Skip to content

Instantly share code, notes, and snippets.

@bernadinm
Created January 2, 2019 19:50
Show Gist options
  • Save bernadinm/52a62dff96fcefb630a7736a15847f3f to your computer and use it in GitHub Desktop.
Save bernadinm/52a62dff96fcefb630a7736a15847f3f to your computer and use it in GitHub Desktop.
terraform plan | terraform-aws-provider GH issue
$ terraform plan
Refreshing Terraform state in-memory prior to plan...
The refreshed state will be used to calculate this plan, but will not be
persisted to local or remote state storage.
------------------------------------------------------------------------
An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
+ create
~ update in-place
Terraform will perform the following actions:
~ data.aws_security_group.peer
id: "" => <computed>
arn: "" => <computed>
description: "" => <computed>
filter.#: "0" => "2"
filter.3852289641.name: "" => "group-name"
filter.3852289641.values.#: "0" => "1"
filter.3852289641.values.1089655979: "" => "*internal-firewall*"
filter.~1869655805.name: "" => "vpc-id"
filter.~1869655805.values.#: "" => <computed>
name: "" => <computed>
tags.%: "" => <computed>
vpc_id: "" => <computed>
~ data.aws_security_group.this
id: "" => <computed>
arn: "" => <computed>
description: "" => <computed>
filter.#: "0" => "2"
filter.3852289641.name: "" => "group-name"
filter.3852289641.values.#: "0" => "1"
filter.3852289641.values.1089655979: "" => "*internal-firewall*"
filter.~1869655805.name: "" => "vpc-id"
filter.~1869655805.values.#: "" => <computed>
name: "" => <computed>
tags.%: "" => <computed>
vpc_id: "" => <computed>
+ aws_security_group.peer
id: <computed>
arn: <computed>
description: "Allow all inbound traffic"
egress.#: <computed>
ingress.#: "1"
ingress.482069346.cidr_blocks.#: "1"
ingress.482069346.cidr_blocks.0: "0.0.0.0/0"
ingress.482069346.description: ""
ingress.482069346.from_port: "0"
ingress.482069346.ipv6_cidr_blocks.#: "0"
ingress.482069346.prefix_list_ids.#: "0"
ingress.482069346.protocol: "-1"
ingress.482069346.security_groups.#: "0"
ingress.482069346.self: "false"
ingress.482069346.to_port: "0"
name: "test-internal-firewall"
owner_id: <computed>
revoke_rules_on_delete: "false"
vpc_id: "${aws_vpc.region2.id}"
+ aws_security_group.this
id: <computed>
arn: <computed>
description: "Allow all inbound traffic"
egress.#: <computed>
ingress.#: "1"
ingress.482069346.cidr_blocks.#: "1"
ingress.482069346.cidr_blocks.0: "0.0.0.0/0"
ingress.482069346.description: ""
ingress.482069346.from_port: "0"
ingress.482069346.ipv6_cidr_blocks.#: "0"
ingress.482069346.prefix_list_ids.#: "0"
ingress.482069346.protocol: "-1"
ingress.482069346.security_groups.#: "0"
ingress.482069346.self: "false"
ingress.482069346.to_port: "0"
name: "test-internal-firewall"
owner_id: <computed>
revoke_rules_on_delete: "false"
vpc_id: "${aws_vpc.region1.id}"
+ aws_vpc.region1
id: <computed>
arn: <computed>
assign_generated_ipv6_cidr_block: "false"
cidr_block: "10.1.0.0/16"
default_network_acl_id: <computed>
default_route_table_id: <computed>
default_security_group_id: <computed>
dhcp_options_id: <computed>
enable_classiclink: <computed>
enable_classiclink_dns_support: <computed>
enable_dns_hostnames: <computed>
enable_dns_support: "true"
instance_tenancy: "default"
ipv6_association_id: <computed>
ipv6_cidr_block: <computed>
main_route_table_id: <computed>
owner_id: <computed>
+ aws_vpc.region2
id: <computed>
arn: <computed>
assign_generated_ipv6_cidr_block: "false"
cidr_block: "10.2.0.0/16"
default_network_acl_id: <computed>
default_route_table_id: <computed>
default_security_group_id: <computed>
dhcp_options_id: <computed>
enable_classiclink: <computed>
enable_classiclink_dns_support: <computed>
enable_dns_hostnames: <computed>
enable_dns_support: "true"
instance_tenancy: "default"
ipv6_association_id: <computed>
ipv6_cidr_block: <computed>
main_route_table_id: <computed>
owner_id: <computed>
Plan: 4 to add, 2 to change, 0 to destroy.
------------------------------------------------------------------------
Note: You didn't specify an "-out" parameter to save this plan, so Terraform
can't guarantee that exactly these actions will be performed if
"terraform apply" is subsequently run.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment