Created
May 3, 2019 13:43
-
-
Save jamesholland-uk/14ae426fd3e18af8b9076178590d0682 to your computer and use it in GitHub Desktop.
Terraform Crash Report
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2019/05/03 13:40:57 [INFO] Terraform version: 0.11.13 | |
2019/05/03 13:40:57 [INFO] Go runtime version: go1.11.5 | |
2019/05/03 13:40:57 [INFO] CLI args: []string{"/usr/local/bin/terraform", "plan"} | |
2019/05/03 13:40:57 [DEBUG] Attempting to open CLI config file: /root/.terraformrc | |
2019/05/03 13:40:57 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2019/05/03 13:40:57 [INFO] CLI command args: []string{"plan"} | |
2019/05/03 13:40:57 [INFO] command: empty terraform config, returning nil | |
2019/05/03 13:40:57 [DEBUG] command: no data state file found for backend config | |
2019/05/03 13:40:57 [DEBUG] New state was assigned lineage "1fee6d61-9200-0ebd-698f-b88f9c7ff6a3" | |
2019/05/03 13:40:57 [INFO] command: backend initialized: <nil> | |
2019/05/03 13:40:57 [DEBUG] checking for provider in "." | |
2019/05/03 13:40:57 [DEBUG] checking for provider in "/usr/local/bin" | |
2019/05/03 13:40:57 [DEBUG] checking for provider in ".terraform/plugins/linux_amd64" | |
2019/05/03 13:40:57 [DEBUG] found provider "terraform-provider-google_v2.5.1_x4" | |
2019/05/03 13:40:57 [DEBUG] found provider "terraform-provider-null_v2.1.2_x4" | |
2019/05/03 13:40:57 [DEBUG] found valid plugin: "google", "2.5.1", "/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-google_v2.5.1_x4" | |
2019/05/03 13:40:57 [DEBUG] found valid plugin: "null", "2.1.2", "/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.2_x4" | |
2019/05/03 13:40:58 [DEBUG] checking for provisioner in "." | |
2019/05/03 13:40:58 [DEBUG] checking for provisioner in "/usr/local/bin" | |
2019/05/03 13:40:58 [DEBUG] checking for provisioner in ".terraform/plugins/linux_amd64" | |
2019/05/03 13:40:58 [INFO] command: backend <nil> is not enhanced, wrapping in local | |
2019/05/03 13:40:58 [INFO] backend/local: starting Plan operation | |
2019/05/03 13:40:58 [DEBUG] New state was assigned lineage "0789d8f2-a675-f6fa-d479-9bf327cf4594" | |
2019/05/03 13:40:58 [INFO] terraform: building graph: GraphTypeInput | |
2019/05/03 13:40:58 [TRACE] ConfigTransformer: Starting for path: [] | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.ConfigTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.LocalTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.OutputTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.OrphanOutputTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-outside | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-outside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d27e0), RawConfig:(*config.RawConfig)(0xc0002d2690), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-inside | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d29a0), RawConfig:(*config.RawConfig)(0xc0002d2850), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.mgmt | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"mgmt", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc0003d9880), RawConfig:(*config.RawConfig)(0xc0003d97a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.database-net | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc000436310), RawConfig:(*config.RawConfig)(0xc0004360e0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-outside | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-outside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000436c40), RawConfig:(*config.RawConfig)(0xc000436a10), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-database | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-database", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000436ee0), RawConfig:(*config.RawConfig)(0xc000436cb0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.database-route-to-inside | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database-route-to-inside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc0004373b0), RawConfig:(*config.RawConfig)(0xc000437180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: null_resource.start_email | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"start_email", Type:"null_resource", RawCount:(*config.RawConfig)(0xc0003d9570), RawConfig:(*config.RawConfig)(0xc0003d9500), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc0003c5650)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.inside-to-db | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-to-db", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2ee0), RawConfig:(*config.RawConfig)(0xc0002d2cb0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.inside | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc0003d9c70), RawConfig:(*config.RawConfig)(0xc0003d9b90), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.db | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"db", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc0002d22a0), RawConfig:(*config.RawConfig)(0xc000467030), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.mgmt-net | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"mgmt-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc0003d9b20), RawConfig:(*config.RawConfig)(0xc0003d98f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.mgmt"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.database | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc000436070), RawConfig:(*config.RawConfig)(0xc0003d9f80), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.outside-to-inside | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-to-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2c40), RawConfig:(*config.RawConfig)(0xc0002d2a10), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.db-to-inside | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"db-to-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d3420), RawConfig:(*config.RawConfig)(0xc0002d31f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.outside | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc000436460), RawConfig:(*config.RawConfig)(0xc000436380), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.vm-series | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"vm-series", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000437ab0), RawConfig:(*config.RawConfig)(0xc000437420), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc00043efc0), (*config.Provisioner)(0xc00043f230), (*config.Provisioner)(0xc00043f440), (*config.Provisioner)(0xc00043f620), (*config.Provisioner)(0xc00043f920), (*config.Provisioner)(0xc00043fad0)}, Provider:"", DependsOn:[]string{"google_compute_subnetwork.mgmt-net", "google_compute_subnetwork.inside-net", "google_compute_subnetwork.outside-net", "google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.inside-net | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc0003d9f10), RawConfig:(*config.RawConfig)(0xc0003d9ce0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-real-internet | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-real-internet", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000437110), RawConfig:(*config.RawConfig)(0xc000436f50), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.inside-to-outside | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-to-outside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d3180), RawConfig:(*config.RawConfig)(0xc0002d2f50), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.linux | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"linux", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000466af0), RawConfig:(*config.RawConfig)(0xc000466690), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.kali | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"kali", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000466fc0), RawConfig:(*config.RawConfig)(0xc000466b60), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.outside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-mgt | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-mgt", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2460), RawConfig:(*config.RawConfig)(0xc0002d2310), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.mgmt"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.outside-net | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc000436700), RawConfig:(*config.RawConfig)(0xc0004364d0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.outside-route-to-inside | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-route-to-inside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc0004369a0), RawConfig:(*config.RawConfig)(0xc000436770), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.outside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-db | |
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-db", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2620), RawConfig:(*config.RawConfig)(0xc0002d24d0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-db": google_compute_firewall.inside-to-db | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "null_resource.start_email": null_resource.start_email | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_instance.db": google_compute_instance.db | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_network.inside": google_compute_network.inside | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_network.database": google_compute_network.database | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.outside-to-inside": google_compute_firewall.outside-to-inside | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.db-to-inside": google_compute_firewall.db-to-inside | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_subnetwork.mgmt-net": google_compute_subnetwork.mgmt-net | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_instance.vm-series": google_compute_instance.vm-series | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_network.outside": google_compute_network.outside | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-real-internet": google_compute_route.inside-route-to-real-internet | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-outside": google_compute_firewall.inside-to-outside | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_subnetwork.inside-net": google_compute_subnetwork.inside-net | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_instance.kali": google_compute_instance.kali | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-mgt": google_compute_firewall.internet-ingress-for-mgt | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_instance.linux": google_compute_instance.linux | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_route.outside-route-to-inside": google_compute_route.outside-route-to-inside | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-db": google_compute_firewall.internet-ingress-for-db | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_subnetwork.outside-net": google_compute_subnetwork.outside-net | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_subnetwork.database-net": google_compute_subnetwork.database-net | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-outside": google_compute_route.inside-route-to-outside | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-database": google_compute_route.inside-route-to-database | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_route.database-route-to-inside": google_compute_route.database-route-to-inside | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-outside": google_compute_firewall.internet-ingress-for-outside | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-inside": google_compute_firewall.internet-ingress-for-inside | |
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_network.mgmt": google_compute_network.mgmt | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2019/05/03 13:40:58 [TRACE] Attach provider request: []string{} google | |
2019/05/03 13:40:58 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"google", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003d9340)} | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [DEBUG] adding missing provider: null | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [DEBUG] resource null_resource.start_email using provider provider.null | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.inside-to-db using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_network.inside using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_instance.db using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_subnetwork.mgmt-net using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_network.database using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.outside-to-inside using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.db-to-inside using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_network.outside using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_instance.vm-series using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_subnetwork.inside-net using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_route.inside-route-to-real-internet using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.inside-to-outside using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_instance.linux using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_instance.kali using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.internet-ingress-for-mgt using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_subnetwork.outside-net using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_route.outside-route-to-inside using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.internet-ingress-for-db using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.internet-ingress-for-outside using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.internet-ingress-for-inside using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_network.mgmt using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_subnetwork.database-net using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_route.inside-route-to-outside using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_route.inside-route-to-database using provider provider.google | |
2019/05/03 13:40:58 [DEBUG] resource google_compute_route.database-route-to-inside using provider provider.google | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.ProviderTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.RemovedModuleTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "output.panos-untrust-pip" references: [google_compute_instance.vm-series] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.deploymentArea" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "provider.null" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.mgmt-net" references: [google_compute_network.mgmt var.gcp_region var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_network.database" references: [var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.outside-to-inside" references: [google_compute_network.inside var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.db-to-inside" references: [google_compute_network.inside var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.project_mgr_mobile" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_network.outside" references: [var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_instance.vm-series" references: [google_compute_instance.kali google_compute_instance.linux google_compute_subnetwork.database-net google_compute_subnetwork.inside-net google_compute_subnetwork.mgmt-net google_compute_subnetwork.outside-net var.deploymentArea var.devWorkflow var.email_key var.gcp_ssh_public_key var.gcp_zone var.panos_api_key var.projectName var.project_mgr_email var.project_mgr_mobile var.requestNumber var.requested_for_email var.requested_for_mobile var.sms_key var.subnetOctet var.user_password] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.email_key" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.subnetOctet" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.inside-net" references: [google_compute_network.inside var.gcp_region var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-real-internet" references: [google_compute_subnetwork.inside-net var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-outside" references: [google_compute_network.outside var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "output.panos-mgmt-pip" references: [google_compute_instance.vm-series] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "provider.google" references: [var.gcp_zone var.gcp_credentials var.gcp_project_id] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_instance.linux" references: [google_compute_subnetwork.inside-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_instance.kali" references: [google_compute_subnetwork.outside-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-mgt" references: [google_compute_network.mgmt var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.projectName" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.gcp_zone" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.sms_key" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.requestNumber" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.requested_for_email" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.outside-net" references: [google_compute_network.outside var.gcp_region var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_route.outside-route-to-inside" references: [google_compute_subnetwork.outside-net var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-db" references: [google_compute_network.database var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.gcp_region" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_route.database-route-to-inside" references: [google_compute_subnetwork.database-net var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-outside" references: [google_compute_network.outside var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-inside" references: [google_compute_network.inside var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "output.kali-pip" references: [google_compute_instance.kali] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_network.mgmt" references: [var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.database-net" references: [google_compute_network.database var.gcp_region var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-outside" references: [google_compute_subnetwork.inside-net var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-database" references: [google_compute_subnetwork.inside-net var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.gcp_project_id" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.user_password" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.project_mgr_email" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "null_resource.start_email" references: [var.email_key var.requested_for_email] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-db" references: [google_compute_network.database var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.gcp_ssh_public_key" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.devWorkflow" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.requested_for_mobile" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_network.inside" references: [var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_instance.db" references: [google_compute_subnetwork.database-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.gcp_credentials" references: [] | |
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.panos_api_key" references: [] | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
google_compute_instance.linux - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
var.email_key - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource | |
google_compute_network.database - *terraform.NodeAbstractResource | |
var.gcp_region - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource | |
google_compute_network.inside - *terraform.NodeAbstractResource | |
var.gcp_region - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource | |
google_compute_network.mgmt - *terraform.NodeAbstractResource | |
var.gcp_region - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource | |
google_compute_network.outside - *terraform.NodeAbstractResource | |
var.gcp_region - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodeAbstractResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource | |
google_compute_instance.db - *terraform.NodeAbstractResource | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.start_email - *terraform.NodeAbstractResource | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
google_compute_instance.vm-series - *terraform.NodeAbstractResource | |
null_resource.start_email - *terraform.NodeAbstractResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:58 [DEBUG] Starting graph walk: walkInput | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-db" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.gcp_ssh_public_key" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "output.panos-untrust-pip" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "provider.google (close)" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "null_resource.start_email" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.user_password" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_route.outside-route-to-inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.outside-to-inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.project_mgr_mobile" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-mgt" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.email_key" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "output.panos-mgmt-pip" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.projectName" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.gcp_zone" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_network.database" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_network.outside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_instance.db" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "provider.null" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_instance.kali" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.subnetOctet" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_instance.linux" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.mgmt-net" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_instance.vm-series" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-real-internet" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.gcp_region" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_network.mgmt" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-db" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.gcp_credentials" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-outside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-database" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "provisioner.local-exec (close)" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "output.kali-pip" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.requestNumber" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_route.database-route-to-inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-outside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.deploymentArea" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.sms_key" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.outside-net" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_network.inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "provider.google" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.requested_for_email" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "provider.null (close)" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.project_mgr_email" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.requested_for_mobile" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.devWorkflow" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.panos_api_key" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.db-to-inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-outside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "root" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.gcp_project_id" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.requested_for_email" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "null_resource.start_email" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.inside-to-db" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_instance.db" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.sms_key" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.inside-net" waiting on "var.gcp_region" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.null (close)" waiting on "null_resource.start_email" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.deploymentArea" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.requested_for_mobile" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.mgmt" waiting on "var.subnetOctet" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_instance.vm-series" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_zone" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.outside-net" waiting on "google_compute_network.outside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "var.requested_for_email" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-outside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-outside" waiting on "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "output.panos-untrust-pip" waiting on "google_compute_instance.vm-series" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "root" waiting on "provisioner.local-exec (close)" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "output.kali-pip" waiting on "google_compute_instance.kali" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "var.email_key" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.db-to-inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-mgt" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.database" waiting on "var.subnetOctet" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_instance.kali" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.outside-route-to-inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "google_compute_instance.vm-series" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.database-net" waiting on "google_compute_network.database" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.mgmt-net" waiting on "var.gcp_region" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "output.panos-mgmt-pip" waiting on "google_compute_instance.vm-series" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.panos-mgmt-pip" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_credentials" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-database" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.project_mgr_mobile" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-outside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.inside-to-outside" waiting on "google_compute_network.outside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-outside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.inside-to-outside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.requestNumber" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "root" waiting on "provider.null (close)" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.devWorkflow" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.panos-untrust-pip" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-real-internet" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.outside-to-inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-real-internet" waiting on "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.db-to-inside" waiting on "google_compute_network.inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_instance.linux" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.inside-to-db" waiting on "google_compute_network.database" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.kali-pip" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.database-route-to-inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.gcp_ssh_public_key" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-database" waiting on "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.inside" waiting on "provider.google" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.database-route-to-inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-real-internet" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-inside" waiting on "google_compute_network.inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.inside" waiting on "var.subnetOctet" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.outside" waiting on "var.subnetOctet" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.deploymentArea" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_project_id" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_route.database-route-to-inside" waiting on "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.inside-to-outside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.deploymentArea" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-database" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_subnetwork.mgmt-net" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.project_mgr_email" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.outside-net" waiting on "var.gcp_region" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.user_password" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.email_key" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.outside-to-inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_route.outside-route-to-inside" waiting on "google_compute_subnetwork.outside-net" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-db" waiting on "google_compute_network.database" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.inside-net" waiting on "google_compute_network.inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.database" waiting on "provider.google" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.devWorkflow" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.gcp_ssh_public_key" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.db-to-inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.database-net" waiting on "var.gcp_region" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "provider.null" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.mgmt-net" waiting on "google_compute_network.mgmt" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.mgmt" waiting on "provider.google" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-mgt" waiting on "google_compute_network.mgmt" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.outside-route-to-inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.gcp_ssh_public_key" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "null_resource.start_email" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.outside" waiting on "provider.google" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.panos_api_key" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-db" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.inside-to-db" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "root" waiting on "provider.google (close)" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-mgt" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.outside-to-inside" waiting on "google_compute_network.inside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.requestNumber" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.devWorkflow" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-outside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-db" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.requestNumber" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_instance.db" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-outside" waiting on "google_compute_network.outside" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.projectName" | |
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "google_compute_subnetwork.outside-net" | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.database-net", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "provider.null (close)", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "output.panos-untrust-pip", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_instance.linux", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.inside-to-db", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_instance.db", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_network.mgmt", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.outside-net", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "provisioner.local-exec (close)", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_route.database-route-to-inside", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.outside-to-inside", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-outside", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "provider.google (close)", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.inside-net", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "output.panos-mgmt-pip", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.inside-to-outside", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "null_resource.start_email", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_network.database", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-inside", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_route.outside-route-to-inside", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-db", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_instance.vm-series", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-outside", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-database", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_network.inside", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-mgt", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_instance.kali", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "provider.google", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "output.kali-pip", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.db-to-inside", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.mgmt-net", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-real-internet", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_network.outside", sending new deps | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.projectName" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.projectName': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.requested_for_email" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.requested_for_email': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.email_key" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.email_key': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.gcp_zone" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.gcp_zone': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "provider.null" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.provider.null': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.requested_for_mobile" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.requested_for_mobile': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.devWorkflow" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.devWorkflow': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.project_mgr_email" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.project_mgr_email': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.panos_api_key" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.panos_api_key': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.gcp_project_id" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.gcp_project_id': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.gcp_ssh_public_key" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.gcp_ssh_public_key': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.user_password" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.user_password': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.project_mgr_mobile" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.project_mgr_mobile': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.subnetOctet" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.subnetOctet': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.gcp_region" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.gcp_region': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.gcp_credentials" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.gcp_credentials': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "provider.google" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.provider.google': walking | |
2019/05/03 13:40:58 [TRACE] vertex 'root.provider.google': evaluating | |
2019/05/03 13:40:58 [TRACE] [walkInput] Entering eval tree: provider.google | |
2019/05/03 13:40:58 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:58 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019-05-03T13:40:58.726Z [DEBUG] plugin: starting plugin: path=/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-google_v2.5.1_x4 args=[/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-google_v2.5.1_x4] | |
2019/05/03 13:40:58 [TRACE] vertex 'root.provider.null': evaluating | |
2019/05/03 13:40:58 [TRACE] [walkInput] Entering eval tree: provider.null | |
2019/05/03 13:40:58 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:58 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.requestNumber" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.requestNumber': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.deploymentArea" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.deploymentArea': walking | |
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.sms_key" | |
2019/05/03 13:40:58 [TRACE] vertex 'root.var.sms_key': walking | |
2019-05-03T13:40:58.747Z [DEBUG] plugin: waiting for RPC address: path=/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-google_v2.5.1_x4 | |
2019-05-03T13:40:59.069Z [DEBUG] plugin.terraform-provider-google_v2.5.1_x4: plugin address: timestamp=2019-05-03T13:40:59.067Z address=/tmp/plugin535774585 network=unix | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInputProvider | |
2019-05-03T13:40:59.083Z [DEBUG] plugin: starting plugin: path=/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.2_x4 args=[/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.2_x4] | |
2019-05-03T13:40:59.107Z [DEBUG] plugin: waiting for RPC address: path=/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.2_x4 | |
2019-05-03T13:40:59.302Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: plugin address: timestamp=2019-05-03T13:40:59.301Z network=unix address=/tmp/plugin597642377 | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInputProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: provider.google | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.inside': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.outside-to-inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.outside-to-inside': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.database" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.database': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.database-net': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.database-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.database-route-to-inside': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.outside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.outside': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.outside-net" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.outside-net': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.outside-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.outside-route-to-inside': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.mgmt" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.mgmt': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-mgt" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-mgt': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.inside-net': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-outside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-outside': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.db-to-inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.db-to-inside': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-inside': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-db" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-db': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.inside-to-db" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-db': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.db" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.db': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.inside-to-outside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-outside': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-outside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-outside': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.kali" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.kali': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.kali-pip" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.kali-pip': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.kali-pip': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkInput] Entering eval tree: output.kali-pip | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: output.kali-pip | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.mgmt-net" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.mgmt-net': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.linux" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.linux': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.vm-series" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.vm-series': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.panos-untrust-pip" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-untrust-pip': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-untrust-pip': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkInput] Entering eval tree: output.panos-untrust-pip | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: output.panos-untrust-pip | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-real-internet" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-real-internet': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-database" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-database': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.google (close)" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google (close)': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google (close)': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkInput] Entering eval tree: provider.google (close) | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.panos-mgmt-pip" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-mgmt-pip': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-mgmt-pip': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkInput] Entering eval tree: output.panos-mgmt-pip | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: provider.google (close) | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: output.panos-mgmt-pip | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: provider.null | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "null_resource.start_email" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.null_resource.start_email': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.null (close)" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null (close)': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null (close)': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkInput] Entering eval tree: provider.null (close) | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: provider.null (close) | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkInput] Entering eval tree: meta.count-boundary (count boundary fixup) | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: meta.count-boundary (count boundary fixup) | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provisioner.local-exec (close)" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provisioner.local-exec (close)': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provisioner.local-exec (close)': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkInput] Entering eval tree: provisioner.local-exec (close) | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCloseProvisioner | |
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: provisioner.local-exec (close) | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "root" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.root': walking | |
2019/05/03 13:40:59 [INFO] terraform: building graph: GraphTypeValidate | |
2019/05/03 13:40:59 [TRACE] ConfigTransformer: Starting for path: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ConfigTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.LocalTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OutputTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OrphanOutputTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: null_resource.start_email | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"start_email", Type:"null_resource", RawCount:(*config.RawConfig)(0xc0003d9570), RawConfig:(*config.RawConfig)(0xc0003d9500), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc0003c5650)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.inside-net | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc0003d9f10), RawConfig:(*config.RawConfig)(0xc0003d9ce0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.outside-route-to-inside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-route-to-inside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc0004369a0), RawConfig:(*config.RawConfig)(0xc000436770), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.outside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.outside-to-inside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-to-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2c40), RawConfig:(*config.RawConfig)(0xc0002d2a10), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.database-net | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc000436310), RawConfig:(*config.RawConfig)(0xc0004360e0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-database | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-database", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000436ee0), RawConfig:(*config.RawConfig)(0xc000436cb0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.kali | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"kali", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000466fc0), RawConfig:(*config.RawConfig)(0xc000466b60), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.outside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.db | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"db", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc0002d22a0), RawConfig:(*config.RawConfig)(0xc000467030), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-mgt | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-mgt", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2460), RawConfig:(*config.RawConfig)(0xc0002d2310), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.mgmt"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-inside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d29a0), RawConfig:(*config.RawConfig)(0xc0002d2850), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.inside-to-db | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-to-db", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2ee0), RawConfig:(*config.RawConfig)(0xc0002d2cb0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-outside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-outside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d27e0), RawConfig:(*config.RawConfig)(0xc0002d2690), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.database | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc000436070), RawConfig:(*config.RawConfig)(0xc0003d9f80), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-db | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-db", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2620), RawConfig:(*config.RawConfig)(0xc0002d24d0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.mgmt-net | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"mgmt-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc0003d9b20), RawConfig:(*config.RawConfig)(0xc0003d98f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.mgmt"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.outside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc000436460), RawConfig:(*config.RawConfig)(0xc000436380), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.outside-net | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc000436700), RawConfig:(*config.RawConfig)(0xc0004364d0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.vm-series | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"vm-series", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000437ab0), RawConfig:(*config.RawConfig)(0xc000437420), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc00043efc0), (*config.Provisioner)(0xc00043f230), (*config.Provisioner)(0xc00043f440), (*config.Provisioner)(0xc00043f620), (*config.Provisioner)(0xc00043f920), (*config.Provisioner)(0xc00043fad0)}, Provider:"", DependsOn:[]string{"google_compute_subnetwork.mgmt-net", "google_compute_subnetwork.inside-net", "google_compute_subnetwork.outside-net", "google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.mgmt | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"mgmt", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc0003d9880), RawConfig:(*config.RawConfig)(0xc0003d97a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.inside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc0003d9c70), RawConfig:(*config.RawConfig)(0xc0003d9b90), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.db-to-inside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"db-to-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d3420), RawConfig:(*config.RawConfig)(0xc0002d31f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.inside-to-outside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-to-outside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d3180), RawConfig:(*config.RawConfig)(0xc0002d2f50), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-outside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-outside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000436c40), RawConfig:(*config.RawConfig)(0xc000436a10), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-real-internet | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-real-internet", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000437110), RawConfig:(*config.RawConfig)(0xc000436f50), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.database-route-to-inside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database-route-to-inside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc0004373b0), RawConfig:(*config.RawConfig)(0xc000437180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.linux | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"linux", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000466af0), RawConfig:(*config.RawConfig)(0xc000466690), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.outside": google_compute_network.outside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.outside-net": google_compute_subnetwork.outside-net | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.vm-series": google_compute_instance.vm-series | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.mgmt-net": google_compute_subnetwork.mgmt-net | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.inside": google_compute_network.inside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.db-to-inside": google_compute_firewall.db-to-inside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.mgmt": google_compute_network.mgmt | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-real-internet": google_compute_route.inside-route-to-real-internet | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.database-route-to-inside": google_compute_route.database-route-to-inside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.linux": google_compute_instance.linux | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-outside": google_compute_firewall.inside-to-outside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-outside": google_compute_route.inside-route-to-outside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.inside-net": google_compute_subnetwork.inside-net | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.outside-route-to-inside": google_compute_route.outside-route-to-inside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.outside-to-inside": google_compute_firewall.outside-to-inside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "null_resource.start_email": null_resource.start_email | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-database": google_compute_route.inside-route-to-database | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.kali": google_compute_instance.kali | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.database-net": google_compute_subnetwork.database-net | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-mgt": google_compute_firewall.internet-ingress-for-mgt | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-inside": google_compute_firewall.internet-ingress-for-inside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-db": google_compute_firewall.inside-to-db | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.db": google_compute_instance.db | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-outside": google_compute_firewall.internet-ingress-for-outside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-db": google_compute_firewall.internet-ingress-for-db | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.database": google_compute_network.database | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2019/05/03 13:40:59 [TRACE] Attach provider request: []string{} google | |
2019/05/03 13:40:59 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"google", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003d9340)} | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [DEBUG] adding missing provider: null | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.outside-route-to-inside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.outside-to-inside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource null_resource.start_email using provider provider.null | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.inside-net using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.kali using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.database-net using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.inside-route-to-database using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-inside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.inside-to-db using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.db using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-mgt using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-outside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.database using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-db using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.outside-net using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.vm-series using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.mgmt-net using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.outside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.db-to-inside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.mgmt using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.inside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.database-route-to-inside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.linux using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.inside-to-outside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.inside-route-to-outside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.inside-route-to-real-internet using provider provider.google | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ProviderTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.MissingProvisionerTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ProvisionerTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RemovedModuleTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.mgmt" references: [var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.inside" references: [var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.db-to-inside" references: [google_compute_network.inside var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.panos-mgmt-pip" references: [google_compute_instance.vm-series] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_region" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_ssh_public_key" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requested_for_email" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "provider.null" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-outside" references: [google_compute_subnetwork.inside-net var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-real-internet" references: [google_compute_subnetwork.inside-net var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.database-route-to-inside" references: [google_compute_subnetwork.database-net var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.linux" references: [google_compute_subnetwork.inside-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-outside" references: [google_compute_network.outside var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requestNumber" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "null_resource.start_email" references: [var.email_key var.requested_for_email] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.inside-net" references: [google_compute_network.inside var.gcp_region var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.outside-route-to-inside" references: [google_compute_subnetwork.outside-net var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.outside-to-inside" references: [google_compute_network.inside var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.kali-pip" references: [google_compute_instance.kali] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.devWorkflow" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "provider.google" references: [var.gcp_zone var.gcp_credentials var.gcp_project_id] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.database-net" references: [google_compute_network.database var.gcp_region var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-database" references: [google_compute_subnetwork.inside-net var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.kali" references: [google_compute_subnetwork.outside-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_credentials" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.user_password" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.project_mgr_email" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.db" references: [google_compute_subnetwork.database-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-mgt" references: [google_compute_network.mgmt var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-inside" references: [google_compute_network.inside var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-db" references: [google_compute_network.database var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.projectName" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.project_mgr_mobile" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-outside" references: [google_compute_network.outside var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_zone" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.panos_api_key" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.sms_key" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.email_key" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.database" references: [var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-db" references: [google_compute_network.database var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.panos-untrust-pip" references: [google_compute_instance.vm-series] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.subnetOctet" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.deploymentArea" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requested_for_mobile" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.mgmt-net" references: [google_compute_network.mgmt var.gcp_region var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.outside" references: [var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.outside-net" references: [google_compute_network.outside var.gcp_region var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.vm-series" references: [google_compute_instance.kali google_compute_instance.linux google_compute_subnetwork.database-net google_compute_subnetwork.inside-net google_compute_subnetwork.mgmt-net google_compute_subnetwork.outside-net var.deploymentArea var.devWorkflow var.email_key var.gcp_ssh_public_key var.gcp_zone var.panos_api_key var.projectName var.project_mgr_email var.project_mgr_mobile var.requestNumber var.requested_for_email var.requested_for_mobile var.sms_key var.subnetOctet var.user_password] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_project_id" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "provisioner.local-exec" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
google_compute_instance.linux - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.email_key - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource | |
google_compute_network.database - *terraform.NodeValidatableResource | |
var.gcp_region - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource | |
google_compute_network.inside - *terraform.NodeValidatableResource | |
var.gcp_region - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource | |
google_compute_network.mgmt - *terraform.NodeValidatableResource | |
var.gcp_region - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource | |
google_compute_network.outside - *terraform.NodeValidatableResource | |
var.gcp_region - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodeValidatableResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource | |
google_compute_instance.db - *terraform.NodeValidatableResource | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.start_email - *terraform.NodeValidatableResource | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
google_compute_instance.vm-series - *terraform.NodeValidatableResource | |
null_resource.start_email - *terraform.NodeValidatableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [DEBUG] Starting graph walk: walkValidate | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.deploymentArea" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.mgmt" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.google" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "null_resource.start_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.outside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requestNumber" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.panos-untrust-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requested_for_mobile" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-real-internet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.database-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_credentials" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.projectName" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provisioner.local-exec" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.null (close)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.panos_api_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.db-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_ssh_public_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.project_mgr_mobile" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.project_mgr_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.outside-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_zone" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.outside-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "root" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.kali-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_region" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.user_password" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.linux" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.null" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.kali" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.vm-series" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.panos-mgmt-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.sms_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.devWorkflow" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-mgt" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provisioner.local-exec (close)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.mgmt-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.email_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requested_for_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.google (close)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.subnetOctet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_project_id" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-real-internet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_zone" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_credentials" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.inside-to-db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.requestNumber" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-real-internet" waiting on "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_instance.vm-series" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.devWorkflow" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-real-internet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.project_mgr_mobile" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.db-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "null_resource.start_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "provisioner.local-exec" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.deploymentArea" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-mgt" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.mgmt-net" waiting on "google_compute_network.mgmt" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.email_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.panos-untrust-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.devWorkflow" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.outside-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.panos_api_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-outside" waiting on "google_compute_network.outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.kali-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-db" waiting on "google_compute_network.database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.deploymentArea" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.database-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.mgmt-net" waiting on "var.gcp_region" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.database-net" waiting on "google_compute_network.database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.requestNumber" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "provider.google (close)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.database" waiting on "var.subnetOctet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.project_mgr_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.gcp_ssh_public_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-mgt" waiting on "google_compute_network.mgmt" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.panos-mgmt-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "output.kali-pip" waiting on "google_compute_instance.kali" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.mgmt" waiting on "provider.google" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "output.panos-untrust-pip" waiting on "google_compute_instance.vm-series" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.inside-to-db" waiting on "google_compute_network.database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_instance.db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.database-route-to-inside" waiting on "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_instance.linux" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "google_compute_subnetwork.outside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.inside-to-db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.outside-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.outside-net" waiting on "var.gcp_region" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.inside" waiting on "var.subnetOctet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.null (close)" waiting on "null_resource.start_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.deploymentArea" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.requested_for_mobile" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.inside-to-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.db-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.outside-route-to-inside" waiting on "google_compute_subnetwork.outside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.requested_for_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.database-net" waiting on "var.gcp_region" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.outside" waiting on "var.subnetOctet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.outside-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.database-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-outside" waiting on "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.outside" waiting on "provider.google" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "var.requested_for_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "provisioner.local-exec" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "provisioner.local-exec (close)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-inside" waiting on "google_compute_network.inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.db-to-inside" waiting on "google_compute_network.inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-mgt" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "google_compute_instance.vm-series" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_subnetwork.mgmt-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.inside" waiting on "provider.google" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "null_resource.start_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.requestNumber" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.gcp_ssh_public_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_instance.db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_instance.kali" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.inside-to-outside" waiting on "google_compute_network.outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.sms_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.user_password" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.outside-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-database" waiting on "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "provider.null (close)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.inside-to-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "output.panos-mgmt-pip" waiting on "google_compute_instance.vm-series" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.inside-net" waiting on "var.gcp_region" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.gcp_ssh_public_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.database" waiting on "provider.google" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.projectName" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "provider.null" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.outside-net" waiting on "google_compute_network.outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.mgmt" waiting on "var.subnetOctet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "var.email_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.devWorkflow" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.inside-net" waiting on "google_compute_network.inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_project_id" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.outside-to-inside" waiting on "google_compute_network.inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "output.kali-pip", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provisioner.local-exec (close)", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.kali", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.vm-series", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.database", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "output.panos-untrust-pip", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "output.panos-mgmt-pip", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.outside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-inside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.inside-to-outside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provider.google", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.mgmt-net", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-db", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-mgt", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.inside-to-db", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.inside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provider.google (close)", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.linux", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-outside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.db", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "null_resource.start_email", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provider.null (close)", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.outside-route-to-inside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.outside-to-inside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-database", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-real-internet", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.database-net", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.mgmt", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.database-route-to-inside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.outside-net", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-outside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.db-to-inside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.inside-net", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_credentials" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_credentials': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.projectName" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.projectName': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.panos_api_key" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.panos_api_key': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provisioner.local-exec" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provisioner.local-exec': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provisioner.local-exec': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: provisioner.local-exec | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInitProvisioner | |
2019-05-03T13:40:59.373Z [DEBUG] plugin: starting plugin: path=/usr/local/bin/terraform args="[/usr/local/bin/terraform internal-plugin provisioner local-exec]" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.sms_key" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.sms_key': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requested_for_email" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requested_for_email': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.devWorkflow" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.devWorkflow': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.email_key" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.email_key': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.subnetOctet" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.subnetOctet': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_project_id" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_project_id': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.deploymentArea" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.deploymentArea': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requestNumber" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requestNumber': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requested_for_mobile" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requested_for_mobile': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.project_mgr_mobile" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.project_mgr_mobile': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_ssh_public_key" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_ssh_public_key': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_zone" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_zone': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.google" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: provider.google | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019-05-03T13:40:59.378Z [DEBUG] plugin: waiting for RPC address: path=/usr/local/bin/terraform | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.project_mgr_email" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.project_mgr_email': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_region" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_region': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.null" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: provider.null | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.user_password" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.user_password': walking | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: provider.null | |
2019-05-03T13:40:59.463Z [DEBUG] plugin.terraform: 2019/05/03 13:40:59 [INFO] Terraform version: 0.11.13 | |
2019-05-03T13:40:59.463Z [DEBUG] plugin.terraform: 2019/05/03 13:40:59 [INFO] Go runtime version: go1.11.5 | |
2019-05-03T13:40:59.463Z [DEBUG] plugin.terraform: 2019/05/03 13:40:59 [INFO] CLI args: []string{"/usr/local/bin/terraform", "internal-plugin", "provisioner", "local-exec"} | |
2019-05-03T13:40:59.464Z [DEBUG] plugin.terraform: 2019/05/03 13:40:59 [DEBUG] Attempting to open CLI config file: /root/.terraformrc | |
2019-05-03T13:40:59.464Z [DEBUG] plugin.terraform: 2019/05/03 13:40:59 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2019-05-03T13:40:59.465Z [DEBUG] plugin.terraform: 2019/05/03 13:40:59 [INFO] CLI command args: []string{"internal-plugin", "provisioner", "local-exec"} | |
2019-05-03T13:40:59.465Z [DEBUG] plugin.terraform: local-exec-provisioner (internal) 2019/05/03 13:40:59 [INFO] Starting provisioner plugin local-exec | |
2019-05-03T13:40:59.466Z [DEBUG] plugin.terraform: plugin address: timestamp=2019-05-03T13:40:59.465Z address=/tmp/plugin935352528 network=unix | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: provider.google | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.database" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.database': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.database': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.database | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.database | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.database': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_network.database - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.database": google_compute_network.database | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_network.database - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_network.database - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.database" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_network.database - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_network.database - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.database" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.database': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.database': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.database | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.inside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.inside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.inside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.inside | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.inside': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_network.inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.inside": google_compute_network.inside | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_network.inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_network.inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.inside" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_network.inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_network.inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.inside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.inside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.inside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.mgmt" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.mgmt': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.mgmt': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.mgmt | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.outside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.outside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.outside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.outside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.outside | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.outside': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_network.outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.outside": google_compute_network.outside | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_network.outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_network.outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.outside" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_network.outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_network.outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.outside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.outside': walking | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.outside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.outside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.mgmt | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.mgmt': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_network.mgmt - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.mgmt": google_compute_network.mgmt | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_network.mgmt - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_network.mgmt - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.mgmt" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_network.mgmt - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_network.mgmt - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.mgmt" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.mgmt" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.mgmt': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.mgmt': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.mgmt | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.outside | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.inside-to-outside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-outside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-outside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.inside-to-outside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.inside-to-outside | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-outside': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-outside": google_compute_firewall.inside-to-outside | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-outside" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.inside-to-outside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-outside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-outside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.inside-to-outside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.database | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-db" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-db': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-db': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-db | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-db | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-db': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-db": google_compute_firewall.internet-ingress-for-db | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-db" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-db" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-db': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-db': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-db | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.inside | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-inside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-inside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-inside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-inside | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-inside': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-inside": google_compute_firewall.internet-ingress-for-inside | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-inside" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-inside': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.outside-net" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.outside-net': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.outside-net': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.outside-net | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.outside-net | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.outside-net': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.outside-net": google_compute_subnetwork.outside-net | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.outside-net" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.outside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.outside-net" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.outside-net': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.outside-net': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.outside-net | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-outside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-outside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-outside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-outside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-outside | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-outside': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-outside": google_compute_firewall.internet-ingress-for-outside | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-outside" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-outside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-outside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-outside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-outside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.database-net': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.database-net': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.database-net | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.database-net | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.database-net': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.database-net": google_compute_subnetwork.database-net | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.database-net" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_subnetwork.database-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.database-net': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.database-net': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.database-net | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.inside-to-db" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-db': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-db': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.inside-to-db | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.inside-to-db | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-db': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-db": google_compute_firewall.inside-to-db | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-db" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.inside-to-db" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-db': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-db': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.inside-to-db | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-inside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-inside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: provisioner.local-exec | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "null_resource.start_email" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.null_resource.start_email': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.null_resource.start_email': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: null_resource.start_email | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.mgmt | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-mgt" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-mgt': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-mgt': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-mgt | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-mgt | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-mgt': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-mgt": google_compute_firewall.internet-ingress-for-mgt | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-mgt" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-mgt" | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.inside-to-outside | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.inside-net': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.inside-net': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.inside-net | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.inside-net | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.inside-net': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.db-to-inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.db-to-inside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.db-to-inside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.db-to-inside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-mgt" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-mgt': walking | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-mgt': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-mgt | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-inside | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.outside-net | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.outside-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.outside-route-to-inside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.outside-route-to-inside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.outside-route-to-inside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-db | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.outside-to-inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.outside-to-inside': walking | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-mgt | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-outside | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.database-net | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.inside-to-db | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.db" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.db': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.db': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.db | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.database-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.database-route-to-inside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.database-route-to-inside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.database-route-to-inside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.kali" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.kali': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.kali': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.kali | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.mgmt-net" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.mgmt-net': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.mgmt-net': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.mgmt-net | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.inside-net": google_compute_subnetwork.inside-net | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.inside-net" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.inside-net': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.inside-net': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.inside-net | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: null_resource.start_email | |
2019/05/03 13:40:59 [TRACE] vertex 'root.null_resource.start_email': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
null_resource.start_email - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "null_resource.start_email": null_resource.start_email | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
null_resource.start_email - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
null_resource.start_email - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "null_resource.start_email" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
null_resource.start_email - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
null_resource.start_email - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "null_resource.start_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "null_resource.start_email" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.null_resource.start_email': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.null_resource.start_email': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: null_resource.start_email | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.outside-route-to-inside | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.outside-route-to-inside': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.outside-route-to-inside": google_compute_route.outside-route-to-inside | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.outside-route-to-inside" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.outside-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.outside-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.outside-route-to-inside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.outside-route-to-inside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.outside-route-to-inside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvisioner | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.inside-net | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-database" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-database': walking | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.outside-to-inside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.db-to-inside | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.db | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.database-route-to-inside | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.kali | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.mgmt-net | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-database': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.inside-route-to-database | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.outside-route-to-inside | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.linux" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-real-internet" | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvisioner | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.outside-to-inside | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.db-to-inside': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.db': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.database-route-to-inside': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.kali': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.mgmt-net': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-outside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.linux': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-real-internet': walking | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_instance.db - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_instance.kali - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-outside': evaluating | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.linux': evaluating | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-real-internet': evaluating | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.db-to-inside": google_compute_firewall.db-to-inside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.db": google_compute_instance.db | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.database-route-to-inside": google_compute_route.database-route-to-inside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.kali": google_compute_instance.kali | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: null_resource.start_email | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.mgmt-net": google_compute_subnetwork.mgmt-net | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.inside-route-to-outside | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.linux | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.inside-route-to-real-internet | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.db-to-inside" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.db-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.db-to-inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.db-to-inside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.db-to-inside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.db-to-inside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_instance.db - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_instance.db - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.db" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_instance.db - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_instance.db - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.db" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.db': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.db': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.db | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.db-to-inside | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.database-route-to-inside" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.database-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.database-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.database-route-to-inside': walking | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.null (close)" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null (close)': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null (close)': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: provider.null (close) | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: provider.null (close) | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.mgmt-net" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.mgmt-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.mgmt-net" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.mgmt-net': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.mgmt-net': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.mgmt-net | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.db | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.database-route-to-inside': evaluating | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_instance.kali - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_instance.kali - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.kali" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_instance.kali - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_instance.kali - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.kali" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.kali" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.kali': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.kali': evaluating | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.database-route-to-inside | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.inside-route-to-database | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.outside-to-inside | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.inside-route-to-real-internet | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.kali | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.inside-route-to-outside | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-outside': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-outside": google_compute_route.inside-route-to-outside | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-database': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.outside-to-inside': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-real-internet': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.mgmt-net | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-outside" references: [] | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-outside" | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.linux | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.linux': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_instance.linux - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-real-internet": google_compute_route.inside-route-to-real-internet | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-real-internet" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-real-internet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-real-internet" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-real-internet': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-real-internet': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.inside-route-to-real-internet | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.linux": google_compute_instance.linux | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_instance.linux - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_instance.linux - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.linux" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_instance.linux - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_instance.linux - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.linux" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.linux" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.linux': walking | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.inside-route-to-real-internet | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-outside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-outside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.inside-route-to-outside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-database": google_compute_route.inside-route-to-database | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-database" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-database" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-database': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-database': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.inside-route-to-database | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.linux': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.linux | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.outside-to-inside": google_compute_firewall.outside-to-inside | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.outside-to-inside" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.inside-route-to-database | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.inside-route-to-outside | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.kali | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.database-route-to-inside | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.linux | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.vm-series" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.vm-series': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.vm-series': evaluating | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.outside-to-inside" | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.vm-series | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.vm-series | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.vm-series': expanding/walking dynamic subgraph | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
google_compute_instance.vm-series - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.vm-series": google_compute_instance.vm-series | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.outside-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.kali-pip" | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_instance.vm-series - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_instance.vm-series - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.vm-series" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_instance.vm-series - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_instance.vm-series - *terraform.NodeValidatableResourceInstance | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.vm-series" | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.vm-series" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.vm-series': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.outside-to-inside': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.outside-to-inside': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.outside-to-inside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.kali-pip': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.kali-pip': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: output.kali-pip | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: output.kali-pip | |
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.vm-series': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.vm-series | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.outside-to-inside | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvisioner | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvisioner | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvisioner | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvisioner | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvisioner | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvisioner | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvisioner | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvisioner | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvisioner | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvisioner | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvisioner | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvisioner | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.vm-series | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provisioner.local-exec (close)" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provisioner.local-exec (close)': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provisioner.local-exec (close)': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: provisioner.local-exec (close) | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCloseProvisioner | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: provisioner.local-exec (close) | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.google (close)" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google (close)': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google (close)': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: provider.google (close) | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: provider.google (close) | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.panos-mgmt-pip" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-mgmt-pip': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-mgmt-pip': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: output.panos-mgmt-pip | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: output.panos-mgmt-pip | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.panos-untrust-pip" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-untrust-pip': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-untrust-pip': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: output.panos-untrust-pip | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput | |
2019-05-03T13:40:59.816Z [DEBUG] plugin: plugin process exited: path=/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-google_v2.5.1_x4 | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: output.panos-untrust-pip | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: meta.count-boundary (count boundary fixup) | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: meta.count-boundary (count boundary fixup) | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "root" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.root': walking | |
2019/05/03 13:40:59 [INFO] backend/local: plan calling Refresh | |
2019/05/03 13:40:59 [INFO] terraform: building graph: GraphTypeRefresh | |
2019/05/03 13:40:59 [TRACE] No managed resources in state during refresh, skipping managed resource transformer | |
2019/05/03 13:40:59 [TRACE] ConfigTransformer: Starting for path: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ConfigTransformer: | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2019/05/03 13:40:59 [TRACE] Attach provider request: []string{} google | |
2019/05/03 13:40:59 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"google", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003d9340)} | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ProviderTransformer: | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [DEBUG] pruning unused provider provider.google | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.LocalTransformer: | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OutputTransformer: | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_zone" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.email_key" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.panos-mgmt-pip" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.kali-pip" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_ssh_public_key" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.panos_api_key" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.user_password" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.projectName" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requested_for_email" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_project_id" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_credentials" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.sms_key" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.devWorkflow" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requestNumber" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requested_for_mobile" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.project_mgr_mobile" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.panos-untrust-pip" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_region" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.subnetOctet" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.deploymentArea" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.project_mgr_email" references: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
root - terraform.graphNodeRoot | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
root - terraform.graphNodeRoot | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [DEBUG] Starting graph walk: walkRefresh | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_zone" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.panos-mgmt-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_ssh_public_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_credentials" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.devWorkflow" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.project_mgr_mobile" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.subnetOctet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.email_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requested_for_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requestNumber" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requested_for_mobile" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.deploymentArea" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.project_mgr_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.panos_api_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.user_password" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.projectName" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.panos-untrust-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_project_id" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "root" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_region" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.sms_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.kali-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.requested_for_mobile" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.devWorkflow" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.gcp_zone" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.requested_for_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.gcp_ssh_public_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.subnetOctet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "output.panos-mgmt-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.projectName" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.panos_api_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.user_password" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.gcp_credentials" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.requestNumber" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "output.kali-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.project_mgr_mobile" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.email_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.sms_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.gcp_project_id" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "output.panos-untrust-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.project_mgr_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.gcp_region" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.deploymentArea" | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_region" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_region': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requested_for_mobile" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requested_for_mobile': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.deploymentArea" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.deploymentArea': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.email_key" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.email_key': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requested_for_email" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requested_for_email': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requestNumber" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requestNumber': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.projectName" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.projectName': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.panos-untrust-pip" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-untrust-pip': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-untrust-pip': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkRefresh] Entering eval tree: output.panos-untrust-pip | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput | |
2019/05/03 13:40:59 [TRACE] [walkRefresh] Exiting eval tree: output.panos-untrust-pip | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_project_id" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_project_id': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_credentials" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_credentials': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.project_mgr_email" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.project_mgr_email': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.panos_api_key" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.panos_api_key': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.user_password" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.user_password': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.kali-pip" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.kali-pip': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.kali-pip': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkRefresh] Entering eval tree: output.kali-pip | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput | |
2019/05/03 13:40:59 [TRACE] [walkRefresh] Exiting eval tree: output.kali-pip | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.sms_key" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.sms_key': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.subnetOctet" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.subnetOctet': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.devWorkflow" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.devWorkflow': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.project_mgr_mobile" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.project_mgr_mobile': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_zone" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_zone': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.panos-mgmt-pip" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-mgmt-pip': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-mgmt-pip': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkRefresh] Entering eval tree: output.panos-mgmt-pip | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput | |
2019/05/03 13:40:59 [TRACE] [walkRefresh] Exiting eval tree: output.panos-mgmt-pip | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_ssh_public_key" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_ssh_public_key': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "root" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.root': walking | |
2019/05/03 13:40:59 [INFO] backend/local: plan calling Plan | |
2019/05/03 13:40:59 [INFO] terraform: building graph: GraphTypePlan | |
2019/05/03 13:40:59 [TRACE] ConfigTransformer: Starting for path: [] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ConfigTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.LocalTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OutputTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OrphanOutputTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.inside-net | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc0003d9f10), RawConfig:(*config.RawConfig)(0xc0003d9ce0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.db | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"db", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc0002d22a0), RawConfig:(*config.RawConfig)(0xc000467030), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.database-net | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc000436310), RawConfig:(*config.RawConfig)(0xc0004360e0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-outside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-outside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000436c40), RawConfig:(*config.RawConfig)(0xc000436a10), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-database | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-database", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000436ee0), RawConfig:(*config.RawConfig)(0xc000436cb0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.inside-to-db | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-to-db", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2ee0), RawConfig:(*config.RawConfig)(0xc0002d2cb0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-real-internet | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-real-internet", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000437110), RawConfig:(*config.RawConfig)(0xc000436f50), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.vm-series | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"vm-series", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000437ab0), RawConfig:(*config.RawConfig)(0xc000437420), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc00043efc0), (*config.Provisioner)(0xc00043f230), (*config.Provisioner)(0xc00043f440), (*config.Provisioner)(0xc00043f620), (*config.Provisioner)(0xc00043f920), (*config.Provisioner)(0xc00043fad0)}, Provider:"", DependsOn:[]string{"google_compute_subnetwork.mgmt-net", "google_compute_subnetwork.inside-net", "google_compute_subnetwork.outside-net", "google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.kali | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"kali", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000466fc0), RawConfig:(*config.RawConfig)(0xc000466b60), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.outside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-db | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-db", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2620), RawConfig:(*config.RawConfig)(0xc0002d24d0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-outside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-outside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d27e0), RawConfig:(*config.RawConfig)(0xc0002d2690), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.linux | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"linux", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000466af0), RawConfig:(*config.RawConfig)(0xc000466690), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-mgt | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-mgt", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2460), RawConfig:(*config.RawConfig)(0xc0002d2310), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.mgmt"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.db-to-inside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"db-to-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d3420), RawConfig:(*config.RawConfig)(0xc0002d31f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.mgmt | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"mgmt", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc0003d9880), RawConfig:(*config.RawConfig)(0xc0003d97a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.outside-route-to-inside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-route-to-inside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc0004369a0), RawConfig:(*config.RawConfig)(0xc000436770), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.outside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-inside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d29a0), RawConfig:(*config.RawConfig)(0xc0002d2850), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.inside-to-outside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-to-outside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d3180), RawConfig:(*config.RawConfig)(0xc0002d2f50), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: null_resource.start_email | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"start_email", Type:"null_resource", RawCount:(*config.RawConfig)(0xc0003d9570), RawConfig:(*config.RawConfig)(0xc0003d9500), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc0003c5650)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.inside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc0003d9c70), RawConfig:(*config.RawConfig)(0xc0003d9b90), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.outside-to-inside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-to-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2c40), RawConfig:(*config.RawConfig)(0xc0002d2a10), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.mgmt-net | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"mgmt-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc0003d9b20), RawConfig:(*config.RawConfig)(0xc0003d98f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.mgmt"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.database | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc000436070), RawConfig:(*config.RawConfig)(0xc0003d9f80), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.outside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc000436460), RawConfig:(*config.RawConfig)(0xc000436380), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.outside-net | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc000436700), RawConfig:(*config.RawConfig)(0xc0004364d0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.database-route-to-inside | |
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database-route-to-inside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc0004373b0), RawConfig:(*config.RawConfig)(0xc000437180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-real-internet": google_compute_route.inside-route-to-real-internet | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.vm-series": google_compute_instance.vm-series | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.kali": google_compute_instance.kali | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-db": google_compute_firewall.internet-ingress-for-db | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-outside": google_compute_firewall.internet-ingress-for-outside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.linux": google_compute_instance.linux | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-mgt": google_compute_firewall.internet-ingress-for-mgt | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.db-to-inside": google_compute_firewall.db-to-inside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.mgmt": google_compute_network.mgmt | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.outside-route-to-inside": google_compute_route.outside-route-to-inside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-inside": google_compute_firewall.internet-ingress-for-inside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-outside": google_compute_firewall.inside-to-outside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "null_resource.start_email": null_resource.start_email | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.inside": google_compute_network.inside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.outside-to-inside": google_compute_firewall.outside-to-inside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.mgmt-net": google_compute_subnetwork.mgmt-net | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.database": google_compute_network.database | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.outside": google_compute_network.outside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.outside-net": google_compute_subnetwork.outside-net | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.database-route-to-inside": google_compute_route.database-route-to-inside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.inside-net": google_compute_subnetwork.inside-net | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.db": google_compute_instance.db | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.database-net": google_compute_subnetwork.database-net | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-outside": google_compute_route.inside-route-to-outside | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-database": google_compute_route.inside-route-to-database | |
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-db": google_compute_firewall.inside-to-db | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2019/05/03 13:40:59 [TRACE] Attach provider request: []string{} google | |
2019/05/03 13:40:59 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"google", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003d9340)} | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [DEBUG] adding missing provider: null | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.db using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.inside-net using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.inside-route-to-outside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.inside-route-to-database using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.inside-to-db using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.database-net using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.inside-route-to-real-internet using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.kali using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-db using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-outside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.vm-series using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-mgt using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.db-to-inside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.linux using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.outside-route-to-inside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-inside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.inside-to-outside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.mgmt using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.inside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.outside-to-inside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource null_resource.start_email using provider provider.null | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.database using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.outside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.outside-net using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.database-route-to-inside using provider provider.google | |
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.mgmt-net using provider provider.google | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ProviderTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RemovedModuleTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.db - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-real-internet" references: [google_compute_subnetwork.inside-net var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.panos-mgmt-pip" references: [google_compute_instance.vm-series] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.email_key" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.deploymentArea" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.project_mgr_mobile" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "provider.null" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.vm-series" references: [google_compute_instance.kali google_compute_instance.linux google_compute_subnetwork.database-net google_compute_subnetwork.inside-net google_compute_subnetwork.mgmt-net google_compute_subnetwork.outside-net var.deploymentArea var.devWorkflow var.email_key var.gcp_ssh_public_key var.gcp_zone var.panos_api_key var.projectName var.project_mgr_email var.project_mgr_mobile var.requestNumber var.requested_for_email var.requested_for_mobile var.sms_key var.subnetOctet var.user_password] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.kali" references: [google_compute_subnetwork.outside-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-db" references: [google_compute_network.database var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-outside" references: [google_compute_network.outside var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.user_password" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.projectName" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requested_for_email" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.linux" references: [google_compute_subnetwork.inside-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-mgt" references: [google_compute_network.mgmt var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.db-to-inside" references: [google_compute_network.inside var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_region" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_ssh_public_key" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.subnetOctet" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.panos_api_key" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requested_for_mobile" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.mgmt" references: [var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.outside-route-to-inside" references: [google_compute_subnetwork.outside-net var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-inside" references: [google_compute_network.inside var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-outside" references: [google_compute_network.outside var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.kali-pip" references: [google_compute_instance.kali] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_zone" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requestNumber" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "null_resource.start_email" references: [var.email_key var.requested_for_email] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.inside" references: [var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.outside-to-inside" references: [google_compute_network.inside var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.panos-untrust-pip" references: [google_compute_instance.vm-series] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_credentials" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.sms_key" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.mgmt-net" references: [google_compute_network.mgmt var.gcp_region var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.database" references: [var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.outside" references: [var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.outside-net" references: [google_compute_network.outside var.gcp_region var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.database-route-to-inside" references: [google_compute_subnetwork.database-net var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.inside-net" references: [google_compute_network.inside var.gcp_region var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.db" references: [google_compute_subnetwork.database-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_project_id" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.project_mgr_email" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.database-net" references: [google_compute_network.database var.gcp_region var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-outside" references: [google_compute_subnetwork.inside-net var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-database" references: [google_compute_subnetwork.inside-net var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-db" references: [google_compute_network.database var.subnetOctet] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.devWorkflow" references: [] | |
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "provider.google" references: [var.gcp_zone var.gcp_credentials var.gcp_project_id] | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_region - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
google_compute_instance.linux - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
var.email_key - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
google_compute_network.database - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.inside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_network.outside - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.subnetOctet - *terraform.NodeRootVariable | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
google_compute_subnetwork.database-net - *terraform.NodePlannableResource | |
google_compute_network.database - *terraform.NodePlannableResource | |
var.gcp_region - *terraform.NodeRootVariable | |
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource | |
google_compute_network.inside - *terraform.NodePlannableResource | |
var.gcp_region - *terraform.NodeRootVariable | |
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource | |
google_compute_network.mgmt - *terraform.NodePlannableResource | |
var.gcp_region - *terraform.NodeRootVariable | |
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource | |
google_compute_network.outside - *terraform.NodePlannableResource | |
var.gcp_region - *terraform.NodeRootVariable | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
output.kali-pip - *terraform.NodeApplyableOutput | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
null_resource.start_email - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
var.email_key - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
output.kali-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.kali - *terraform.NodePlannableResource | |
output.panos-mgmt-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
output.panos-untrust-pip - *terraform.NodeApplyableOutput | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource | |
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource | |
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource | |
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource | |
google_compute_instance.db - *terraform.NodePlannableResource | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource | |
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource | |
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.start_email - *terraform.NodePlannableResource | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
google_compute_instance.vm-series - *terraform.NodePlannableResource | |
null_resource.start_email - *terraform.NodePlannableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.google (close) - *terraform.graphNodeCloseProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
var.deploymentArea - *terraform.NodeRootVariable | |
var.devWorkflow - *terraform.NodeRootVariable | |
var.email_key - *terraform.NodeRootVariable | |
var.gcp_credentials - *terraform.NodeRootVariable | |
var.gcp_project_id - *terraform.NodeRootVariable | |
var.gcp_region - *terraform.NodeRootVariable | |
var.gcp_ssh_public_key - *terraform.NodeRootVariable | |
var.gcp_zone - *terraform.NodeRootVariable | |
var.panos_api_key - *terraform.NodeRootVariable | |
var.projectName - *terraform.NodeRootVariable | |
var.project_mgr_email - *terraform.NodeRootVariable | |
var.project_mgr_mobile - *terraform.NodeRootVariable | |
var.requestNumber - *terraform.NodeRootVariable | |
var.requested_for_email - *terraform.NodeRootVariable | |
var.requested_for_mobile - *terraform.NodeRootVariable | |
var.sms_key - *terraform.NodeRootVariable | |
var.subnetOctet - *terraform.NodeRootVariable | |
var.user_password - *terraform.NodeRootVariable | |
2019/05/03 13:40:59 [DEBUG] Starting graph walk: walkPlan | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_zone" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "root" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.devWorkflow" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_project_id" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requested_for_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.project_mgr_mobile" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requestNumber" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.vm-series" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.google (close)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provisioner.local-exec (close)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.mgmt" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.sms_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_region" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.project_mgr_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.null" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_ssh_public_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.outside-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requested_for_mobile" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.user_password" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.linux" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.panos-mgmt-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-mgt" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.kali-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.google" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.null (close)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.deploymentArea" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.db-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-real-internet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.database-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.projectName" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.subnetOctet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.panos-untrust-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.outside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.kali" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_credentials" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.outside-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.email_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.panos_api_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.mgmt-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "null_resource.start_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.panos-untrust-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-real-internet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "output.panos-untrust-pip" waiting on "google_compute_instance.vm-series" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.db-to-inside" waiting on "google_compute_network.inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.user_password" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.devWorkflow" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_instance.kali" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.requestNumber" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-database" waiting on "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "output.kali-pip" waiting on "google_compute_instance.kali" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.kali-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.email_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "null_resource.start_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.database-route-to-inside" waiting on "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.inside-net" waiting on "google_compute_network.inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.database-net" waiting on "var.gcp_region" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "google_compute_instance.vm-series" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.devWorkflow" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.inside" waiting on "provider.google" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.gcp_ssh_public_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_instance.vm-series" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "var.email_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.requested_for_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.null (close)" waiting on "null_resource.start_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.mgmt-net" waiting on "var.gcp_region" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_instance.linux" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.mgmt" waiting on "var.subnetOctet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.outside-net" waiting on "google_compute_network.outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-mgt" waiting on "google_compute_network.mgmt" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-outside" waiting on "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "var.requested_for_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.outside" waiting on "var.subnetOctet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.requested_for_mobile" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.project_mgr_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-mgt" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.inside-to-db" waiting on "google_compute_network.database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.inside-to-db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.database-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "google_compute_subnetwork.outside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_subnetwork.mgmt-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.panos_api_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.mgmt-net" waiting on "google_compute_network.mgmt" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.deploymentArea" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.inside" waiting on "var.subnetOctet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "provisioner.local-exec (close)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.inside-net" waiting on "var.gcp_region" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_credentials" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.db-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.gcp_ssh_public_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.deploymentArea" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.inside-to-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.database-net" waiting on "google_compute_network.database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_zone" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.projectName" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.outside-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.gcp_ssh_public_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.outside-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.deploymentArea" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.outside-route-to-inside" waiting on "google_compute_subnetwork.outside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_instance.db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "provider.google (close)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.outside-net" waiting on "var.gcp_region" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-real-internet" waiting on "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-outside" waiting on "google_compute_network.outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.database-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-inside" waiting on "google_compute_network.inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "null_resource.start_email" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.outside" waiting on "provider.google" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.database" waiting on "var.subnetOctet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "google_compute_subnetwork.database-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.mgmt" waiting on "provider.google" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.database" waiting on "provider.google" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_project_id" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.inside-to-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "provider.null" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-real-internet" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.requestNumber" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "google_compute_subnetwork.inside-net" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.requestNumber" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.outside-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.sms_key" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.outside-route-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.devWorkflow" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.db-to-inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.panos-mgmt-pip" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "output.panos-mgmt-pip" waiting on "google_compute_instance.vm-series" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.inside-to-db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-mgt" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "provider.null (close)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.outside-to-inside" waiting on "google_compute_network.inside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.inside-to-outside" waiting on "google_compute_network.outside" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_instance.db" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.project_mgr_mobile" | |
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-db" waiting on "google_compute_network.database" | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-database", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.mgmt", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.outside-net", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.outside-route-to-inside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-outside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provider.google", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.database", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.db-to-inside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.vm-series", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-mgt", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.inside-to-db", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.inside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-inside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "output.panos-untrust-pip", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.db", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provider.null (close)", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "output.panos-mgmt-pip", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.outside-to-inside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.inside-to-outside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-db", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.database-route-to-inside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.mgmt-net", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-outside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.outside", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-real-internet", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provider.google (close)", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.linux", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "output.kali-pip", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.inside-net", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.database-net", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "null_resource.start_email", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provisioner.local-exec (close)", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.kali", sending new deps | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.email_key" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.email_key': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_credentials" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_credentials': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.panos_api_key" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.panos_api_key': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_ssh_public_key" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_ssh_public_key': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_zone" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_zone': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.devWorkflow" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.devWorkflow': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_project_id" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_project_id': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requested_for_email" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requested_for_email': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.project_mgr_mobile" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.project_mgr_mobile': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requestNumber" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requestNumber': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.sms_key" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.sms_key': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_region" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_region': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.project_mgr_email" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.project_mgr_email': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.null" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requested_for_mobile" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requested_for_mobile': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.user_password" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.user_password': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.subnetOctet" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.subnetOctet': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.deploymentArea" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.deploymentArea': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.projectName" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.var.projectName': walking | |
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.google" | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google': walking | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkPlan] Entering eval tree: provider.google | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null': evaluating | |
2019/05/03 13:40:59 [TRACE] [walkPlan] Entering eval tree: provider.null | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence | |
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019-05-03T13:41:00.096Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: panic: assignment to entry in nil map | |
2019-05-03T13:41:00.096Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: | |
2019-05-03T13:41:00.096Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: goroutine 10 [running]: | |
2019-05-03T13:41:00.097Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: panic(0xd66a40, 0xff8550) | |
2019-05-03T13:41:00.098Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/runtime/panic.go:556 +0x2cb fp=0xc00030b560 sp=0xc00030b4d0 pc=0x42a66b | |
2019-05-03T13:41:00.099Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: runtime.mapassign_fast32(0xd44f80, 0x0, 0x4a, 0xc0002af260) | |
2019-05-03T13:41:00.099Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/runtime/map_fast32.go:94 +0x321 fp=0xc00030b5a0 sp=0xc00030b560 pc=0x40fd81 | |
2019-05-03T13:41:00.100Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.setTypeId(0x1007180, 0xc0002af260) | |
2019-05-03T13:41:00.100Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/type.go:186 +0x8c fp=0xc00030b5d0 sp=0xc00030b5a0 pc=0x834c3c | |
2019-05-03T13:41:00.100Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.newStructType(0xc91928, 0x8, 0xc0000ad6e8) | |
2019-05-03T13:41:00.101Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/type.go:429 +0x82 fp=0xc00030b5f8 sp=0xc00030b5d0 pc=0x836372 | |
2019-05-03T13:41:00.102Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.newTypeObject(0xc91928, 0x8, 0xc00035c340, 0x100f780, 0xdf8800, 0x0, 0x0, 0x0, 0x0) | |
2019-05-03T13:41:00.107Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/type.go:522 +0xa83 fp=0xc00030b7b0 sp=0xc00030b5f8 pc=0x836e43 | |
2019-05-03T13:41:00.108Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.getType(0xc91928, 0x8, 0xc00035c340, 0x100f780, 0xdf8800, 0x4af638, 0xdf8800, 0xc91924, 0xc) | |
2019-05-03T13:41:00.111Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/type.go:598 +0xce fp=0xc00030b848 sp=0xc00030b7b0 pc=0x83790e | |
2019-05-03T13:41:00.111Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.getBaseType(0xc91928, 0x8, 0x100f780, 0xdf8800, 0x1, 0x8, 0x20, 0x10) | |
2019-05-03T13:41:00.111Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/type.go:585 +0x68 fp=0xc00030b8a0 sp=0xc00030b848 pc=0x8377f8 | |
2019-05-03T13:41:00.111Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.buildTypeInfo(0xc00035c340, 0x100f780, 0xdf8800, 0x0, 0x0, 0x0) | |
2019-05-03T13:41:00.113Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/type.go:715 +0x16c fp=0xc00030b9e0 sp=0xc00030b8a0 pc=0x83834c | |
2019-05-03T13:41:00.113Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.getTypeInfo(0xc00035c340, 0xc0002d82d0, 0xc0000adaf0, 0x1791ea0) | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/type.go:702 +0xf5 fp=0xc00030ba50 sp=0xc00030b9e0 pc=0x838175 | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.(*Encoder).sendActualType(0xc000322000, 0xff9ec0, 0xc0002d2100, 0xc0002d2440, 0xc00035c340, 0x100f780, 0xdf8800, 0x3800000000e66d00) | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/encoder.go:96 +0x9f fp=0xc00030bbe0 sp=0xc00030ba50 pc=0x832edf | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.(*Encoder).sendType(0xc000322000, 0xff9ec0, 0xc0002d2100, 0xc0002d2440, 0x100f780, 0xdf8800, 0xff9ea0) | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/encoder.go:168 +0xd3 fp=0xc00030bc48 sp=0xc00030bbe0 pc=0x8335a3 | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.(*Encoder).sendTypeDescriptor(0xc000322000, 0xff9ec0, 0xc0002d2100, 0xc0002d2440, 0xc00035c300) | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/encoder.go:190 +0xde fp=0xc00030bcc8 sp=0xc00030bc48 pc=0x8338ae | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.(*Encoder).EncodeValue(0xc000322000, 0xce66a0, 0xc0002d8750, 0x16, 0x0, 0x0) | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/encoder.go:243 +0x301 fp=0xc00030bd80 sp=0xc00030bcc8 pc=0x833d31 | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.(*Encoder).Encode(0xc000322000, 0xce66a0, 0xc0002d8750, 0x82b40e, 0xc0002ccd80) | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/encoder.go:175 +0xac fp=0xc00030bdd0 sp=0xc00030bd80 pc=0x83376c | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: net/rpc.(*gobServerCodec).WriteResponse(0xc0002d8300, 0xc0002d8750, 0xceaf20, 0xc0002952e8, 0x4bca14, 0xceaf20) | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/net/rpc/server.go:412 +0x52 fp=0xc00030be58 sp=0xc00030bdd0 pc=0x8410f2 | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: net/rpc.(*Server).sendResponse(0xc0002d40a0, 0xc000318018, 0xc000084120, 0xceaf20, 0xc0002952e8, 0x1005e80, 0xc0002d8300, 0x0, 0x0) | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/net/rpc/server.go:360 +0xf9 fp=0xc00030bec0 sp=0xc00030be58 pc=0x840b89 | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: net/rpc.(*service).call(0xc0002d20c0, 0xc0002d40a0, 0xc000318018, 0xc000318040, 0xc0002cc300, 0xc000084120, 0xd02540, 0xc0002accc0, 0x198, 0xceaf20, ...) | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/net/rpc/server.go:391 +0x222 fp=0xc00030bf70 sp=0xc00030bec0 pc=0x840f02 | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: runtime.goexit() | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/runtime/asm_amd64.s:1333 +0x1 fp=0xc00030bf78 sp=0xc00030bf70 pc=0x4579b1 | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: created by net/rpc.(*Server).ServeCodec | |
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/net/rpc/server.go:481 +0x47e | |
2019/05/03 13:41:00 [ERROR] root: eval: *terraform.EvalInitProvider, err: unexpected EOF | |
2019/05/03 13:41:00 [ERROR] root: eval: *terraform.EvalSequence, err: unexpected EOF | |
2019/05/03 13:41:00 [TRACE] [walkPlan] Exiting eval tree: provider.null | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "null_resource.start_email" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "provider.null (close)" | |
2019/05/03 13:41:00 [ERROR] root: eval: *terraform.EvalInitProvider, err: connection is shut down | |
2019/05/03 13:41:00 [ERROR] root: eval: *terraform.EvalSequence, err: connection is shut down | |
2019/05/03 13:41:00 [TRACE] [walkPlan] Exiting eval tree: provider.google | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_network.mgmt" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.internet-ingress-for-mgt" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_network.outside" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.internet-ingress-for-outside" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_subnetwork.mgmt-net" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.inside-to-outside" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_subnetwork.outside-net" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_route.outside-route-to-inside" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_instance.kali" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "output.kali-pip" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_network.inside" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.db-to-inside" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_subnetwork.inside-net" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_route.inside-route-to-database" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.outside-to-inside" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.internet-ingress-for-inside" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_instance.linux" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_route.inside-route-to-real-internet" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_route.inside-route-to-outside" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_network.database" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.inside-to-db" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_subnetwork.database-net" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_route.database-route-to-inside" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_instance.vm-series" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "output.panos-untrust-pip" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_instance.db" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "provisioner.local-exec (close)" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "output.panos-mgmt-pip" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.internet-ingress-for-db" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "provider.google (close)" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "meta.count-boundary (count boundary fixup)" | |
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "root" | |
2019-05-03T13:41:00.124Z [DEBUG] plugin: plugin process exited: path=/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.2_x4 | |
2019/05/03 13:41:00 [DEBUG] plugin: waiting for all plugin processes to complete... | |
2019-05-03T13:41:00.144Z [WARN ] plugin: error closing client during Kill: err="connection is shut down" | |
2019-05-03T13:41:00.145Z [DEBUG] plugin.terraform: local-exec-provisioner (internal) 2019/05/03 13:41:00 [ERR] plugin: plugin server: accept unix /tmp/plugin935352528: use of closed network connection | |
2019-05-03T13:41:00.145Z [DEBUG] plugin.terraform: local-exec-provisioner (internal) 2019/05/03 13:41:00 [DEBUG] plugin: waiting for all plugin processes to complete... | |
2019-05-03T13:41:00.144Z [WARN ] plugin: error closing client during Kill: err="connection is shut down" | |
2019-05-03T13:41:00.157Z [DEBUG] plugin: plugin process exited: path=/usr/local/bin/terraform |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment