2617001939.self = false
  959. ingress.2617001939.to_port = 443
  960. name = odrive_microservices_sg
  961. owner_id = 706634194319
  962. tags.% = 1
  963. tags.Name = odrive_sg
  964. vpc_id = vpc-50fe0336
  965. aws_security_group.pub_networktest_sg:
  966. ID = sg-f7470d8a
  967. description = Allow traffic to pass from the private subnet to the internet
  968. egress.# = 1
  969. egress.482069346.cidr_blocks.# = 1
  970. egress.482069346.cidr_blocks.0 = 0.0.0.0/0
  971. egress.482069346.from_port = 0
  972. egress.482069346.prefix_list_ids.# = 0
  973. egress.482069346.protocol = -1
  974. egress.482069346.security_groups.# = 0
  975. egress.482069346.self = false
  976. egress.482069346.to_port = 0
  977. ingress.# = 6
  978. ingress.1799340084.cidr_blocks.# = 1
  979. ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
  980. ingress.1799340084.from_port = -1
  981. ingress.1799340084.protocol = icmp
  982. ingress.1799340084.security_groups.# = 0
  983. ingress.1799340084.self = false
  984. ingress.1799340084.to_port = -1
  985. ingress.2172623744.cidr_blocks.# = 1
  986. ingress.2172623744.cidr_blocks.0 = 0.0.0.0/0
  987. ingress.2172623744.from_port = 9999
  988. ingress.2172623744.protocol = tcp
  989. ingress.2172623744.security_groups.# = 0
  990. ingress.2172623744.self = false
  991. ingress.2172623744.to_port = 9999
  992. ingress.2214680975.cidr_blocks.# = 1
  993. ingress.2214680975.cidr_blocks.0 = 0.0.0.0/0
  994. ingress.2214680975.from_port = 80
  995. ingress.2214680975.protocol = tcp
  996. ingress.2214680975.security_groups.# = 0
  997. ingress.2214680975.self = false
  998. ingress.2214680975.to_port = 80
  999. ingress.2541437006.cidr_blocks.# = 1
  1000. ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
  1001. ingress.2541437006.from_port = 22
  1002. ingress.2541437006.protocol = tcp
  1003. ingress.2541437006.security_groups.# = 0
  1004. ingress.2541437006.self = false
  1005. ingress.2541437006.to_port = 22
  1006. ingress.2617001939.cidr_blocks.# = 1
  1007. ingress.2617001939.cidr_blocks.0 = 0.0.0.0/0
  1008. ingress.2617001939.from_port = 443
  1009. ingress.2617001939.protocol = tcp
  1010. ingress.2617001939.security_groups.# = 0
  1011. ingress.2617001939.self = false
  1012. ingress.2617001939.to_port = 443
  1013. ingress.516175195.cidr_blocks.# = 1
  1014. ingress.516175195.cidr_blocks.0 = 0.0.0.0/0
  1015. ingress.516175195.from_port = 8080
  1016. ingress.516175195.protocol = tcp
  1017. ingress.516175195.security_groups.# = 0
  1018. ingress.516175195.self = false
  1019. ingress.516175195.to_port = 8080
  1020. name = pub_networktest_sg
  1021. owner_id = 706634194319
  1022. tags.% = 1
  1023. tags.Name = terraform
  1024. vpc_id = vpc-50fe0336
  1025. aws_security_group.zk_sg:
  1026. ID = sg-f4470d89
  1027. description = Zookeeper ports
  1028. egress.# = 1
  1029. egress.482069346.cidr_blocks.# = 1
  1030. egress.482069346.cidr_blocks.0 = 0.0.0.0/0
  1031. egress.482069346.from_port = 0
  1032. egress.482069346.prefix_list_ids.# = 0
  1033. egress.482069346.protocol = -1
  1034. egress.482069346.security_groups.# = 0
  1035. egress.482069346.self = false
  1036. egress.482069346.to_port = 0
  1037. ingress.# = 3
  1038. ingress.1799340084.cidr_blocks.# = 1
  1039. ingress.1799340084.cidr_blocks.0 = 0.0.0.0/0
  1040. ingress.1799340084.from_port = -1
  1041. ingress.1799340084.protocol = icmp
  1042. ingress.1799340084.security_groups.# = 0
  1043. ingress.1799340084.self = false
  1044. ingress.1799340084.to_port = -1
  1045. ingress.2541437006.cidr_blocks.# = 1
  1046. ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
  1047. ingress.2541437006.from_port = 22
  1048. ingress.2541437006.protocol = tcp
  1049. ingress.2541437006.security_groups.# = 0
  1050. ingress.2541437006.self = false
  1051. ingress.2541437006.to_port = 22
  1052. ingress.4023360382.cidr_blocks.# = 1
  1053. ingress.4023360382.cidr_blocks.0 = 10.0.0.0/16
  1054. ingress.4023360382.from_port = 2181
  1055. ingress.4023360382.protocol = tcp
  1056. ingress.4023360382.security_groups.# = 0
  1057. ingress.4023360382.self = false
  1058. ingress.4023360382.to_port = 2181
  1059. name = zk_sg
  1060. owner_id = 706634194319
  1061. tags.% = 1
  1062. tags.Name = zk_sg
  1063. vpc_id = vpc-50fe0336
  1064.  
  1065. Outputs:
  1066.  
  1067. odrive_microservices_sg = sg-185e1d65
  1068. pub_networktest_sg = sg-f7470d8a
  1069. zk_sg = sg-f4470d89
  1070. module.rds:
  1071. aws_db_instance.odrive:
  1072. ID = tf-20161207154908631239504b4t
  1073. address = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com
  1074. allocated_storage = 10
  1075. apply_immediately = true
  1076. arn = arn:aws:rds:us-east-1:706634194319:db:tf-20161207154908631239504b4t
  1077. auto_minor_version_upgrade = true
  1078. availability_zone = us-east-1b
  1079. backup_retention_period = 0
  1080. backup_window = 07:37-08:07
  1081. copy_tags_to_snapshot = false
  1082. db_subnet_group_name = main
  1083. endpoint = tf-20161207154908631239504b4t.c2bdxmcv8gbh.us-east-1.rds.amazonaws.com:3306
  1084. engine = mysql
  1085. engine_version = 5.6.27
  1086. hosted_zone_id = Z2R2ITUGPM61AM
  1087. identifier = tf-20161207154908631239504b4t
  1088. instance_class = db.t2.micro
  1089. iops = 0
  1090. kms_key_id =
  1091. license_model = general-public-license
  1092. maintenance_window = mon:10:19-mon:10:49
  1093. monitoring_interval = 0
  1094. multi_az = false
  1095. name = metadatadb
  1096. option_group_name = default:mysql-5-6
  1097. parameter_group_name = odrive-pg
  1098. password = dbRootPassword
  1099. port = 3306
  1100. publicly_accessible = true
  1101. replicas.# = 0
  1102. replicate_source_db =
  1103. security_group_names.# = 0
  1104. skip_final_snapshot = true
  1105. status = available
  1106. storage_encrypted = false
  1107. storage_type = standard
  1108. tags.% = 0
  1109. username = dbRootUser
  1110. vpc_security_group_ids.# = 1
  1111. vpc_security_group_ids.955802421 = sg-76b5ca0b
  1112.  
  1113. Dependencies:
  1114. aws_db_subnet_group.main
  1115. aws_db_parameter_group.odrive_pg
  1116. aws_db_parameter_group.odrive_pg:
  1117. ID = odrive-pg
  1118. arn = arn:aws:rds:us-east-1:706634194319:pg:odrive-pg
  1119. description = Custom Parameter Group for Object Drive
  1120. family = mysql5.6
  1121. name = odrive-pg
  1122. parameter.# = 1
  1123. parameter.950177639.apply_method = immediate
  1124. parameter.950177639.name = log_bin_trust_function_creators
  1125. parameter.950177639.value = 1
  1126. tags.% = 0
  1127. aws_db_subnet_group.main:
  1128. ID = main
  1129. arn = arn:aws:rds:us-east-1:706634194319:subgrp:main
  1130. description = Managed by Terraform
  1131. name = main
  1132. subnet_ids.# = 3
  1133. subnet_ids.2727810170 = subnet-72bac73b
  1134. subnet_ids.741755728 = subnet-7d992750
  1135. subnet_ids.998920899 = subnet-6299274f
  1136. tags.% = 1
  1137. tags.Name = terraform_db_subnet_group
  1138. module.vpc:
  1139. aws_eip.nat:
  1140. ID = eipalloc-c15748fe
  1141. association_id = eipassoc-56c7e869
  1142. domain = vpc
  1143. instance = 74D93920-ED26-11E3-AC10-0800200C9A66
  1144. network_interface = eni-73c78c8d
  1145. private_ip = 10.0.0.34
  1146. public_ip = 34.193.25.59
  1147. vpc = true
  1148.  
  1149. Dependencies:
  1150. aws_instance.nat
  1151. aws_instance.nat:
  1152. ID = i-e8fe29ff
  1153. ami = ami-0dd7e61a
  1154. associate_public_ip_address = true
  1155. availability_zone = us-east-1b
  1156. disable_api_termination = false
  1157. ebs_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
  1158. ebs_optimized = false
  1159. ephemeral_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
  1160. iam_instance_profile =
  1161. instance_state = 74D93920-ED26-11E3-AC10-0800200C9A66
  1162. instance_type = t2.small
  1163. key_name = test-infrastructure
  1164. monitoring = false
  1165. network_interface_id = 74D93920-ED26-11E3-AC10-0800200C9A66
  1166. placement_group = 74D93920-ED26-11E3-AC10-0800200C9A66
  1167. private_dns = 74D93920-ED26-11E3-AC10-0800200C9A66
  1168. private_ip = 74D93920-ED26-11E3-AC10-0800200C9A66
  1169. public_dns = 74D93920-ED26-11E3-AC10-0800200C9A66
  1170. public_ip = 74D93920-ED26-11E3-AC10-0800200C9A66
  1171. root_block_device.# = 74D93920-ED26-11E3-AC10-0800200C9A66
  1172. root_block_device.0.delete_on_termination = true
  1173. root_block_device.0.iops = 100
  1174. root_block_device.0.volume_size = 8
  1175. root_block_device.0.volume_type = gp2
  1176. security_groups.# = 2
  1177. security_groups.2513725979 = sg-79119b04
  1178. security_groups.955802421 = sg-76b5ca0b
  1179. source_dest_check = false
  1180. subnet_id = subnet-6299274f
  1181. tags.% = 1
  1182. tags.Name = terraform_nat_instance
  1183. tenancy = 74D93920-ED26-11E3-AC10-0800200C9A66
  1184. vpc_security_group_ids.# = 74D93920-ED26-11E3-AC10-0800200C9A66
  1185. vpc_security_group_ids.2513725979 = sg-79119b04
  1186. vpc_security_group_ids.955802421 = sg-76b5ca0b
  1187.  
  1188. Dependencies:
  1189. aws_security_group.rds_mysql_sg
  1190. aws_subnet.decipher_public
  1191. aws_security_group.nat
  1192. aws_internet_gateway.default:
  1193. ID = igw-51883236
  1194. tags.% = 1
  1195. tags.Name = terraform_igw
  1196. vpc_id = vpc-50fe0336
  1197.  
  1198. Dependencies:
  1199. aws_vpc.default
  1200. aws_route_table.decipher_private:
  1201. ID = rtb-6afddf0c
  1202. propagating_vgws.# = 0
  1203. route.# = 1
  1204. route.~2469360411.cidr_block = 0.0.0.0/0
  1205. route.~2469360411.gateway_id =
  1206. route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66
  1207. route.~2469360411.nat_gateway_id =
  1208. route.~2469360411.network_interface_id =
  1209. route.~2469360411.vpc_peering_connection_id =
  1210. tags.% = 1
  1211. tags.Name = terraform_private_subnet_route_table
  1212. vpc_id = vpc-50fe0336
  1213.  
  1214. Dependencies:
  1215. aws_vpc.default
  1216. aws_instance.nat
  1217. aws_route_table.decipher_private_2:
  1218. ID = rtb-56a39130
  1219. propagating_vgws.# = 0
  1220. route.# = 1
  1221. route.~2469360411.cidr_block = 0.0.0.0/0
  1222. route.~2469360411.gateway_id =
  1223. route.~2469360411.instance_id = 74D93920-ED26-11E3-AC10-0800200C9A66
  1224. route.~2469360411.nat_gateway_id =
  1225. route.~2469360411.network_interface_id =
  1226. route.~2469360411.vpc_peering_connection_id =
  1227. tags.% = 1
  1228. tags.Name = terraform_private_subnet_2_route_table
  1229. vpc_id = vpc-50fe0336
  1230.  
  1231. Dependencies:
  1232. aws_instance.nat
  1233. aws_vpc.default
  1234. aws_route_table.decipher_public:
  1235. ID = rtb-8efedce8
  1236. propagating_vgws.# = 0
  1237. route.# = 1
  1238. route.3761165403.cidr_block = 0.0.0.0/0
  1239. route.3761165403.gateway_id = igw-51883236
  1240. route.3761165403.instance_id =
  1241. route.3761165403.nat_gateway_id =
  1242. route.3761165403.network_interface_id =
  1243. route.3761165403.vpc_peering_connection_id =
  1244. tags.% = 1
  1245. tags.Name = terraform_public_subnet_route_table
  1246. vpc_id = vpc-50fe0336
  1247.  
  1248. Dependencies:
  1249. aws_vpc.default
  1250. aws_internet_gateway.default
  1251. aws_route_table_association.decipher_private:
  1252. ID = rtbassoc-b8c0f5c1
  1253. route_table_id = rtb-6afddf0c
  1254. subnet_id = subnet-7d992750
  1255.  
  1256. Dependencies:
  1257. aws_subnet.decipher_private
  1258. aws_route_table.decipher_private
  1259. aws_route_table_association.decipher_private_2:
  1260. ID = rtbassoc-c0e4e5b9
  1261. route_table_id = rtb-56a39130
  1262. subnet_id = subnet-72bac73b
  1263.  
  1264. Dependencies:
  1265. aws_subnet.decipher_private_2
  1266. aws_route_table.decipher_private_2
  1267. aws_route_table_association.decipher_public:
  1268. ID = rtbassoc-29c6f350
  1269. route_table_id = rtb-8efedce8
  1270. subnet_id = subnet-6299274f
  1271.  
  1272. Dependencies:
  1273. aws_subnet.decipher_public
  1274. aws_route_table.decipher_public
  1275. aws_security_group.bastion_ssh_sg:
  1276. ID = sg-78119b05
  1277. description = Allow SSH to Bastion host from approved ranges
  1278. egress.# = 1
  1279. egress.482069346.cidr_blocks.# = 1
  1280. egress.482069346.cidr_blocks.0 = 0.0.0.0/0
  1281. egress.482069346.from_port = 0
  1282. egress.482069346.prefix_list_ids.# = 0
  1283. egress.482069346.protocol = -1
  1284. egress.482069346.security_groups.# = 0
  1285. egress.482069346.self = false
  1286. egress.482069346.to_port = 0
  1287. ingress.# = 1
  1288. ingress.2541437006.cidr_blocks.# = 1
  1289. ingress.2541437006.cidr_blocks.0 = 0.0.0.0/0
  1290. ingress.2541437006.from_port = 22
  1291. ingress.2541437006.protocol = tcp
  1292. ingress.2541437006.security_groups.# = 0
  1293. ingress.2541437006.self = false
  1294. ingress.2541437006.to_port = 22
  1295. name = bastion_ssh
  1296. owner_id = 706634194319
  1297. tags.% = 1
  1298. tags.Name = terraform_bastion_ssh
  1299. vpc_id = vpc-50fe0336
  1300.  
  1301. Dependencies:
  1302. aws_vpc.default
  1303. aws_security_group.nat:
  1304. ID = sg-79119b04
  1305. description = Allow traffic to pass from the private subnet to the internet
  1306. egress.# = 1
  1307. egress.482069346.cidr_blocks.# = 1
  1308. egress.482069346.cidr_blocks.0 = 0.0.0.0/0
  1309. egress.482069346.from_port = 0
  1310. egress.482069346.prefix_list_ids.# = 0
  1311. egress.482069346.protocol = -1
  1312. egress.482069346.security_groups.# = 0
  1313. egress.482069346.self = false
  1314. egress.482069346.to_port = 0
  1315. ingress.# = 3
  1316. ingress.2582209309.cidr_blocks.# = 1
  1317. ingress.2582209309.cidr_blocks.0 = 10.0.1.0/24
  1318. ingress.2582209309.from_port = -1
  1319. ingress.2582209309.protocol = icmp
  1320. ingress.2582209309.security_groups.# = 0
  1321. ingress.2582209309.self = false
  1322. ingress.2582209309.to_port = -1
  1323. ingress.386650288.cidr_blocks.# = 1
  1324. ingress.386650288.cidr_blocks.0 = 10.0.1.0/24
  1325. ingress.386650288.from_port = 80
  1326. ingress.386650288.protocol = tcp
  1327. ingress.386650288.security_groups.# = 0
  1328. ingress.386650288.self = false
  1329. ingress.386650288.to_port = 80
  1330. ingress.4211794038.cidr_blocks.# = 1
  1331. ingress.4211794038.cidr_blocks.0 = 10.0.1.0/24
  1332. ingress.4211794038.from_port = 443
  1333. ingress.4211794038.protocol = tcp
  1334. ingress.4211794038.security_groups.# = 0
  1335. ingress.4211794038.self = false
  1336. ingress.4211794038.to_port = 443
  1337. name = vpc_nat
  1338. owner_id = 706634194319
  1339. tags.% = 1
  1340. tags.Name = terraform
  1341. vpc_id = vpc-50fe0336
  1342.  
  1343. Dependencies:
  1344. aws_vpc.default
  1345. aws_security_group.rds_mysql_sg:
  1346. ID = sg-76b5ca0b
  1347. description = Allow traffic to pass from internet to RDS MySQL
  1348. egress.# = 1
  1349. egress.482069346.cidr_blocks.# = 1
  1350. egress.482069346.cidr_blocks.0 = 0.0.0.0/0
  1351. egress.482069346.from_port = 0
  1352. egress.482069346.prefix_list_ids.# = 0
  1353. egress.482069346.protocol = -1
  1354. egress.482069346.security_groups.# = 0
  1355. egress.482069346.self = false
  1356. egress.482069346.to_port = 0
  1357. ingress.# = 1
  1358. ingress.1163740523.cidr_blocks.# = 1
  1359. ingress.1163740523.cidr_blocks.0 = 0.0.0.0/0
  1360. ingress.1163740523.from_port = 3306
  1361. ingress.1163740523.protocol = tcp
  1362. ingress.1163740523.security_groups.# = 0
  1363. ingress.1163740523.self = false
  1364. ingress.1163740523.to_port = 3306
  1365. name = rds_mysql
  1366. owner_id = 706634194319
  1367. tags.% = 1
  1368. tags.Name = terraform
  1369. vpc_id = vpc-50fe0336
  1370.  
  1371. Dependencies:
  1372. aws_vpc.default
  1373. aws_security_group.ssh_from_bastion_sg:
  1374. ID = sg-72119b0f
  1375. description = Allow SSH from Bastion host(s)
  1376. egress.# = 0
  1377. ingress.# = 1
  1378. ingress.3517505807.cidr_blocks.# = 0
  1379. ingress.3517505807.from_port = 22
  1380. ingress.3517505807.protocol = tcp
  1381. ingress.3517505807.security_groups.# = 2
  1382. ingress.3517505807.security_groups.1151619385 = sg-78119b05
  1383. ingress.3517505807.security_groups.2513725979 = sg-79119b04
  1384. ingress.3517505807.self = false
  1385. ingress.3517505807.to_port = 22
  1386. name = ssh_from_bastion
  1387. owner_id = 706634194319
  1388. tags.% = 1
  1389. tags.Name = terraform_ssh_from_bastion
  1390. vpc_id = vpc-50fe0336
  1391.  
  1392. Dependencies:
  1393. aws_security_group.bastion_ssh_sg
  1394. aws_security_group.nat
  1395. aws_vpc.default
  1396. aws_security_group.web_access_from_nat_sg:
  1397. ID = sg-70119b0d
  1398. description = Allow web access to the private subnet from the public subnet (via NAT instance)
  1399. egress.# = 1
  1400. egress.482069346.cidr_blocks.# = 1
  1401. egress.482069346.cidr_blocks.0 = 0.0.0.0/0
  1402. egress.482069346.from_port = 0
  1403. egress.482069346.prefix_list_ids.# = 0
  1404. egress.482069346.protocol = -1
  1405. egress.482069346.security_groups.# = 0
  1406. egress.482069346.self = false
  1407. egress.482069346.to_port = 0
  1408. ingress.# = 3
  1409. ingress.1067346089.cidr_blocks.# = 1
  1410. ingress.1067346089.cidr_blocks.0 = 10.0.0.0/24
  1411. ingress.1067346089.from_port = -1
  1412. ingress.1067346089.protocol = icmp
  1413. ingress.1067346089.security_groups.# = 0
  1414. ingress.1067346089.self = false
  1415. ingress.1067346089.to_port = -1
  1416. ingress.1568533442.cidr_blocks.# = 1
  1417. ingress.1568533442.cidr_blocks.0 = 10.0.0.0/24
  1418. ingress.1568533442.from_port = 443
  1419. ingress.1568533442.protocol = tcp
  1420. ingress.1568533442.security_groups.# = 0
  1421. ingress.1568533442.self = false
  1422. ingress.1568533442.to_port = 443
  1423. ingress.2977749764.cidr_blocks.# = 1
  1424. ingress.2977749764.cidr_blocks.0 = 10.0.0.0/24
  1425. ingress.2977749764.from_port = 80
  1426. ingress.2977749764.protocol = tcp
  1427. ingress.2977749764.security_groups.# = 0
  1428. ingress.2977749764.self = false
  1429. ingress.2977749764.to_port = 80
  1430. name = private_subnet_web_access
  1431. owner_id = 706634194319
  1432. tags.% = 1
  1433. tags.Name = terraform
  1434. vpc_id = vpc-50fe0336
  1435.  
  1436. Dependencies:
  1437. aws_vpc.default
  1438. aws_subnet.decipher_public
  1439. aws_subnet.decipher_private:
  1440. ID = subnet-7d992750
  1441. availability_zone = us-east-1b
  1442. cidr_block = 10.0.1.0/24
  1443. map_public_ip_on_launch = false
  1444. tags.% = 1
  1445. tags.Name = terraform_private_subnet
  1446. vpc_id = vpc-50fe0336
  1447.  
  1448. Dependencies:
  1449. aws_vpc.default
  1450. aws_subnet.decipher_private_2:
  1451. ID = subnet-72bac73b
  1452. availability_zone = us-east-1c
  1453. cidr_block = 10.0.2.0/24
  1454. map_public_ip_on_launch = false
  1455. tags.% = 1
  1456. tags.Name = terraform_private_subnet_2
  1457. vpc_id = vpc-50fe0336
  1458.  
  1459. Dependencies:
  1460. aws_vpc.default
  1461. aws_subnet.decipher_public:
  1462. ID = subnet-6299274f
  1463. availability_zone = us-east-1b
  1464. cidr_block = 10.0.0.0/24
  1465. map_public_ip_on_launch = false
  1466. tags.% = 1
  1467. tags.Name = terraform_public_subnet
  1468. vpc_id = vpc-50fe0336
  1469.  
  1470. Dependencies:
  1471. aws_vpc.default
  1472. aws_vpc.default:
  1473. ID = vpc-50fe0336
  1474. cidr_block = 10.0.0.0/16
  1475. default_network_acl_id = acl-c18d31a7
  1476. default_route_table_id = rtb-82fedce4
  1477. default_security_group_id = sg-7d119b00
  1478. dhcp_options_id = dopt-857b9be0
  1479. enable_classiclink = false
  1480. enable_dns_hostnames = true
  1481. enable_dns_support = true
  1482. instance_tenancy = default
  1483. main_route_table_id = rtb-82fedce4
  1484. tags.% = 1
  1485. tags.Name = terraform_vpc
  1486.  
  1487. Outputs:
  1488.  
  1489. bastion_ssh_sg_id = sg-78119b05
  1490. nat_sg_id = sg-79119b04
  1491. private_subnet_2_id = subnet-72bac73b
  1492. private_subnet_id = subnet-7d992750
  1493. public_subnet_id = subnet-6299274f
  1494. rds_mysql_sg = sg-76b5ca0b
  1495. ssh_from_bastion_sg_id = sg-72119b0f
  1496. vpc_id = vpc-50fe0336
  1497. web_access_from_nat_sg_id = sg-70119b0d
  1498.  
  1499.  
  1500. * plan operation: Real and shadow diffs do not match! Real diff:
  1501.  
  1502. module.instances:
  1503. UPDATE: aws_eip.zk.0
  1504. instance: "i-68c81f7f" => "<computed>"
  1505. CREATE: aws_eip.zk.1
  1506. allocation_id: "" => "<computed>"
  1507. association_id: "" => "<computed>"
  1508. domain: "" => "<computed>"
  1509. instance: "" => "<computed>"
  1510. network_interface: "" => "<computed>"
  1511. private_ip: "" => "<computed>"
  1512. public_ip: "" => "<computed>"
  1513. vpc: "" => "true" (forces new resource)
  1514. CREATE: aws_eip.zk.2
  1515. allocation_id: "" => "<computed>"
  1516. association_id: "" => "<computed>"
  1517. domain: "" => "<computed>"
  1518. instance: "" => "<computed>"
  1519. network_interface: "" => "<computed>"
  1520. private_ip: "" => "<computed>"
  1521. public_ip: "" => "<computed>"
  1522. vpc: "" => "true" (forces new resource)
  1523. CREATE: aws_instance.zk_node.1
  1524. ami: "" => "ami-97a7a180" (forces new resource)
  1525. associate_public_ip_address: "" => "true" (forces new resource)
  1526. availability_zone: "" => "us-east-1b" (forces new resource)
  1527. ebs_block_device.#: "" => "<computed>"
  1528. ephemeral_block_device.#: "" => "<computed>" (forces new resource)
  1529. instance_state: "" => "<computed>"
  1530. instance_type: "" => "t2.micro" (forces new resource)
  1531. key_name: "" => "test-infrastructure" (forces new resource)
  1532. network_interface_id: "" => "<computed>"
  1533. placement_group: "" => "<computed>" (forces new resource)
  1534. private_dns: "" => "<computed>"
  1535. private_ip: "" => "<computed>" (forces new resource)
  1536. public_dns: "" => "<computed>"
  1537. public_ip: "" => "<computed>"
  1538. root_block_device.#: "" => "<computed>"
  1539. security_groups.#: "" => "<computed>" (forces new resource)
  1540. source_dest_check: "" => "true"
  1541. subnet_id: "" => "subnet-7d992750" (forces new resource)
  1542. tags.%: "" => "1"
  1543. tags.Name: "" => "zk_node"
  1544. tenancy: "" => "<computed>" (forces new resource)
  1545. vpc_security_group_ids.#: "" => "1"
  1546. vpc_security_group_ids.2112837917: "" => "sg-f4470d89"
  1547. CREATE: aws_instance.zk_node.2
  1548. ami: "" => "ami-97a7a180" (forces new resource)
  1549. associate_public_ip_address: "" => "true" (forces new resource)
  1550. availability_zone: "" => "us-east-1b" (forces new resource)
  1551. ebs_block_device.#: "" => "<computed>"
  1552. ephemeral_block_device.#: "" => "<computed>" (forces new resource)
  1553. instance_state: "" => "<computed>"
  1554. instance_type: "" => "t2.micro" (forces new resource)
  1555. key_name: "" => "test-infrastructure" (forces new resource)
  1556. network_interface_id: "" => "<computed>"
  1557. placement_group: "" => "<computed>" (forces new resource)
  1558. private_dns: "" => "<computed>"
  1559. private_ip: "" => "<computed>" (forces new resource)
  1560. public_dns: "" => "<computed>"
  1561. public_ip: "" => "<computed>"
  1562. root_block_device.#: "" => "<computed>"
  1563. security_groups.#: "" => "<computed>" (forces new resource)
  1564. source_dest_check: "" => "true"
  1565. subnet_id: "" => "subnet-7d992750" (forces new resource)
  1566. tags.%: "" => "1"
  1567. tags.Name: "" => "zk_node"
  1568. tenancy: "" => "<computed>" (forces new resource)
  1569. vpc_security_group_ids.#: "" => "1"
  1570. vpc_security_group_ids.2112837917: "" => "sg-f4470d89"
  1571. module.rds:
  1572. module.vpc:
  1573. UPDATE: aws_eip.nat
  1574. instance: "i-e8fe29ff" => "<computed>"
  1575. DESTROY/CREATE: aws_instance.nat
  1576. ami: "ami-0dd7e61a" => "ami-0dd7e61a"
  1577. associate_public_ip_address: "true" => "true"
  1578. availability_zone: "us-east-1b" => "us-east-1b"
  1579. ebs_block_device.#: "0" => "<computed>"
  1580. ephemeral_block_device.#: "0" => "<computed>"
  1581. instance_state: "running" => "<computed>"
  1582. instance_type: "t2.small" => "t2.small"
  1583. key_name: "test-infrastructure" => "test-infrastructure"
  1584. network_interface_id: "eni-73c78c8d" => "<computed>"
  1585. placement_group: "" => "<computed>"
  1586. private_dns: "ip-10-0-0-34.ec2.internal" => "<computed>"
  1587. private_ip: "10.0.0.34" => "<computed>"
  1588. public_dns: "ec2-34-193-25-59.compute-1.amazonaws.com" => "<computed>"
  1589. public_ip: "34.193.25.59" => "<computed>"
  1590. root_block_device.#: "1" => "<computed>"
  1591. security_groups.#: "0" => "2" (forces new resource)
  1592. security_groups.2513725979: "" => "sg-79119b04" (forces new resource)
  1593. security_groups.955802421: "" => "sg-76b5ca0b" (forces new resource)
  1594. source_dest_check: "false" => "false"
  1595. subnet_id: "subnet-6299274f" => "subnet-6299274f"
  1596. tags.%: "1" => "1"
  1597. tags.Name: "terraform_nat_instance" => "terraform_nat_instance"
  1598. tenancy: "default" => "<computed>"
  1599. vpc_security_group_ids.#: "2" => "<computed>"
  1600. UPDATE: aws_route_table.decipher_private
  1601. route.924992980.cidr_block: "0.0.0.0/0" => ""
  1602. route.924992980.gateway_id: "" => ""
  1603. route.924992980.instance_id: "i-e8fe29ff" => ""
  1604. route.924992980.nat_gateway_id: "" => ""
  1605. route.924992980.network_interface_id: "eni-73c78c8d" => ""
  1606. route.924992980.vpc_peering_connection_id: "" => ""
  1607. route.~2469360411.cidr_block: "" => "0.0.0.0/0"
  1608. route.~2469360411.gateway_id: "" => ""
  1609. route.~2469360411.instance_id: "" => "<computed>"
  1610. route.~2469360411.nat_gateway_id: "" => ""
  1611. route.~2469360411.network_interface_id: "" => ""
  1612. route.~2469360411.vpc_peering_connection_id: "" => ""
  1613. UPDATE: aws_route_table.decipher_private_2
  1614. route.924992980.cidr_block: "0.0.0.0/0" => ""
  1615. route.924992980.gateway_id: "" => ""
  1616. route.924992980.instance_id: "i-e8fe29ff" => ""
  1617. route.924992980.nat_gateway_id: "" => ""
  1618. route.924992980.network_interface_id: "eni-73c78c8d" => ""
  1619. route.924992980.vpc_peering_connection_id: "" => ""
  1620. route.~2469360411.cidr_block: "" => "0.0.0.0/0"
  1621. route.~2469360411.gateway_id: "" => ""
  1622. route.~2469360411.instance_id: "" => "<computed>"
  1623. route.~2469360411.nat_gateway_id: "" => ""
  1624. route.~2469360411.network_interface_id: "" => ""
  1625. route.~2469360411.vpc_peering_connection_id: "" => ""
  1626.  
  1627. Shadow diff:
  1628.  
  1629. module.instances:
  1630. CREATE: aws_instance.zk_node.1
  1631. ami: "" => "ami-97a7a180" (forces new resource)
  1632. associate_public_ip_address: "" => "true" (forces new resource)
  1633. availability_zone: "" => "us-east-1b" (forces new resource)
  1634. ebs_block_device.#: "" => "<computed>"
  1635. ephemeral_block_device.#: "" => "<computed>" (forces new resource)
  1636. instance_state: "" => "<computed>"
  1637. instance_type: "" => "t2.micro" (forces new resource)
  1638. key_name: "" => "test-infrastructure" (forces new resource)
  1639. network_interface_id: "" => "<computed>"
  1640. placement_group: "" => "<computed>" (forces new resource)
  1641. private_dns: "" => "<computed>"
  1642. private_ip: "" => "<computed>" (forces new resource)
  1643. public_dns: "" => "<computed>"
  1644. public_ip: "" => "<computed>"
  1645. root_block_device.#: "" => "<computed>"
  1646. security_groups.#: "" => "<computed>" (forces new resource)
  1647. source_dest_check: "" => "true"
  1648. subnet_id: "" => "subnet-7d992750" (forces new resource)
  1649. tags.%: "" => "1"
  1650. tags.Name: "" => "zk_node"
  1651. tenancy: "" => "<computed>" (forces new resource)
  1652. vpc_security_group_ids.#: "" => "1"
  1653. vpc_security_group_ids.2112837917: "" => "sg-f4470d89"
  1654. CREATE: aws_instance.zk_node.2
  1655. ami: "" => "ami-97a7a180" (forces new resource)
  1656. associate_public_ip_address: "" => "true" (forces new resource)
  1657. availability_zone: "" => "us-east-1b" (forces new resource)
  1658. ebs_block_device.#: "" => "<computed>"
  1659. ephemeral_block_device.#: "" => "<computed>" (forces new resource)
  1660. instance_state: "" => "<computed>"
  1661. instance_type: "" => "t2.micro" (forces new resource)
  1662. key_name: "" => "test-infrastructure" (forces new resource)
  1663. network_interface_id: "" => "<computed>"
  1664. placement_group: "" => "<computed>" (forces new resource)
  1665. private_dns: "" => "<computed>"
  1666. private_ip: "" => "<computed>" (forces new resource)
  1667. public_dns: "" => "<computed>"
  1668. public_ip: "" => "<computed>"
  1669. root_block_device.#: "" => "<computed>"
  1670. security_groups.#: "" => "<computed>" (forces new resource)
  1671. source_dest_check: "" => "true"
  1672. subnet_id: "" => "subnet-7d992750" (forces new resource)
  1673. tags.%: "" => "1"
  1674. tags.Name: "" => "zk_node"
  1675. tenancy: "" => "<computed>" (forces new resource)
  1676. vpc_security_group_ids.#: "" => "1"
  1677. vpc_security_group_ids.2112837917: "" => "sg-f4470d89"
  1678. module.rds:
  1679. module.vpc:
  1680. UPDATE: aws_eip.nat
  1681. instance: "i-e8fe29ff" => "<computed>"
  1682. DESTROY/CREATE: aws_instance.nat
  1683. ami: "ami-0dd7e61a" => "ami-0dd7e61a"
  1684. associate_public_ip_address: "true" => "true"
  1685. availability_zone: "us-east-1b" => "us-east-1b"
  1686. ebs_block_device.#: "0" => "<computed>"
  1687. ephemeral_block_device.#: "0" => "<computed>"
  1688. instance_state: "running" => "<computed>"
  1689. instance_type: "t2.small" => "t2.small"
  1690. key_name: "test-infrastructure" => "test-infrastructure"
  1691. network_interface_id: "eni-73c78c8d" => "<computed>"
  1692. placement_group: "" => "<computed>"
  1693. private_dns: "ip-10-0-0-34.ec2.internal" => "<computed>"
  1694. private_ip: "10.0.0.34" => "<computed>"
  1695. public_dns: "ec2-34-193-25-59.compute-1.amazonaws.com" => "<computed>"
  1696. public_ip: "34.193.25.59" => "<computed>"
  1697. root_block_device.#: "1" => "<computed>"
  1698. security_groups.#: "0" => "2" (forces new resource)
  1699. security_groups.2513725979: "" => "sg-79119b04" (forces new resource)
  1700. security_groups.955802421: "" => "sg-76b5ca0b" (forces new resource)
  1701. source_dest_check: "false" => "false"
  1702. subnet_id: "subnet-6299274f" => "subnet-6299274f"
  1703. tags.%: "1" => "1"
  1704. tags.Name: "terraform_nat_instance" => "terraform_nat_instance"
  1705. tenancy: "default" => "<computed>"
  1706. vpc_security_group_ids.#: "2" => "<computed>"
  1707. UPDATE: aws_route_table.decipher_private
  1708. route.924992980.cidr_block: "0.0.0.0/0" => ""
  1709. route.924992980.gateway_id: "" => ""
  1710. route.924992980.instance_id: "i-e8fe29ff" => ""
  1711. route.924992980.nat_gateway_id: "" => ""
  1712. route.924992980.network_interface_id: "eni-73c78c8d" => ""
  1713. route.924992980.vpc_peering_connection_id: "" => ""
  1714. route.~2469360411.cidr_block: "" => "0.0.0.0/0"
  1715. route.~2469360411.gateway_id: "" => ""
  1716. route.~2469360411.instance_id: "" => "<computed>"
  1717. route.~2469360411.nat_gateway_id: "" => ""
  1718. route.~2469360411.network_interface_id: "" => ""
  1719. route.~2469360411.vpc_peering_connection_id: "" => ""
  1720. UPDATE: aws_route_table.decipher_private_2
  1721. route.924992980.cidr_block: "0.0.0.0/0" => ""
  1722. route.924992980.gateway_id: "" => ""
  1723. route.924992980.instance_id: "i-e8fe29ff" => ""
  1724. route.924992980.nat_gateway_id: "" => ""
  1725. route.924992980.network_interface_id: "eni-73c78c8d" => ""
  1726. route.924992980.vpc_peering_connection_id: "" => ""
  1727. route.~2469360411.cidr_block: "" => "0.0.0.0/0"
  1728. route.~2469360411.gateway_id: "" => ""
  1729. route.~2469360411.instance_id: "" => "<computed>"
  1730. route.~2469360411.nat_gateway_id: "" => ""
  1731. route.~2469360411.network_interface_id: "" => ""
  1732. route.~2469360411.vpc_peering_connection_id: "" => ""
  1733.  
  1734.  
  1735. * plan operation: Resource 'aws_instance.zk_node.1' does not have attribute 'id' for variable 'aws_instance.zk_node.1.id'
  1736. * plan operation: Resource 'aws_instance.zk_node.1' does not have attribute 'id' for variable 'aws_instance.zk_node.1.id'
  1737. * plan operation: Resource 'aws_instance.zk_node.1' does not have attribute 'id' for variable 'aws_instance.zk_node.1.id'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement