Skip to content

Instantly share code, notes, and snippets.

@jamesholland-uk
Created May 3, 2019 13:43
Show Gist options
  • Save jamesholland-uk/14ae426fd3e18af8b9076178590d0682 to your computer and use it in GitHub Desktop.
Save jamesholland-uk/14ae426fd3e18af8b9076178590d0682 to your computer and use it in GitHub Desktop.
Terraform Crash Report
2019/05/03 13:40:57 [INFO] Terraform version: 0.11.13
2019/05/03 13:40:57 [INFO] Go runtime version: go1.11.5
2019/05/03 13:40:57 [INFO] CLI args: []string{"/usr/local/bin/terraform", "plan"}
2019/05/03 13:40:57 [DEBUG] Attempting to open CLI config file: /root/.terraformrc
2019/05/03 13:40:57 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2019/05/03 13:40:57 [INFO] CLI command args: []string{"plan"}
2019/05/03 13:40:57 [INFO] command: empty terraform config, returning nil
2019/05/03 13:40:57 [DEBUG] command: no data state file found for backend config
2019/05/03 13:40:57 [DEBUG] New state was assigned lineage "1fee6d61-9200-0ebd-698f-b88f9c7ff6a3"
2019/05/03 13:40:57 [INFO] command: backend initialized: <nil>
2019/05/03 13:40:57 [DEBUG] checking for provider in "."
2019/05/03 13:40:57 [DEBUG] checking for provider in "/usr/local/bin"
2019/05/03 13:40:57 [DEBUG] checking for provider in ".terraform/plugins/linux_amd64"
2019/05/03 13:40:57 [DEBUG] found provider "terraform-provider-google_v2.5.1_x4"
2019/05/03 13:40:57 [DEBUG] found provider "terraform-provider-null_v2.1.2_x4"
2019/05/03 13:40:57 [DEBUG] found valid plugin: "google", "2.5.1", "/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-google_v2.5.1_x4"
2019/05/03 13:40:57 [DEBUG] found valid plugin: "null", "2.1.2", "/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.2_x4"
2019/05/03 13:40:58 [DEBUG] checking for provisioner in "."
2019/05/03 13:40:58 [DEBUG] checking for provisioner in "/usr/local/bin"
2019/05/03 13:40:58 [DEBUG] checking for provisioner in ".terraform/plugins/linux_amd64"
2019/05/03 13:40:58 [INFO] command: backend <nil> is not enhanced, wrapping in local
2019/05/03 13:40:58 [INFO] backend/local: starting Plan operation
2019/05/03 13:40:58 [DEBUG] New state was assigned lineage "0789d8f2-a675-f6fa-d479-9bf327cf4594"
2019/05/03 13:40:58 [INFO] terraform: building graph: GraphTypeInput
2019/05/03 13:40:58 [TRACE] ConfigTransformer: Starting for path: []
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.ConfigTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.LocalTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.OutputTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.OrphanResourceTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.OrphanOutputTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Beginning...
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-outside
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-outside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d27e0), RawConfig:(*config.RawConfig)(0xc0002d2690), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-inside
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d29a0), RawConfig:(*config.RawConfig)(0xc0002d2850), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.mgmt
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"mgmt", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc0003d9880), RawConfig:(*config.RawConfig)(0xc0003d97a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.database-net
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc000436310), RawConfig:(*config.RawConfig)(0xc0004360e0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-outside
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-outside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000436c40), RawConfig:(*config.RawConfig)(0xc000436a10), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-database
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-database", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000436ee0), RawConfig:(*config.RawConfig)(0xc000436cb0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.database-route-to-inside
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database-route-to-inside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc0004373b0), RawConfig:(*config.RawConfig)(0xc000437180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: null_resource.start_email
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"start_email", Type:"null_resource", RawCount:(*config.RawConfig)(0xc0003d9570), RawConfig:(*config.RawConfig)(0xc0003d9500), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc0003c5650)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.inside-to-db
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-to-db", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2ee0), RawConfig:(*config.RawConfig)(0xc0002d2cb0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.inside
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc0003d9c70), RawConfig:(*config.RawConfig)(0xc0003d9b90), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.db
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"db", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc0002d22a0), RawConfig:(*config.RawConfig)(0xc000467030), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.mgmt-net
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"mgmt-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc0003d9b20), RawConfig:(*config.RawConfig)(0xc0003d98f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.mgmt"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.database
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc000436070), RawConfig:(*config.RawConfig)(0xc0003d9f80), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.outside-to-inside
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-to-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2c40), RawConfig:(*config.RawConfig)(0xc0002d2a10), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.db-to-inside
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"db-to-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d3420), RawConfig:(*config.RawConfig)(0xc0002d31f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.outside
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc000436460), RawConfig:(*config.RawConfig)(0xc000436380), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.vm-series
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"vm-series", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000437ab0), RawConfig:(*config.RawConfig)(0xc000437420), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc00043efc0), (*config.Provisioner)(0xc00043f230), (*config.Provisioner)(0xc00043f440), (*config.Provisioner)(0xc00043f620), (*config.Provisioner)(0xc00043f920), (*config.Provisioner)(0xc00043fad0)}, Provider:"", DependsOn:[]string{"google_compute_subnetwork.mgmt-net", "google_compute_subnetwork.inside-net", "google_compute_subnetwork.outside-net", "google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.inside-net
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc0003d9f10), RawConfig:(*config.RawConfig)(0xc0003d9ce0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-real-internet
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-real-internet", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000437110), RawConfig:(*config.RawConfig)(0xc000436f50), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.inside-to-outside
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-to-outside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d3180), RawConfig:(*config.RawConfig)(0xc0002d2f50), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.linux
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"linux", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000466af0), RawConfig:(*config.RawConfig)(0xc000466690), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.kali
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"kali", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000466fc0), RawConfig:(*config.RawConfig)(0xc000466b60), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.outside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-mgt
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-mgt", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2460), RawConfig:(*config.RawConfig)(0xc0002d2310), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.mgmt"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.outside-net
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc000436700), RawConfig:(*config.RawConfig)(0xc0004364d0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.outside-route-to-inside
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-route-to-inside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc0004369a0), RawConfig:(*config.RawConfig)(0xc000436770), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.outside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-db
2019/05/03 13:40:58 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-db", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2620), RawConfig:(*config.RawConfig)(0xc0002d24d0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-db": google_compute_firewall.inside-to-db
2019/05/03 13:40:58 [DEBUG] Resource state not found for "null_resource.start_email": null_resource.start_email
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_instance.db": google_compute_instance.db
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_network.inside": google_compute_network.inside
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_network.database": google_compute_network.database
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.outside-to-inside": google_compute_firewall.outside-to-inside
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.db-to-inside": google_compute_firewall.db-to-inside
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_subnetwork.mgmt-net": google_compute_subnetwork.mgmt-net
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_instance.vm-series": google_compute_instance.vm-series
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_network.outside": google_compute_network.outside
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-real-internet": google_compute_route.inside-route-to-real-internet
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-outside": google_compute_firewall.inside-to-outside
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_subnetwork.inside-net": google_compute_subnetwork.inside-net
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_instance.kali": google_compute_instance.kali
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-mgt": google_compute_firewall.internet-ingress-for-mgt
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_instance.linux": google_compute_instance.linux
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_route.outside-route-to-inside": google_compute_route.outside-route-to-inside
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-db": google_compute_firewall.internet-ingress-for-db
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_subnetwork.outside-net": google_compute_subnetwork.outside-net
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_subnetwork.database-net": google_compute_subnetwork.database-net
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-outside": google_compute_route.inside-route-to-outside
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-database": google_compute_route.inside-route-to-database
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_route.database-route-to-inside": google_compute_route.database-route-to-inside
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-outside": google_compute_firewall.internet-ingress-for-outside
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-inside": google_compute_firewall.internet-ingress-for-inside
2019/05/03 13:40:58 [DEBUG] Resource state not found for "google_compute_network.mgmt": google_compute_network.mgmt
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.RootVariableTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [TRACE] ProviderConfigTransformer: Starting for path: []
2019/05/03 13:40:58 [TRACE] Attach provider request: []string{} google
2019/05/03 13:40:58 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"google", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003d9340)}
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.ProviderConfigTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [DEBUG] adding missing provider: null
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.MissingProviderTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [DEBUG] resource null_resource.start_email using provider provider.null
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.inside-to-db using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_network.inside using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_instance.db using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_subnetwork.mgmt-net using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_network.database using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.outside-to-inside using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.db-to-inside using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_network.outside using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_instance.vm-series using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_subnetwork.inside-net using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_route.inside-route-to-real-internet using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.inside-to-outside using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_instance.linux using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_instance.kali using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.internet-ingress-for-mgt using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_subnetwork.outside-net using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_route.outside-route-to-inside using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.internet-ingress-for-db using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.internet-ingress-for-outside using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_firewall.internet-ingress-for-inside using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_network.mgmt using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_subnetwork.database-net using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_route.inside-route-to-outside using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_route.inside-route-to-database using provider provider.google
2019/05/03 13:40:58 [DEBUG] resource google_compute_route.database-route-to-inside using provider provider.google
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.ProviderTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.PruneProviderTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.ParentProviderTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.graphTransformerMulti:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.ModuleVariableTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.RemovedModuleTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "output.panos-untrust-pip" references: [google_compute_instance.vm-series]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.deploymentArea" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "provider.null" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.mgmt-net" references: [google_compute_network.mgmt var.gcp_region var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_network.database" references: [var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.outside-to-inside" references: [google_compute_network.inside var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.db-to-inside" references: [google_compute_network.inside var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.project_mgr_mobile" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_network.outside" references: [var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_instance.vm-series" references: [google_compute_instance.kali google_compute_instance.linux google_compute_subnetwork.database-net google_compute_subnetwork.inside-net google_compute_subnetwork.mgmt-net google_compute_subnetwork.outside-net var.deploymentArea var.devWorkflow var.email_key var.gcp_ssh_public_key var.gcp_zone var.panos_api_key var.projectName var.project_mgr_email var.project_mgr_mobile var.requestNumber var.requested_for_email var.requested_for_mobile var.sms_key var.subnetOctet var.user_password]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.email_key" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.subnetOctet" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.inside-net" references: [google_compute_network.inside var.gcp_region var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-real-internet" references: [google_compute_subnetwork.inside-net var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-outside" references: [google_compute_network.outside var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "output.panos-mgmt-pip" references: [google_compute_instance.vm-series]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "provider.google" references: [var.gcp_zone var.gcp_credentials var.gcp_project_id]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_instance.linux" references: [google_compute_subnetwork.inside-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_instance.kali" references: [google_compute_subnetwork.outside-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-mgt" references: [google_compute_network.mgmt var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.projectName" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.gcp_zone" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.sms_key" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.requestNumber" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.requested_for_email" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.outside-net" references: [google_compute_network.outside var.gcp_region var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_route.outside-route-to-inside" references: [google_compute_subnetwork.outside-net var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-db" references: [google_compute_network.database var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.gcp_region" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_route.database-route-to-inside" references: [google_compute_subnetwork.database-net var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-outside" references: [google_compute_network.outside var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-inside" references: [google_compute_network.inside var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "output.kali-pip" references: [google_compute_instance.kali]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_network.mgmt" references: [var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.database-net" references: [google_compute_network.database var.gcp_region var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-outside" references: [google_compute_subnetwork.inside-net var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-database" references: [google_compute_subnetwork.inside-net var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.gcp_project_id" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.user_password" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.project_mgr_email" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "null_resource.start_email" references: [var.email_key var.requested_for_email]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-db" references: [google_compute_network.database var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.gcp_ssh_public_key" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.devWorkflow" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.requested_for_mobile" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_network.inside" references: [var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "google_compute_instance.db" references: [google_compute_subnetwork.database-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet]
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.gcp_credentials" references: []
2019/05/03 13:40:58 [DEBUG] ReferenceTransformer: "var.panos_api_key" references: []
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodeAbstractResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeAbstractResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.CountBoundaryTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodeAbstractResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeAbstractResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodeAbstractResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeAbstractResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.CloseProviderTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodeAbstractResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeAbstractResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.google (close) - *terraform.graphNodeCloseProvider
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.CloseProvisionerTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodeAbstractResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeAbstractResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.google (close) - *terraform.graphNodeCloseProvider
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
google_compute_instance.vm-series - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodeAbstractResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeAbstractResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.google (close) - *terraform.graphNodeCloseProvider
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
google_compute_instance.vm-series - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.google (close) - *terraform.graphNodeCloseProvider
provider.null (close) - *terraform.graphNodeCloseProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [TRACE] Graph after step *terraform.TransitiveReductionTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_instance.kali - *terraform.NodeAbstractResource
google_compute_instance.linux - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
var.email_key - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
google_compute_subnetwork.database-net - *terraform.NodeAbstractResource
google_compute_network.database - *terraform.NodeAbstractResource
var.gcp_region - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodeAbstractResource
google_compute_network.inside - *terraform.NodeAbstractResource
var.gcp_region - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodeAbstractResource
google_compute_network.mgmt - *terraform.NodeAbstractResource
var.gcp_region - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodeAbstractResource
google_compute_network.outside - *terraform.NodeAbstractResource
var.gcp_region - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
null_resource.start_email - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodeAbstractResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeAbstractResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeAbstractResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.google (close) - *terraform.graphNodeCloseProvider
google_compute_firewall.db-to-inside - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-db - *terraform.NodeAbstractResource
google_compute_firewall.inside-to-outside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeAbstractResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeAbstractResource
google_compute_firewall.outside-to-inside - *terraform.NodeAbstractResource
google_compute_instance.db - *terraform.NodeAbstractResource
google_compute_instance.vm-series - *terraform.NodeAbstractResource
google_compute_route.database-route-to-inside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-database - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-outside - *terraform.NodeAbstractResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeAbstractResource
google_compute_route.outside-route-to-inside - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.start_email - *terraform.NodeAbstractResource
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
google_compute_instance.vm-series - *terraform.NodeAbstractResource
null_resource.start_email - *terraform.NodeAbstractResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.google (close) - *terraform.graphNodeCloseProvider
provider.null (close) - *terraform.graphNodeCloseProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:58 [DEBUG] Starting graph walk: walkInput
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-db"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.gcp_ssh_public_key"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "output.panos-untrust-pip"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "provider.google (close)"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "null_resource.start_email"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.user_password"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_route.outside-route-to-inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.outside-to-inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.project_mgr_mobile"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-mgt"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.email_key"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "output.panos-mgmt-pip"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.projectName"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.gcp_zone"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_network.database"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_network.outside"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_instance.db"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "provider.null"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_instance.kali"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.subnetOctet"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_instance.linux"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.mgmt-net"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_instance.vm-series"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-real-internet"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.gcp_region"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_network.mgmt"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.inside-net"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-db"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.gcp_credentials"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-outside"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-database"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "provisioner.local-exec (close)"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "output.kali-pip"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.requestNumber"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.database-net"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_route.database-route-to-inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-outside"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.deploymentArea"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.sms_key"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.outside-net"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_network.inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "provider.google"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.requested_for_email"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "provider.null (close)"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.project_mgr_email"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.requested_for_mobile"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.devWorkflow"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.panos_api_key"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_firewall.db-to-inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-outside"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "root"
2019/05/03 13:40:58 [TRACE] dag/walk: added new vertex: "var.gcp_project_id"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.requested_for_email"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "null_resource.start_email"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.inside-to-db"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_instance.db"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.sms_key"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.inside-net" waiting on "var.gcp_region"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.null (close)" waiting on "null_resource.start_email"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.deploymentArea"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.requested_for_mobile"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.mgmt" waiting on "var.subnetOctet"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_subnetwork.database-net"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_instance.vm-series"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_zone"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.outside-net" waiting on "google_compute_network.outside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "var.requested_for_email"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-outside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-outside" waiting on "google_compute_subnetwork.inside-net"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "output.panos-untrust-pip" waiting on "google_compute_instance.vm-series"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "root" waiting on "provisioner.local-exec (close)"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "output.kali-pip" waiting on "google_compute_instance.kali"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "var.email_key"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.db-to-inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-mgt"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.database" waiting on "var.subnetOctet"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_instance.kali"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.outside-route-to-inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "google_compute_instance.vm-series"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.database-net" waiting on "google_compute_network.database"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.mgmt-net" waiting on "var.gcp_region"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "output.panos-mgmt-pip" waiting on "google_compute_instance.vm-series"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.panos-mgmt-pip"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_credentials"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-database"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.project_mgr_mobile"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-outside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.inside-to-outside" waiting on "google_compute_network.outside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-outside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.inside-to-outside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.requestNumber"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "root" waiting on "provider.null (close)"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.devWorkflow"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.panos-untrust-pip"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-real-internet"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.outside-to-inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-real-internet" waiting on "google_compute_subnetwork.inside-net"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.db-to-inside" waiting on "google_compute_network.inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_instance.linux"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.inside-to-db" waiting on "google_compute_network.database"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.kali-pip"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.database-route-to-inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.gcp_ssh_public_key"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-database" waiting on "google_compute_subnetwork.inside-net"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.inside" waiting on "provider.google"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.database-route-to-inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-real-internet"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-inside" waiting on "google_compute_network.inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.inside" waiting on "var.subnetOctet"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.outside" waiting on "var.subnetOctet"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.deploymentArea"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_project_id"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_route.database-route-to-inside" waiting on "google_compute_subnetwork.database-net"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.inside-to-outside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.deploymentArea"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-database"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_subnetwork.mgmt-net"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.project_mgr_email"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.outside-net" waiting on "var.gcp_region"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.user_password"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.email_key"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.outside-to-inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_route.outside-route-to-inside" waiting on "google_compute_subnetwork.outside-net"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-db" waiting on "google_compute_network.database"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.inside-net" waiting on "google_compute_network.inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.database" waiting on "provider.google"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.devWorkflow"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.gcp_ssh_public_key"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.db-to-inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.database-net" waiting on "var.gcp_region"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "provider.null"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_subnetwork.mgmt-net" waiting on "google_compute_network.mgmt"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.mgmt" waiting on "provider.google"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-mgt" waiting on "google_compute_network.mgmt"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.outside-route-to-inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.gcp_ssh_public_key"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "null_resource.start_email"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "google_compute_subnetwork.database-net"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_network.outside" waiting on "provider.google"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.panos_api_key"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-db"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.inside-to-db"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "root" waiting on "provider.google (close)"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-mgt"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.outside-to-inside" waiting on "google_compute_network.inside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.requestNumber"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.devWorkflow"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-outside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "google_compute_subnetwork.inside-net"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-db"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.requestNumber"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_instance.db"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-outside" waiting on "google_compute_network.outside"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.projectName"
2019/05/03 13:40:58 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "google_compute_subnetwork.outside-net"
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.database-net", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "provider.null (close)", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "output.panos-untrust-pip", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_instance.linux", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.inside-to-db", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_instance.db", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_network.mgmt", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.outside-net", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "provisioner.local-exec (close)", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_route.database-route-to-inside", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.outside-to-inside", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-outside", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "provider.google (close)", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.inside-net", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "output.panos-mgmt-pip", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.inside-to-outside", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "null_resource.start_email", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_network.database", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-inside", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_route.outside-route-to-inside", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-db", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_instance.vm-series", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-outside", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-database", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_network.inside", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-mgt", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_instance.kali", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "provider.google", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "output.kali-pip", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.db-to-inside", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.mgmt-net", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-real-internet", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: dependencies changed for "google_compute_network.outside", sending new deps
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.projectName"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.projectName': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.requested_for_email"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.requested_for_email': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.email_key"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.email_key': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.gcp_zone"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.gcp_zone': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "provider.null"
2019/05/03 13:40:58 [TRACE] vertex 'root.provider.null': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.requested_for_mobile"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.requested_for_mobile': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.devWorkflow"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.devWorkflow': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.project_mgr_email"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.project_mgr_email': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.panos_api_key"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.panos_api_key': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.gcp_project_id"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.gcp_project_id': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.gcp_ssh_public_key"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.gcp_ssh_public_key': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.user_password"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.user_password': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.project_mgr_mobile"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.project_mgr_mobile': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.subnetOctet"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.subnetOctet': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.gcp_region"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.gcp_region': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.gcp_credentials"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.gcp_credentials': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "provider.google"
2019/05/03 13:40:58 [TRACE] vertex 'root.provider.google': walking
2019/05/03 13:40:58 [TRACE] vertex 'root.provider.google': evaluating
2019/05/03 13:40:58 [TRACE] [walkInput] Entering eval tree: provider.google
2019/05/03 13:40:58 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:58 [TRACE] root: eval: *terraform.EvalInitProvider
2019-05-03T13:40:58.726Z [DEBUG] plugin: starting plugin: path=/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-google_v2.5.1_x4 args=[/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-google_v2.5.1_x4]
2019/05/03 13:40:58 [TRACE] vertex 'root.provider.null': evaluating
2019/05/03 13:40:58 [TRACE] [walkInput] Entering eval tree: provider.null
2019/05/03 13:40:58 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:58 [TRACE] root: eval: *terraform.EvalInitProvider
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.requestNumber"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.requestNumber': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.deploymentArea"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.deploymentArea': walking
2019/05/03 13:40:58 [TRACE] dag/walk: walking "var.sms_key"
2019/05/03 13:40:58 [TRACE] vertex 'root.var.sms_key': walking
2019-05-03T13:40:58.747Z [DEBUG] plugin: waiting for RPC address: path=/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-google_v2.5.1_x4
2019-05-03T13:40:59.069Z [DEBUG] plugin.terraform-provider-google_v2.5.1_x4: plugin address: timestamp=2019-05-03T13:40:59.067Z address=/tmp/plugin535774585 network=unix
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInputProvider
2019-05-03T13:40:59.083Z [DEBUG] plugin: starting plugin: path=/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.2_x4 args=[/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.2_x4]
2019-05-03T13:40:59.107Z [DEBUG] plugin: waiting for RPC address: path=/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.2_x4
2019-05-03T13:40:59.302Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: plugin address: timestamp=2019-05-03T13:40:59.301Z network=unix address=/tmp/plugin597642377
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInputProvider
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: provider.google
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.inside': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.outside-to-inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.outside-to-inside': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.database"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.database': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.database-net"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.database-net': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.database-route-to-inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.database-route-to-inside': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.outside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.outside': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.outside-net"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.outside-net': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.outside-route-to-inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.outside-route-to-inside': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.mgmt"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.mgmt': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-mgt"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-mgt': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.inside-net"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.inside-net': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-outside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-outside': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.db-to-inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.db-to-inside': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-inside': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-db"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-db': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.inside-to-db"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-db': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.db"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.db': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.inside-to-outside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-outside': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-outside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-outside': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.kali"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.kali': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.kali-pip"
2019/05/03 13:40:59 [TRACE] vertex 'root.output.kali-pip': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.output.kali-pip': evaluating
2019/05/03 13:40:59 [TRACE] [walkInput] Entering eval tree: output.kali-pip
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: output.kali-pip
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.mgmt-net"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.mgmt-net': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.linux"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.linux': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.vm-series"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.vm-series': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.panos-untrust-pip"
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-untrust-pip': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-untrust-pip': evaluating
2019/05/03 13:40:59 [TRACE] [walkInput] Entering eval tree: output.panos-untrust-pip
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: output.panos-untrust-pip
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-real-internet"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-real-internet': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-database"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-database': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.google (close)"
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google (close)': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google (close)': evaluating
2019/05/03 13:40:59 [TRACE] [walkInput] Entering eval tree: provider.google (close)
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.panos-mgmt-pip"
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-mgmt-pip': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-mgmt-pip': evaluating
2019/05/03 13:40:59 [TRACE] [walkInput] Entering eval tree: output.panos-mgmt-pip
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: provider.google (close)
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: output.panos-mgmt-pip
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: provider.null
2019/05/03 13:40:59 [TRACE] dag/walk: walking "null_resource.start_email"
2019/05/03 13:40:59 [TRACE] vertex 'root.null_resource.start_email': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.null (close)"
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null (close)': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null (close)': evaluating
2019/05/03 13:40:59 [TRACE] [walkInput] Entering eval tree: provider.null (close)
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: provider.null (close)
2019/05/03 13:40:59 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)"
2019/05/03 13:40:59 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating
2019/05/03 13:40:59 [TRACE] [walkInput] Entering eval tree: meta.count-boundary (count boundary fixup)
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: meta.count-boundary (count boundary fixup)
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provisioner.local-exec (close)"
2019/05/03 13:40:59 [TRACE] vertex 'root.provisioner.local-exec (close)': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.provisioner.local-exec (close)': evaluating
2019/05/03 13:40:59 [TRACE] [walkInput] Entering eval tree: provisioner.local-exec (close)
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCloseProvisioner
2019/05/03 13:40:59 [TRACE] [walkInput] Exiting eval tree: provisioner.local-exec (close)
2019/05/03 13:40:59 [TRACE] dag/walk: walking "root"
2019/05/03 13:40:59 [TRACE] vertex 'root.root': walking
2019/05/03 13:40:59 [INFO] terraform: building graph: GraphTypeValidate
2019/05/03 13:40:59 [TRACE] ConfigTransformer: Starting for path: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ConfigTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.LocalTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OutputTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OrphanResourceTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OrphanOutputTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Beginning...
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: null_resource.start_email
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"start_email", Type:"null_resource", RawCount:(*config.RawConfig)(0xc0003d9570), RawConfig:(*config.RawConfig)(0xc0003d9500), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc0003c5650)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.inside-net
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc0003d9f10), RawConfig:(*config.RawConfig)(0xc0003d9ce0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.outside-route-to-inside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-route-to-inside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc0004369a0), RawConfig:(*config.RawConfig)(0xc000436770), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.outside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.outside-to-inside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-to-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2c40), RawConfig:(*config.RawConfig)(0xc0002d2a10), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.database-net
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc000436310), RawConfig:(*config.RawConfig)(0xc0004360e0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-database
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-database", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000436ee0), RawConfig:(*config.RawConfig)(0xc000436cb0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.kali
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"kali", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000466fc0), RawConfig:(*config.RawConfig)(0xc000466b60), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.outside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.db
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"db", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc0002d22a0), RawConfig:(*config.RawConfig)(0xc000467030), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-mgt
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-mgt", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2460), RawConfig:(*config.RawConfig)(0xc0002d2310), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.mgmt"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-inside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d29a0), RawConfig:(*config.RawConfig)(0xc0002d2850), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.inside-to-db
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-to-db", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2ee0), RawConfig:(*config.RawConfig)(0xc0002d2cb0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-outside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-outside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d27e0), RawConfig:(*config.RawConfig)(0xc0002d2690), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.database
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc000436070), RawConfig:(*config.RawConfig)(0xc0003d9f80), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-db
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-db", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2620), RawConfig:(*config.RawConfig)(0xc0002d24d0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.mgmt-net
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"mgmt-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc0003d9b20), RawConfig:(*config.RawConfig)(0xc0003d98f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.mgmt"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.outside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc000436460), RawConfig:(*config.RawConfig)(0xc000436380), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.outside-net
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc000436700), RawConfig:(*config.RawConfig)(0xc0004364d0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.vm-series
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"vm-series", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000437ab0), RawConfig:(*config.RawConfig)(0xc000437420), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc00043efc0), (*config.Provisioner)(0xc00043f230), (*config.Provisioner)(0xc00043f440), (*config.Provisioner)(0xc00043f620), (*config.Provisioner)(0xc00043f920), (*config.Provisioner)(0xc00043fad0)}, Provider:"", DependsOn:[]string{"google_compute_subnetwork.mgmt-net", "google_compute_subnetwork.inside-net", "google_compute_subnetwork.outside-net", "google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.mgmt
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"mgmt", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc0003d9880), RawConfig:(*config.RawConfig)(0xc0003d97a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.inside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc0003d9c70), RawConfig:(*config.RawConfig)(0xc0003d9b90), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.db-to-inside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"db-to-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d3420), RawConfig:(*config.RawConfig)(0xc0002d31f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.inside-to-outside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-to-outside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d3180), RawConfig:(*config.RawConfig)(0xc0002d2f50), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-outside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-outside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000436c40), RawConfig:(*config.RawConfig)(0xc000436a10), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-real-internet
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-real-internet", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000437110), RawConfig:(*config.RawConfig)(0xc000436f50), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.database-route-to-inside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database-route-to-inside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc0004373b0), RawConfig:(*config.RawConfig)(0xc000437180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.linux
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"linux", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000466af0), RawConfig:(*config.RawConfig)(0xc000466690), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.outside": google_compute_network.outside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.outside-net": google_compute_subnetwork.outside-net
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.vm-series": google_compute_instance.vm-series
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.mgmt-net": google_compute_subnetwork.mgmt-net
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.inside": google_compute_network.inside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.db-to-inside": google_compute_firewall.db-to-inside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.mgmt": google_compute_network.mgmt
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-real-internet": google_compute_route.inside-route-to-real-internet
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.database-route-to-inside": google_compute_route.database-route-to-inside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.linux": google_compute_instance.linux
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-outside": google_compute_firewall.inside-to-outside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-outside": google_compute_route.inside-route-to-outside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.inside-net": google_compute_subnetwork.inside-net
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.outside-route-to-inside": google_compute_route.outside-route-to-inside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.outside-to-inside": google_compute_firewall.outside-to-inside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "null_resource.start_email": null_resource.start_email
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-database": google_compute_route.inside-route-to-database
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.kali": google_compute_instance.kali
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.database-net": google_compute_subnetwork.database-net
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-mgt": google_compute_firewall.internet-ingress-for-mgt
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-inside": google_compute_firewall.internet-ingress-for-inside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-db": google_compute_firewall.inside-to-db
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.db": google_compute_instance.db
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-outside": google_compute_firewall.internet-ingress-for-outside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-db": google_compute_firewall.internet-ingress-for-db
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.database": google_compute_network.database
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootVariableTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] ProviderConfigTransformer: Starting for path: []
2019/05/03 13:40:59 [TRACE] Attach provider request: []string{} google
2019/05/03 13:40:59 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"google", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003d9340)}
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ProviderConfigTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [DEBUG] adding missing provider: null
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.MissingProviderTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.outside-route-to-inside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.outside-to-inside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource null_resource.start_email using provider provider.null
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.inside-net using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.kali using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.database-net using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.inside-route-to-database using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-inside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.inside-to-db using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.db using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-mgt using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-outside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.database using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-db using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.outside-net using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.vm-series using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.mgmt-net using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.outside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.db-to-inside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.mgmt using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.inside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.database-route-to-inside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.linux using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.inside-to-outside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.inside-route-to-outside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.inside-route-to-real-internet using provider provider.google
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ProviderTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.PruneProviderTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ParentProviderTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.graphTransformerMulti:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.MissingProvisionerTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ProvisionerTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.graphTransformerMulti:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ModuleVariableTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RemovedModuleTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.mgmt" references: [var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.inside" references: [var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.db-to-inside" references: [google_compute_network.inside var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.panos-mgmt-pip" references: [google_compute_instance.vm-series]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_region" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_ssh_public_key" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requested_for_email" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "provider.null" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-outside" references: [google_compute_subnetwork.inside-net var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-real-internet" references: [google_compute_subnetwork.inside-net var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.database-route-to-inside" references: [google_compute_subnetwork.database-net var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.linux" references: [google_compute_subnetwork.inside-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-outside" references: [google_compute_network.outside var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requestNumber" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "null_resource.start_email" references: [var.email_key var.requested_for_email]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.inside-net" references: [google_compute_network.inside var.gcp_region var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.outside-route-to-inside" references: [google_compute_subnetwork.outside-net var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.outside-to-inside" references: [google_compute_network.inside var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.kali-pip" references: [google_compute_instance.kali]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.devWorkflow" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "provider.google" references: [var.gcp_zone var.gcp_credentials var.gcp_project_id]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.database-net" references: [google_compute_network.database var.gcp_region var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-database" references: [google_compute_subnetwork.inside-net var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.kali" references: [google_compute_subnetwork.outside-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_credentials" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.user_password" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.project_mgr_email" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.db" references: [google_compute_subnetwork.database-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-mgt" references: [google_compute_network.mgmt var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-inside" references: [google_compute_network.inside var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-db" references: [google_compute_network.database var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.projectName" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.project_mgr_mobile" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-outside" references: [google_compute_network.outside var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_zone" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.panos_api_key" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.sms_key" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.email_key" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.database" references: [var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-db" references: [google_compute_network.database var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.panos-untrust-pip" references: [google_compute_instance.vm-series]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.subnetOctet" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.deploymentArea" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requested_for_mobile" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.mgmt-net" references: [google_compute_network.mgmt var.gcp_region var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.outside" references: [var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.outside-net" references: [google_compute_network.outside var.gcp_region var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.vm-series" references: [google_compute_instance.kali google_compute_instance.linux google_compute_subnetwork.database-net google_compute_subnetwork.inside-net google_compute_subnetwork.mgmt-net google_compute_subnetwork.outside-net var.deploymentArea var.devWorkflow var.email_key var.gcp_ssh_public_key var.gcp_zone var.panos_api_key var.projectName var.project_mgr_email var.project_mgr_mobile var.requestNumber var.requested_for_email var.requested_for_mobile var.sms_key var.subnetOctet var.user_password]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_project_id" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "provisioner.local-exec" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodeValidatableResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeValidatableResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.CountBoundaryTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodeValidatableResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeValidatableResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodeValidatableResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeValidatableResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.CloseProviderTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodeValidatableResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeValidatableResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.google (close) - *terraform.graphNodeCloseProvider
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.CloseProvisionerTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodeValidatableResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeValidatableResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.google (close) - *terraform.graphNodeCloseProvider
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
google_compute_instance.vm-series - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodeValidatableResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeValidatableResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.google (close) - *terraform.graphNodeCloseProvider
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
google_compute_instance.vm-series - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.google (close) - *terraform.graphNodeCloseProvider
provider.null (close) - *terraform.graphNodeCloseProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TransitiveReductionTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_instance.kali - *terraform.NodeValidatableResource
google_compute_instance.linux - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
provisioner.local-exec - *terraform.NodeProvisioner
var.email_key - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
google_compute_subnetwork.database-net - *terraform.NodeValidatableResource
google_compute_network.database - *terraform.NodeValidatableResource
var.gcp_region - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResource
google_compute_network.inside - *terraform.NodeValidatableResource
var.gcp_region - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResource
google_compute_network.mgmt - *terraform.NodeValidatableResource
var.gcp_region - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResource
google_compute_network.outside - *terraform.NodeValidatableResource
var.gcp_region - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
null_resource.start_email - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodeValidatableResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeValidatableResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodeValidatableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.google (close) - *terraform.graphNodeCloseProvider
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResource
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResource
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResource
google_compute_instance.db - *terraform.NodeValidatableResource
google_compute_instance.vm-series - *terraform.NodeValidatableResource
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResource
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.start_email - *terraform.NodeValidatableResource
provisioner.local-exec - *terraform.NodeProvisioner
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
google_compute_instance.vm-series - *terraform.NodeValidatableResource
null_resource.start_email - *terraform.NodeValidatableResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.google (close) - *terraform.graphNodeCloseProvider
provider.null (close) - *terraform.graphNodeCloseProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [DEBUG] Starting graph walk: walkValidate
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.deploymentArea"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.mgmt"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.google"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "null_resource.start_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.outside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requestNumber"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.panos-untrust-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requested_for_mobile"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-real-internet"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.database-route-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_credentials"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.projectName"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provisioner.local-exec"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.null (close)"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.inside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.panos_api_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.db-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_ssh_public_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.project_mgr_mobile"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-db"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.database"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-database"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.project_mgr_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.outside-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_zone"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.outside-route-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "root"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.kali-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.db"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-db"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_region"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.user_password"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.linux"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.null"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.kali"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.vm-series"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.panos-mgmt-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.sms_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.devWorkflow"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-mgt"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provisioner.local-exec (close)"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.mgmt-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.email_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requested_for_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.google (close)"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.database-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.subnetOctet"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_project_id"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-real-internet"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_zone"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_credentials"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.inside-to-db"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.requestNumber"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-real-internet" waiting on "google_compute_subnetwork.inside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_instance.vm-series"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.devWorkflow"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-real-internet"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.project_mgr_mobile"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.db-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "null_resource.start_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "provisioner.local-exec"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.deploymentArea"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-mgt"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "google_compute_subnetwork.database-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.mgmt-net" waiting on "google_compute_network.mgmt"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.email_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.panos-untrust-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.devWorkflow"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.outside-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.panos_api_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-outside" waiting on "google_compute_network.outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.kali-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-db" waiting on "google_compute_network.database"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.deploymentArea"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.database-route-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.mgmt-net" waiting on "var.gcp_region"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.database-net" waiting on "google_compute_network.database"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.requestNumber"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "provider.google (close)"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.database" waiting on "var.subnetOctet"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.project_mgr_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.gcp_ssh_public_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-mgt" waiting on "google_compute_network.mgmt"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.panos-mgmt-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "output.kali-pip" waiting on "google_compute_instance.kali"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.mgmt" waiting on "provider.google"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "output.panos-untrust-pip" waiting on "google_compute_instance.vm-series"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.inside-to-db" waiting on "google_compute_network.database"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_instance.db"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.database-route-to-inside" waiting on "google_compute_subnetwork.database-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_instance.linux"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "google_compute_subnetwork.outside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.inside-to-db"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.outside-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.outside-net" waiting on "var.gcp_region"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.inside" waiting on "var.subnetOctet"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.null (close)" waiting on "null_resource.start_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "google_compute_subnetwork.inside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.deploymentArea"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.requested_for_mobile"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.inside-to-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.db-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-db"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_subnetwork.database-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.outside-route-to-inside" waiting on "google_compute_subnetwork.outside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.requested_for_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.database-net" waiting on "var.gcp_region"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-database"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.outside" waiting on "var.subnetOctet"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.outside-route-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.database-route-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-outside" waiting on "google_compute_subnetwork.inside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.outside" waiting on "provider.google"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "var.requested_for_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-db"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "provisioner.local-exec"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "provisioner.local-exec (close)"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-inside" waiting on "google_compute_network.inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.db-to-inside" waiting on "google_compute_network.inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-mgt"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "google_compute_instance.vm-series"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_subnetwork.mgmt-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.inside" waiting on "provider.google"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "null_resource.start_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.requestNumber"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.gcp_ssh_public_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_instance.db"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_instance.kali"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.inside-to-outside" waiting on "google_compute_network.outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.sms_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.user_password"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.outside-route-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-database" waiting on "google_compute_subnetwork.inside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "provider.null (close)"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.inside-to-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-database"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "output.panos-mgmt-pip" waiting on "google_compute_instance.vm-series"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.inside-net" waiting on "var.gcp_region"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.gcp_ssh_public_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.database" waiting on "provider.google"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.projectName"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "provider.null"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.outside-net" waiting on "google_compute_network.outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.mgmt" waiting on "var.subnetOctet"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "var.email_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.devWorkflow"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.inside-net" waiting on "google_compute_network.inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_project_id"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.outside-to-inside" waiting on "google_compute_network.inside"
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "output.kali-pip", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provisioner.local-exec (close)", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.kali", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.vm-series", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.database", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "output.panos-untrust-pip", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "output.panos-mgmt-pip", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.outside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-inside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.inside-to-outside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provider.google", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.mgmt-net", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-db", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-mgt", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.inside-to-db", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.inside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provider.google (close)", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.linux", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-outside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.db", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "null_resource.start_email", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provider.null (close)", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.outside-route-to-inside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.outside-to-inside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-database", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-real-internet", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.database-net", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.mgmt", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.database-route-to-inside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.outside-net", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-outside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.db-to-inside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.inside-net", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_credentials"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_credentials': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.projectName"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.projectName': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.panos_api_key"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.panos_api_key': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provisioner.local-exec"
2019/05/03 13:40:59 [TRACE] vertex 'root.provisioner.local-exec': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.provisioner.local-exec': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: provisioner.local-exec
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInitProvisioner
2019-05-03T13:40:59.373Z [DEBUG] plugin: starting plugin: path=/usr/local/bin/terraform args="[/usr/local/bin/terraform internal-plugin provisioner local-exec]"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.sms_key"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.sms_key': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requested_for_email"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requested_for_email': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.devWorkflow"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.devWorkflow': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.email_key"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.email_key': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.subnetOctet"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.subnetOctet': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_project_id"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_project_id': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.deploymentArea"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.deploymentArea': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requestNumber"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requestNumber': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requested_for_mobile"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requested_for_mobile': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.project_mgr_mobile"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.project_mgr_mobile': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_ssh_public_key"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_ssh_public_key': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_zone"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_zone': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.google"
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: provider.google
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInitProvider
2019-05-03T13:40:59.378Z [DEBUG] plugin: waiting for RPC address: path=/usr/local/bin/terraform
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.project_mgr_email"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.project_mgr_email': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_region"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_region': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.null"
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: provider.null
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInitProvider
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.user_password"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.user_password': walking
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvider
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: provider.null
2019-05-03T13:40:59.463Z [DEBUG] plugin.terraform: 2019/05/03 13:40:59 [INFO] Terraform version: 0.11.13
2019-05-03T13:40:59.463Z [DEBUG] plugin.terraform: 2019/05/03 13:40:59 [INFO] Go runtime version: go1.11.5
2019-05-03T13:40:59.463Z [DEBUG] plugin.terraform: 2019/05/03 13:40:59 [INFO] CLI args: []string{"/usr/local/bin/terraform", "internal-plugin", "provisioner", "local-exec"}
2019-05-03T13:40:59.464Z [DEBUG] plugin.terraform: 2019/05/03 13:40:59 [DEBUG] Attempting to open CLI config file: /root/.terraformrc
2019-05-03T13:40:59.464Z [DEBUG] plugin.terraform: 2019/05/03 13:40:59 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2019-05-03T13:40:59.465Z [DEBUG] plugin.terraform: 2019/05/03 13:40:59 [INFO] CLI command args: []string{"internal-plugin", "provisioner", "local-exec"}
2019-05-03T13:40:59.465Z [DEBUG] plugin.terraform: local-exec-provisioner (internal) 2019/05/03 13:40:59 [INFO] Starting provisioner plugin local-exec
2019-05-03T13:40:59.466Z [DEBUG] plugin.terraform: plugin address: timestamp=2019-05-03T13:40:59.465Z address=/tmp/plugin935352528 network=unix
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: provider.google
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.database"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.database': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.database': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.database
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.database
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.database': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_network.database - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.database": google_compute_network.database
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_network.database - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_network.database - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.database" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_network.database - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_network.database - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.database"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.database"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.database': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.database': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.database
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.inside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.inside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.inside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.inside
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.inside': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_network.inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.inside": google_compute_network.inside
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_network.inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_network.inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.inside" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_network.inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_network.inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.inside"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.inside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.inside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.inside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.mgmt"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.mgmt': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.mgmt': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.mgmt
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.outside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.outside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.outside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.outside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.outside
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.outside': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_network.outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.outside": google_compute_network.outside
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_network.outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_network.outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.outside" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_network.outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_network.outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.outside"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.outside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.outside': walking
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.outside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.outside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.mgmt
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.mgmt': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_network.mgmt - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.mgmt": google_compute_network.mgmt
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_network.mgmt - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_network.mgmt - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.mgmt" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_network.mgmt - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_network.mgmt - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.mgmt"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_network.mgmt"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.mgmt': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_network.mgmt': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_network.mgmt
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.outside
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.inside-to-outside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-outside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-outside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.inside-to-outside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.inside-to-outside
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-outside': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-outside": google_compute_firewall.inside-to-outside
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-outside" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_firewall.inside-to-outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.inside-to-outside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-outside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-outside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.inside-to-outside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.database
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-db"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-db': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-db': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-db
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-db
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-db': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-db": google_compute_firewall.internet-ingress-for-db
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-db" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_firewall.internet-ingress-for-db - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-db"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-db"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-db': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-db': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-db
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.inside
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-inside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-inside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-inside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-inside
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-inside': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-inside": google_compute_firewall.internet-ingress-for-inside
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-inside" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_firewall.internet-ingress-for-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-inside': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.outside-net"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.outside-net': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.outside-net': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.outside-net
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.outside-net
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.outside-net': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.outside-net": google_compute_subnetwork.outside-net
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.outside-net" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_subnetwork.outside-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.outside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.outside-net"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.outside-net': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.outside-net': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.outside-net
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-outside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-outside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-outside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-outside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-outside
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-outside': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-outside": google_compute_firewall.internet-ingress-for-outside
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-outside" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_firewall.internet-ingress-for-outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-outside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-outside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-outside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-outside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.database-net"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.database-net': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.database-net': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.database-net
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.database-net
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.database-net': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_subnetwork.database-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.database-net": google_compute_subnetwork.database-net
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_subnetwork.database-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_subnetwork.database-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.database-net" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_subnetwork.database-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_subnetwork.database-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.database-net"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.database-net"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.database-net': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.database-net': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.database-net
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.inside-to-db"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-db': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-db': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.inside-to-db
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.inside-to-db
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-db': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-db": google_compute_firewall.inside-to-db
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-db" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_firewall.inside-to-db - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-db"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.inside-to-db"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-db': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.inside-to-db': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.inside-to-db
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-inside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-inside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: provisioner.local-exec
2019/05/03 13:40:59 [TRACE] dag/walk: walking "null_resource.start_email"
2019/05/03 13:40:59 [TRACE] vertex 'root.null_resource.start_email': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.null_resource.start_email': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: null_resource.start_email
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_network.mgmt
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-mgt"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-mgt': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-mgt': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-mgt
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-mgt
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-mgt': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-mgt": google_compute_firewall.internet-ingress-for-mgt
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-mgt" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-mgt"
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.inside-to-outside
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.inside-net"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.inside-net': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.inside-net': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.inside-net
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.inside-net
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.inside-net': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.db-to-inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.db-to-inside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.db-to-inside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.db-to-inside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.internet-ingress-for-mgt"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-mgt': walking
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.internet-ingress-for-mgt': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.internet-ingress-for-mgt
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-inside
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.outside-net
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.outside-route-to-inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.outside-route-to-inside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.outside-route-to-inside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.outside-route-to-inside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-db
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.outside-to-inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.outside-to-inside': walking
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-mgt
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.internet-ingress-for-outside
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.database-net
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.inside-to-db
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.db"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.db': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.db': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.db
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.database-route-to-inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.database-route-to-inside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.database-route-to-inside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.database-route-to-inside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.kali"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.kali': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.kali': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.kali
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.mgmt-net"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.mgmt-net': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.mgmt-net': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.mgmt-net
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.inside-net": google_compute_subnetwork.inside-net
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.inside-net" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_subnetwork.inside-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.inside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.inside-net"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.inside-net': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.inside-net': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.inside-net
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: null_resource.start_email
2019/05/03 13:40:59 [TRACE] vertex 'root.null_resource.start_email': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
null_resource.start_email - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "null_resource.start_email": null_resource.start_email
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
null_resource.start_email - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
null_resource.start_email - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "null_resource.start_email" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
null_resource.start_email - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
null_resource.start_email - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "null_resource.start_email"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "null_resource.start_email"
2019/05/03 13:40:59 [TRACE] vertex 'root.null_resource.start_email': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.null_resource.start_email': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: null_resource.start_email
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.outside-route-to-inside
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.outside-route-to-inside': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.outside-route-to-inside": google_compute_route.outside-route-to-inside
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.outside-route-to-inside" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_route.outside-route-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.outside-route-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.outside-route-to-inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.outside-route-to-inside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.outside-route-to-inside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.outside-route-to-inside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvisioner
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.inside-net
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-database"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-database': walking
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.outside-to-inside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.db-to-inside
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.db
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.database-route-to-inside
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.kali
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.mgmt-net
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-database': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.inside-route-to-database
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.outside-route-to-inside
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.linux"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-real-internet"
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvisioner
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.outside-to-inside
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.db-to-inside': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.db': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.database-route-to-inside': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.kali': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.mgmt-net': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-outside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.linux': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-real-internet': walking
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_instance.db - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_instance.kali - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-outside': evaluating
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.linux': evaluating
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-real-internet': evaluating
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.db-to-inside": google_compute_firewall.db-to-inside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.db": google_compute_instance.db
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.database-route-to-inside": google_compute_route.database-route-to-inside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.kali": google_compute_instance.kali
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: null_resource.start_email
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.mgmt-net": google_compute_subnetwork.mgmt-net
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.inside-route-to-outside
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.linux
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.inside-route-to-real-internet
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.db-to-inside" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_firewall.db-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.db-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.db-to-inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.db-to-inside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.db-to-inside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.db-to-inside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_instance.db - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_instance.db - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.db" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_instance.db - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_instance.db - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.db"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.db"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.db': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.db': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.db
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.db-to-inside
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.database-route-to-inside" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_route.database-route-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.database-route-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.database-route-to-inside"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.database-route-to-inside': walking
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.null (close)"
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null (close)': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null (close)': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: provider.null (close)
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: provider.null (close)
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.mgmt-net" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_subnetwork.mgmt-net - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.mgmt-net"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_subnetwork.mgmt-net"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.mgmt-net': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_subnetwork.mgmt-net': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_subnetwork.mgmt-net
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.db
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.database-route-to-inside': evaluating
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_instance.kali - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_instance.kali - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.kali" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_instance.kali - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_instance.kali - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.kali"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.kali"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.kali': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.kali': evaluating
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.database-route-to-inside
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.inside-route-to-database
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.outside-to-inside
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.inside-route-to-real-internet
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.kali
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.inside-route-to-outside
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-outside': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-outside": google_compute_route.inside-route-to-outside
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-database': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.outside-to-inside': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-real-internet': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_subnetwork.mgmt-net
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-outside" references: []
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_route.inside-route-to-outside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-outside"
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.linux
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.linux': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_instance.linux - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-real-internet": google_compute_route.inside-route-to-real-internet
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-real-internet" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_route.inside-route-to-real-internet - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-real-internet"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-real-internet"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-real-internet': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-real-internet': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.inside-route-to-real-internet
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.linux": google_compute_instance.linux
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_instance.linux - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_instance.linux - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.linux" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_instance.linux - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_instance.linux - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.linux"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.linux"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.linux': walking
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.inside-route-to-real-internet
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-outside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-outside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.inside-route-to-outside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-database": google_compute_route.inside-route-to-database
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-database" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_route.inside-route-to-database - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-database"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_route.inside-route-to-database"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-database': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_route.inside-route-to-database': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_route.inside-route-to-database
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.linux': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.linux
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.outside-to-inside": google_compute_firewall.outside-to-inside
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.outside-to-inside" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_firewall.outside-to-inside - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.inside-route-to-database
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.inside-route-to-outside
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.kali
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_route.database-route-to-inside
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.linux
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.vm-series"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.vm-series': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.vm-series': evaluating
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.outside-to-inside"
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.vm-series
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalIf
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateCount
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.vm-series
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.vm-series': expanding/walking dynamic subgraph
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ResourceCountTransformer:
google_compute_instance.vm-series - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.vm-series": google_compute_instance.vm-series
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_firewall.outside-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.kali-pip"
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_instance.vm-series - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_instance.vm-series - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.vm-series" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_instance.vm-series - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_instance.vm-series - *terraform.NodeValidatableResourceInstance
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.vm-series"
2019/05/03 13:40:59 [TRACE] dag/walk: walking "google_compute_instance.vm-series"
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.vm-series': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.outside-to-inside': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_firewall.outside-to-inside': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_firewall.outside-to-inside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] vertex 'root.output.kali-pip': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.output.kali-pip': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: output.kali-pip
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: output.kali-pip
2019/05/03 13:40:59 [TRACE] vertex 'root.google_compute_instance.vm-series': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: google_compute_instance.vm-series
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvider
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_firewall.outside-to-inside
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateResource
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvisioner
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvisioner
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvisioner
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvisioner
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvisioner
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvisioner
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvisioner
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvisioner
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvisioner
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvisioner
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalGetProvisioner
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInterpolate
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalValidateProvisioner
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: google_compute_instance.vm-series
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provisioner.local-exec (close)"
2019/05/03 13:40:59 [TRACE] vertex 'root.provisioner.local-exec (close)': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.provisioner.local-exec (close)': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: provisioner.local-exec (close)
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCloseProvisioner
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: provisioner.local-exec (close)
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.google (close)"
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google (close)': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google (close)': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: provider.google (close)
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: provider.google (close)
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.panos-mgmt-pip"
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-mgmt-pip': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-mgmt-pip': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: output.panos-mgmt-pip
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: output.panos-mgmt-pip
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.panos-untrust-pip"
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-untrust-pip': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-untrust-pip': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: output.panos-untrust-pip
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput
2019-05-03T13:40:59.816Z [DEBUG] plugin: plugin process exited: path=/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-google_v2.5.1_x4
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: output.panos-untrust-pip
2019/05/03 13:40:59 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)"
2019/05/03 13:40:59 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating
2019/05/03 13:40:59 [TRACE] [walkValidate] Entering eval tree: meta.count-boundary (count boundary fixup)
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2019/05/03 13:40:59 [TRACE] [walkValidate] Exiting eval tree: meta.count-boundary (count boundary fixup)
2019/05/03 13:40:59 [TRACE] dag/walk: walking "root"
2019/05/03 13:40:59 [TRACE] vertex 'root.root': walking
2019/05/03 13:40:59 [INFO] backend/local: plan calling Refresh
2019/05/03 13:40:59 [INFO] terraform: building graph: GraphTypeRefresh
2019/05/03 13:40:59 [TRACE] No managed resources in state during refresh, skipping managed resource transformer
2019/05/03 13:40:59 [TRACE] ConfigTransformer: Starting for path: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ConfigTransformer:
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OrphanResourceTransformer:
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Beginning...
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer:
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootVariableTransformer:
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] ProviderConfigTransformer: Starting for path: []
2019/05/03 13:40:59 [TRACE] Attach provider request: []string{} google
2019/05/03 13:40:59 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"google", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003d9340)}
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ProviderConfigTransformer:
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.MissingProviderTransformer:
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ProviderTransformer:
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [DEBUG] pruning unused provider provider.google
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.PruneProviderTransformer:
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ParentProviderTransformer:
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.graphTransformerMulti:
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.LocalTransformer:
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OutputTransformer:
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ModuleVariableTransformer:
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_zone" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.email_key" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.panos-mgmt-pip" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.kali-pip" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_ssh_public_key" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.panos_api_key" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.user_password" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.projectName" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requested_for_email" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_project_id" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_credentials" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.sms_key" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.devWorkflow" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requestNumber" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requested_for_mobile" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.project_mgr_mobile" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.panos-untrust-pip" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_region" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.subnetOctet" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.deploymentArea" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.project_mgr_email" references: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.CloseProviderTransformer:
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
root - terraform.graphNodeRoot
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TransitiveReductionTransformer:
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
root - terraform.graphNodeRoot
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [DEBUG] Starting graph walk: walkRefresh
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_zone"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.panos-mgmt-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_ssh_public_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_credentials"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.devWorkflow"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.project_mgr_mobile"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.subnetOctet"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.email_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requested_for_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requestNumber"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requested_for_mobile"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.deploymentArea"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.project_mgr_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.panos_api_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.user_password"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.projectName"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.panos-untrust-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_project_id"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "root"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_region"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.sms_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.kali-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.requested_for_mobile"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.devWorkflow"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.gcp_zone"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.requested_for_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.gcp_ssh_public_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.subnetOctet"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "output.panos-mgmt-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.projectName"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.panos_api_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.user_password"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.gcp_credentials"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.requestNumber"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "output.kali-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.project_mgr_mobile"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.email_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.sms_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.gcp_project_id"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "output.panos-untrust-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.project_mgr_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.gcp_region"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "var.deploymentArea"
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_region"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_region': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requested_for_mobile"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requested_for_mobile': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.deploymentArea"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.deploymentArea': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.email_key"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.email_key': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requested_for_email"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requested_for_email': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requestNumber"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requestNumber': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.projectName"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.projectName': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.panos-untrust-pip"
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-untrust-pip': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-untrust-pip': evaluating
2019/05/03 13:40:59 [TRACE] [walkRefresh] Entering eval tree: output.panos-untrust-pip
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput
2019/05/03 13:40:59 [TRACE] [walkRefresh] Exiting eval tree: output.panos-untrust-pip
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_project_id"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_project_id': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_credentials"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_credentials': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.project_mgr_email"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.project_mgr_email': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.panos_api_key"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.panos_api_key': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.user_password"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.user_password': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.kali-pip"
2019/05/03 13:40:59 [TRACE] vertex 'root.output.kali-pip': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.output.kali-pip': evaluating
2019/05/03 13:40:59 [TRACE] [walkRefresh] Entering eval tree: output.kali-pip
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput
2019/05/03 13:40:59 [TRACE] [walkRefresh] Exiting eval tree: output.kali-pip
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.sms_key"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.sms_key': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.subnetOctet"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.subnetOctet': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.devWorkflow"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.devWorkflow': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.project_mgr_mobile"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.project_mgr_mobile': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_zone"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_zone': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "output.panos-mgmt-pip"
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-mgmt-pip': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.output.panos-mgmt-pip': evaluating
2019/05/03 13:40:59 [TRACE] [walkRefresh] Entering eval tree: output.panos-mgmt-pip
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: terraform.EvalNoop
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalOpFilter
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalWriteOutput
2019/05/03 13:40:59 [TRACE] [walkRefresh] Exiting eval tree: output.panos-mgmt-pip
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_ssh_public_key"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_ssh_public_key': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "root"
2019/05/03 13:40:59 [TRACE] vertex 'root.root': walking
2019/05/03 13:40:59 [INFO] backend/local: plan calling Plan
2019/05/03 13:40:59 [INFO] terraform: building graph: GraphTypePlan
2019/05/03 13:40:59 [TRACE] ConfigTransformer: Starting for path: []
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ConfigTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.LocalTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OutputTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OrphanResourceTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.OrphanOutputTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Beginning...
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.inside-net
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc0003d9f10), RawConfig:(*config.RawConfig)(0xc0003d9ce0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.db
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"db", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc0002d22a0), RawConfig:(*config.RawConfig)(0xc000467030), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.database-net
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc000436310), RawConfig:(*config.RawConfig)(0xc0004360e0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-outside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-outside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000436c40), RawConfig:(*config.RawConfig)(0xc000436a10), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-database
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-database", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000436ee0), RawConfig:(*config.RawConfig)(0xc000436cb0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.inside-to-db
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-to-db", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2ee0), RawConfig:(*config.RawConfig)(0xc0002d2cb0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.inside-route-to-real-internet
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-route-to-real-internet", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc000437110), RawConfig:(*config.RawConfig)(0xc000436f50), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.vm-series
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"vm-series", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000437ab0), RawConfig:(*config.RawConfig)(0xc000437420), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc00043efc0), (*config.Provisioner)(0xc00043f230), (*config.Provisioner)(0xc00043f440), (*config.Provisioner)(0xc00043f620), (*config.Provisioner)(0xc00043f920), (*config.Provisioner)(0xc00043fad0)}, Provider:"", DependsOn:[]string{"google_compute_subnetwork.mgmt-net", "google_compute_subnetwork.inside-net", "google_compute_subnetwork.outside-net", "google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.kali
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"kali", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000466fc0), RawConfig:(*config.RawConfig)(0xc000466b60), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.outside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-db
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-db", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2620), RawConfig:(*config.RawConfig)(0xc0002d24d0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.database"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-outside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-outside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d27e0), RawConfig:(*config.RawConfig)(0xc0002d2690), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_instance.linux
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"linux", Type:"google_compute_instance", RawCount:(*config.RawConfig)(0xc000466af0), RawConfig:(*config.RawConfig)(0xc000466690), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.inside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-mgt
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-mgt", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2460), RawConfig:(*config.RawConfig)(0xc0002d2310), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.mgmt"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.db-to-inside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"db-to-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d3420), RawConfig:(*config.RawConfig)(0xc0002d31f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.mgmt
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"mgmt", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc0003d9880), RawConfig:(*config.RawConfig)(0xc0003d97a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.outside-route-to-inside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-route-to-inside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc0004369a0), RawConfig:(*config.RawConfig)(0xc000436770), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.outside-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.internet-ingress-for-inside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"internet-ingress-for-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d29a0), RawConfig:(*config.RawConfig)(0xc0002d2850), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.inside-to-outside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside-to-outside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d3180), RawConfig:(*config.RawConfig)(0xc0002d2f50), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: null_resource.start_email
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"start_email", Type:"null_resource", RawCount:(*config.RawConfig)(0xc0003d9570), RawConfig:(*config.RawConfig)(0xc0003d9500), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc0003c5650)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.inside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"inside", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc0003d9c70), RawConfig:(*config.RawConfig)(0xc0003d9b90), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_firewall.outside-to-inside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-to-inside", Type:"google_compute_firewall", RawCount:(*config.RawConfig)(0xc0002d2c40), RawConfig:(*config.RawConfig)(0xc0002d2a10), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.inside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.mgmt-net
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"mgmt-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc0003d9b20), RawConfig:(*config.RawConfig)(0xc0003d98f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.mgmt"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.database
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc000436070), RawConfig:(*config.RawConfig)(0xc0003d9f80), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_network.outside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside", Type:"google_compute_network", RawCount:(*config.RawConfig)(0xc000436460), RawConfig:(*config.RawConfig)(0xc000436380), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_subnetwork.outside-net
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"outside-net", Type:"google_compute_subnetwork", RawCount:(*config.RawConfig)(0xc000436700), RawConfig:(*config.RawConfig)(0xc0004364d0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_network.outside"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] AttachResourceConfigTransformer: Attach resource config request: google_compute_route.database-route-to-inside
2019/05/03 13:40:59 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"database-route-to-inside", Type:"google_compute_route", RawCount:(*config.RawConfig)(0xc0004373b0), RawConfig:(*config.RawConfig)(0xc000437180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"google_compute_subnetwork.database-net"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-real-internet": google_compute_route.inside-route-to-real-internet
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.vm-series": google_compute_instance.vm-series
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.kali": google_compute_instance.kali
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-db": google_compute_firewall.internet-ingress-for-db
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-outside": google_compute_firewall.internet-ingress-for-outside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.linux": google_compute_instance.linux
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-mgt": google_compute_firewall.internet-ingress-for-mgt
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.db-to-inside": google_compute_firewall.db-to-inside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.mgmt": google_compute_network.mgmt
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.outside-route-to-inside": google_compute_route.outside-route-to-inside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.internet-ingress-for-inside": google_compute_firewall.internet-ingress-for-inside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-outside": google_compute_firewall.inside-to-outside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "null_resource.start_email": null_resource.start_email
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.inside": google_compute_network.inside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.outside-to-inside": google_compute_firewall.outside-to-inside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.mgmt-net": google_compute_subnetwork.mgmt-net
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.database": google_compute_network.database
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_network.outside": google_compute_network.outside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.outside-net": google_compute_subnetwork.outside-net
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.database-route-to-inside": google_compute_route.database-route-to-inside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.inside-net": google_compute_subnetwork.inside-net
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_instance.db": google_compute_instance.db
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_subnetwork.database-net": google_compute_subnetwork.database-net
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-outside": google_compute_route.inside-route-to-outside
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_route.inside-route-to-database": google_compute_route.inside-route-to-database
2019/05/03 13:40:59 [DEBUG] Resource state not found for "google_compute_firewall.inside-to-db": google_compute_firewall.inside-to-db
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.AttachStateTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootVariableTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] ProviderConfigTransformer: Starting for path: []
2019/05/03 13:40:59 [TRACE] Attach provider request: []string{} google
2019/05/03 13:40:59 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"google", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003d9340)}
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ProviderConfigTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [DEBUG] adding missing provider: null
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.MissingProviderTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.db using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.inside-net using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.inside-route-to-outside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.inside-route-to-database using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.inside-to-db using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.database-net using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.inside-route-to-real-internet using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.kali using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-db using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-outside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.vm-series using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-mgt using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.db-to-inside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_instance.linux using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.outside-route-to-inside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.internet-ingress-for-inside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.inside-to-outside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.mgmt using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.inside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_firewall.outside-to-inside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource null_resource.start_email using provider provider.null
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.database using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_network.outside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.outside-net using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_route.database-route-to-inside using provider provider.google
2019/05/03 13:40:59 [DEBUG] resource google_compute_subnetwork.mgmt-net using provider provider.google
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ProviderTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.PruneProviderTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ParentProviderTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.graphTransformerMulti:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ModuleVariableTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RemovedModuleTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.db - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.kali - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.linux - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_instance.vm-series - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-real-internet" references: [google_compute_subnetwork.inside-net var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.panos-mgmt-pip" references: [google_compute_instance.vm-series]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.email_key" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.deploymentArea" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.project_mgr_mobile" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "provider.null" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.vm-series" references: [google_compute_instance.kali google_compute_instance.linux google_compute_subnetwork.database-net google_compute_subnetwork.inside-net google_compute_subnetwork.mgmt-net google_compute_subnetwork.outside-net var.deploymentArea var.devWorkflow var.email_key var.gcp_ssh_public_key var.gcp_zone var.panos_api_key var.projectName var.project_mgr_email var.project_mgr_mobile var.requestNumber var.requested_for_email var.requested_for_mobile var.sms_key var.subnetOctet var.user_password]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.kali" references: [google_compute_subnetwork.outside-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-db" references: [google_compute_network.database var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-outside" references: [google_compute_network.outside var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.user_password" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.projectName" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requested_for_email" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.linux" references: [google_compute_subnetwork.inside-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-mgt" references: [google_compute_network.mgmt var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.db-to-inside" references: [google_compute_network.inside var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_region" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_ssh_public_key" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.subnetOctet" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.panos_api_key" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requested_for_mobile" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.mgmt" references: [var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.outside-route-to-inside" references: [google_compute_subnetwork.outside-net var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.internet-ingress-for-inside" references: [google_compute_network.inside var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-outside" references: [google_compute_network.outside var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.kali-pip" references: [google_compute_instance.kali]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_zone" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.requestNumber" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "null_resource.start_email" references: [var.email_key var.requested_for_email]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.inside" references: [var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.outside-to-inside" references: [google_compute_network.inside var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "output.panos-untrust-pip" references: [google_compute_instance.vm-series]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_credentials" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.sms_key" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.mgmt-net" references: [google_compute_network.mgmt var.gcp_region var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.database" references: [var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_network.outside" references: [var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.outside-net" references: [google_compute_network.outside var.gcp_region var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.database-route-to-inside" references: [google_compute_subnetwork.database-net var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.inside-net" references: [google_compute_network.inside var.gcp_region var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_instance.db" references: [google_compute_subnetwork.database-net var.deploymentArea var.devWorkflow var.gcp_ssh_public_key var.gcp_zone var.requestNumber var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.gcp_project_id" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.project_mgr_email" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_subnetwork.database-net" references: [google_compute_network.database var.gcp_region var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-outside" references: [google_compute_subnetwork.inside-net var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_route.inside-route-to-database" references: [google_compute_subnetwork.inside-net var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "google_compute_firewall.inside-to-db" references: [google_compute_network.database var.subnetOctet]
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "var.devWorkflow" references: []
2019/05/03 13:40:59 [DEBUG] ReferenceTransformer: "provider.google" references: [var.gcp_zone var.gcp_credentials var.gcp_project_id]
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.ReferenceTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodePlannableResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodePlannableResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.CountBoundaryTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodePlannableResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodePlannableResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TargetsTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodePlannableResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodePlannableResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.CloseProviderTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodePlannableResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodePlannableResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.google (close) - *terraform.graphNodeCloseProvider
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.CloseProvisionerTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodePlannableResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodePlannableResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.google (close) - *terraform.graphNodeCloseProvider
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
google_compute_instance.vm-series - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.RootTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_region - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodePlannableResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodePlannableResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.google (close) - *terraform.graphNodeCloseProvider
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
google_compute_instance.vm-series - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.google (close) - *terraform.graphNodeCloseProvider
provider.null (close) - *terraform.graphNodeCloseProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [TRACE] Graph after step *terraform.TransitiveReductionTransformer:
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_instance.kali - *terraform.NodePlannableResource
google_compute_instance.linux - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
var.email_key - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
google_compute_network.database - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.inside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.mgmt - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_network.outside - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.subnetOctet - *terraform.NodeRootVariable
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
google_compute_subnetwork.database-net - *terraform.NodePlannableResource
google_compute_network.database - *terraform.NodePlannableResource
var.gcp_region - *terraform.NodeRootVariable
google_compute_subnetwork.inside-net - *terraform.NodePlannableResource
google_compute_network.inside - *terraform.NodePlannableResource
var.gcp_region - *terraform.NodeRootVariable
google_compute_subnetwork.mgmt-net - *terraform.NodePlannableResource
google_compute_network.mgmt - *terraform.NodePlannableResource
var.gcp_region - *terraform.NodeRootVariable
google_compute_subnetwork.outside-net - *terraform.NodePlannableResource
google_compute_network.outside - *terraform.NodePlannableResource
var.gcp_region - *terraform.NodeRootVariable
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
output.kali-pip - *terraform.NodeApplyableOutput
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
output.panos-untrust-pip - *terraform.NodeApplyableOutput
null_resource.start_email - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
var.email_key - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
output.kali-pip - *terraform.NodeApplyableOutput
google_compute_instance.kali - *terraform.NodePlannableResource
output.panos-mgmt-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodePlannableResource
output.panos-untrust-pip - *terraform.NodeApplyableOutput
google_compute_instance.vm-series - *terraform.NodePlannableResource
provider.google - *terraform.NodeApplyableProvider
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
provider.google (close) - *terraform.graphNodeCloseProvider
google_compute_firewall.db-to-inside - *terraform.NodePlannableResource
google_compute_firewall.inside-to-db - *terraform.NodePlannableResource
google_compute_firewall.inside-to-outside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-db - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-inside - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-mgt - *terraform.NodePlannableResource
google_compute_firewall.internet-ingress-for-outside - *terraform.NodePlannableResource
google_compute_firewall.outside-to-inside - *terraform.NodePlannableResource
google_compute_instance.db - *terraform.NodePlannableResource
google_compute_instance.vm-series - *terraform.NodePlannableResource
google_compute_route.database-route-to-inside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-database - *terraform.NodePlannableResource
google_compute_route.inside-route-to-outside - *terraform.NodePlannableResource
google_compute_route.inside-route-to-real-internet - *terraform.NodePlannableResource
google_compute_route.outside-route-to-inside - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.start_email - *terraform.NodePlannableResource
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
google_compute_instance.vm-series - *terraform.NodePlannableResource
null_resource.start_email - *terraform.NodePlannableResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.google (close) - *terraform.graphNodeCloseProvider
provider.null (close) - *terraform.graphNodeCloseProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
var.deploymentArea - *terraform.NodeRootVariable
var.devWorkflow - *terraform.NodeRootVariable
var.email_key - *terraform.NodeRootVariable
var.gcp_credentials - *terraform.NodeRootVariable
var.gcp_project_id - *terraform.NodeRootVariable
var.gcp_region - *terraform.NodeRootVariable
var.gcp_ssh_public_key - *terraform.NodeRootVariable
var.gcp_zone - *terraform.NodeRootVariable
var.panos_api_key - *terraform.NodeRootVariable
var.projectName - *terraform.NodeRootVariable
var.project_mgr_email - *terraform.NodeRootVariable
var.project_mgr_mobile - *terraform.NodeRootVariable
var.requestNumber - *terraform.NodeRootVariable
var.requested_for_email - *terraform.NodeRootVariable
var.requested_for_mobile - *terraform.NodeRootVariable
var.sms_key - *terraform.NodeRootVariable
var.subnetOctet - *terraform.NodeRootVariable
var.user_password - *terraform.NodeRootVariable
2019/05/03 13:40:59 [DEBUG] Starting graph walk: walkPlan
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_zone"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.db"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "root"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.devWorkflow"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_project_id"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-database"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requested_for_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.project_mgr_mobile"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requestNumber"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.vm-series"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.google (close)"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provisioner.local-exec (close)"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.mgmt"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.sms_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_region"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.project_mgr_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.null"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_ssh_public_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.outside-route-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.requested_for_mobile"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.user_password"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.linux"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.panos-mgmt-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-mgt"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.kali-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.google"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "provider.null (close)"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.deploymentArea"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.db-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-real-internet"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.database-route-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.projectName"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.subnetOctet"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "output.panos-untrust-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_network.database"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.outside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_instance.kali"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.internet-ingress-for-db"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.gcp_credentials"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.outside-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_route.inside-route-to-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_firewall.inside-to-db"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.email_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.database-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "var.panos_api_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.mgmt-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "google_compute_subnetwork.inside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "null_resource.start_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.panos-untrust-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-real-internet"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "output.panos-untrust-pip" waiting on "google_compute_instance.vm-series"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.db-to-inside" waiting on "google_compute_network.inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.user_password"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.devWorkflow"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-db"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_instance.kali"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.requestNumber"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-database" waiting on "google_compute_subnetwork.inside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "output.kali-pip" waiting on "google_compute_instance.kali"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.kali-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.email_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "null_resource.start_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.database-route-to-inside" waiting on "google_compute_subnetwork.database-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.inside-net" waiting on "google_compute_network.inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.database-net" waiting on "var.gcp_region"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "google_compute_instance.vm-series"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.devWorkflow"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.inside" waiting on "provider.google"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.gcp_ssh_public_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_instance.vm-series"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "var.email_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.requested_for_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.null (close)" waiting on "null_resource.start_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_subnetwork.database-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.mgmt-net" waiting on "var.gcp_region"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_instance.linux"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.mgmt" waiting on "var.subnetOctet"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.outside-net" waiting on "google_compute_network.outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-mgt" waiting on "google_compute_network.mgmt"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-outside" waiting on "google_compute_subnetwork.inside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "var.requested_for_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.outside" waiting on "var.subnetOctet"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.requested_for_mobile"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.project_mgr_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-mgt"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.inside-to-db" waiting on "google_compute_network.database"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.inside-to-db"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.database-route-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-db"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "google_compute_subnetwork.outside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "google_compute_subnetwork.mgmt-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.panos_api_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.mgmt-net" waiting on "google_compute_network.mgmt"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.deploymentArea"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.inside" waiting on "var.subnetOctet"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "provisioner.local-exec (close)"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.inside-net" waiting on "var.gcp_region"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_credentials"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.db-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.gcp_ssh_public_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.deploymentArea"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.inside-to-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.database-net" waiting on "google_compute_network.database"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_zone"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.projectName"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.outside-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.gcp_ssh_public_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.outside-route-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.deploymentArea"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.outside-route-to-inside" waiting on "google_compute_subnetwork.outside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_instance.db"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "provider.google (close)"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_subnetwork.outside-net" waiting on "var.gcp_region"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_route.inside-route-to-real-internet" waiting on "google_compute_subnetwork.inside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-outside" waiting on "google_compute_network.outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.database-route-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-inside" waiting on "google_compute_network.inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "null_resource.start_email"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.outside" waiting on "provider.google"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.database" waiting on "var.subnetOctet"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "google_compute_subnetwork.database-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.mgmt" waiting on "provider.google"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_network.database" waiting on "provider.google"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google" waiting on "var.gcp_project_id"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.inside-to-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "null_resource.start_email" waiting on "provider.null"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-real-internet"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_firewall.internet-ingress-for-outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.db" waiting on "var.requestNumber"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "google_compute_subnetwork.inside-net"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.kali" waiting on "var.requestNumber"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.outside-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.sms_key"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.outside-route-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.linux" waiting on "var.devWorkflow"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "google_compute_route.inside-route-to-database"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.db-to-inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_route.inside-route-to-database"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "output.panos-mgmt-pip"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "output.panos-mgmt-pip" waiting on "google_compute_instance.vm-series"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.inside-to-db"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_firewall.internet-ingress-for-mgt"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "provider.null (close)"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.outside-to-inside" waiting on "google_compute_network.inside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.inside-to-outside" waiting on "google_compute_network.outside"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "provider.google (close)" waiting on "google_compute_instance.db"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_instance.vm-series" waiting on "var.project_mgr_mobile"
2019/05/03 13:40:59 [TRACE] dag/walk: added edge: "google_compute_firewall.internet-ingress-for-db" waiting on "google_compute_network.database"
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-database", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.mgmt", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.outside-net", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.outside-route-to-inside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-outside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provider.google", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.database", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.db-to-inside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.vm-series", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-mgt", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.inside-to-db", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.inside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-inside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "output.panos-untrust-pip", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.db", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provider.null (close)", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "output.panos-mgmt-pip", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.outside-to-inside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.inside-to-outside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_firewall.internet-ingress-for-db", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.database-route-to-inside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.mgmt-net", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-outside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_network.outside", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_route.inside-route-to-real-internet", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provider.google (close)", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.linux", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "output.kali-pip", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.inside-net", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_subnetwork.database-net", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "null_resource.start_email", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "provisioner.local-exec (close)", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: dependencies changed for "google_compute_instance.kali", sending new deps
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.email_key"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.email_key': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_credentials"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_credentials': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.panos_api_key"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.panos_api_key': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_ssh_public_key"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_ssh_public_key': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_zone"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_zone': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.devWorkflow"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.devWorkflow': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_project_id"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_project_id': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requested_for_email"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requested_for_email': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.project_mgr_mobile"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.project_mgr_mobile': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requestNumber"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requestNumber': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.sms_key"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.sms_key': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.gcp_region"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.gcp_region': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.project_mgr_email"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.project_mgr_email': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.null"
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.requested_for_mobile"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.requested_for_mobile': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.user_password"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.user_password': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.subnetOctet"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.subnetOctet': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.deploymentArea"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.deploymentArea': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "var.projectName"
2019/05/03 13:40:59 [TRACE] vertex 'root.var.projectName': walking
2019/05/03 13:40:59 [TRACE] dag/walk: walking "provider.google"
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google': walking
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.google': evaluating
2019/05/03 13:40:59 [TRACE] [walkPlan] Entering eval tree: provider.google
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInitProvider
2019/05/03 13:40:59 [TRACE] vertex 'root.provider.null': evaluating
2019/05/03 13:40:59 [TRACE] [walkPlan] Entering eval tree: provider.null
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalSequence
2019/05/03 13:40:59 [TRACE] root: eval: *terraform.EvalInitProvider
2019-05-03T13:41:00.096Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: panic: assignment to entry in nil map
2019-05-03T13:41:00.096Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4:
2019-05-03T13:41:00.096Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: goroutine 10 [running]:
2019-05-03T13:41:00.097Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: panic(0xd66a40, 0xff8550)
2019-05-03T13:41:00.098Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/runtime/panic.go:556 +0x2cb fp=0xc00030b560 sp=0xc00030b4d0 pc=0x42a66b
2019-05-03T13:41:00.099Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: runtime.mapassign_fast32(0xd44f80, 0x0, 0x4a, 0xc0002af260)
2019-05-03T13:41:00.099Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/runtime/map_fast32.go:94 +0x321 fp=0xc00030b5a0 sp=0xc00030b560 pc=0x40fd81
2019-05-03T13:41:00.100Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.setTypeId(0x1007180, 0xc0002af260)
2019-05-03T13:41:00.100Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/type.go:186 +0x8c fp=0xc00030b5d0 sp=0xc00030b5a0 pc=0x834c3c
2019-05-03T13:41:00.100Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.newStructType(0xc91928, 0x8, 0xc0000ad6e8)
2019-05-03T13:41:00.101Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/type.go:429 +0x82 fp=0xc00030b5f8 sp=0xc00030b5d0 pc=0x836372
2019-05-03T13:41:00.102Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.newTypeObject(0xc91928, 0x8, 0xc00035c340, 0x100f780, 0xdf8800, 0x0, 0x0, 0x0, 0x0)
2019-05-03T13:41:00.107Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/type.go:522 +0xa83 fp=0xc00030b7b0 sp=0xc00030b5f8 pc=0x836e43
2019-05-03T13:41:00.108Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.getType(0xc91928, 0x8, 0xc00035c340, 0x100f780, 0xdf8800, 0x4af638, 0xdf8800, 0xc91924, 0xc)
2019-05-03T13:41:00.111Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/type.go:598 +0xce fp=0xc00030b848 sp=0xc00030b7b0 pc=0x83790e
2019-05-03T13:41:00.111Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.getBaseType(0xc91928, 0x8, 0x100f780, 0xdf8800, 0x1, 0x8, 0x20, 0x10)
2019-05-03T13:41:00.111Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/type.go:585 +0x68 fp=0xc00030b8a0 sp=0xc00030b848 pc=0x8377f8
2019-05-03T13:41:00.111Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.buildTypeInfo(0xc00035c340, 0x100f780, 0xdf8800, 0x0, 0x0, 0x0)
2019-05-03T13:41:00.113Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/type.go:715 +0x16c fp=0xc00030b9e0 sp=0xc00030b8a0 pc=0x83834c
2019-05-03T13:41:00.113Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.getTypeInfo(0xc00035c340, 0xc0002d82d0, 0xc0000adaf0, 0x1791ea0)
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/type.go:702 +0xf5 fp=0xc00030ba50 sp=0xc00030b9e0 pc=0x838175
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.(*Encoder).sendActualType(0xc000322000, 0xff9ec0, 0xc0002d2100, 0xc0002d2440, 0xc00035c340, 0x100f780, 0xdf8800, 0x3800000000e66d00)
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/encoder.go:96 +0x9f fp=0xc00030bbe0 sp=0xc00030ba50 pc=0x832edf
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.(*Encoder).sendType(0xc000322000, 0xff9ec0, 0xc0002d2100, 0xc0002d2440, 0x100f780, 0xdf8800, 0xff9ea0)
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/encoder.go:168 +0xd3 fp=0xc00030bc48 sp=0xc00030bbe0 pc=0x8335a3
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.(*Encoder).sendTypeDescriptor(0xc000322000, 0xff9ec0, 0xc0002d2100, 0xc0002d2440, 0xc00035c300)
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/encoder.go:190 +0xde fp=0xc00030bcc8 sp=0xc00030bc48 pc=0x8338ae
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.(*Encoder).EncodeValue(0xc000322000, 0xce66a0, 0xc0002d8750, 0x16, 0x0, 0x0)
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/encoder.go:243 +0x301 fp=0xc00030bd80 sp=0xc00030bcc8 pc=0x833d31
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: encoding/gob.(*Encoder).Encode(0xc000322000, 0xce66a0, 0xc0002d8750, 0x82b40e, 0xc0002ccd80)
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/encoding/gob/encoder.go:175 +0xac fp=0xc00030bdd0 sp=0xc00030bd80 pc=0x83376c
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: net/rpc.(*gobServerCodec).WriteResponse(0xc0002d8300, 0xc0002d8750, 0xceaf20, 0xc0002952e8, 0x4bca14, 0xceaf20)
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/net/rpc/server.go:412 +0x52 fp=0xc00030be58 sp=0xc00030bdd0 pc=0x8410f2
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: net/rpc.(*Server).sendResponse(0xc0002d40a0, 0xc000318018, 0xc000084120, 0xceaf20, 0xc0002952e8, 0x1005e80, 0xc0002d8300, 0x0, 0x0)
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/net/rpc/server.go:360 +0xf9 fp=0xc00030bec0 sp=0xc00030be58 pc=0x840b89
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: net/rpc.(*service).call(0xc0002d20c0, 0xc0002d40a0, 0xc000318018, 0xc000318040, 0xc0002cc300, 0xc000084120, 0xd02540, 0xc0002accc0, 0x198, 0xceaf20, ...)
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/net/rpc/server.go:391 +0x222 fp=0xc00030bf70 sp=0xc00030bec0 pc=0x840f02
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: runtime.goexit()
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/runtime/asm_amd64.s:1333 +0x1 fp=0xc00030bf78 sp=0xc00030bf70 pc=0x4579b1
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: created by net/rpc.(*Server).ServeCodec
2019-05-03T13:41:00.114Z [DEBUG] plugin.terraform-provider-null_v2.1.2_x4: /opt/goenv/versions/1.11.5/src/net/rpc/server.go:481 +0x47e
2019/05/03 13:41:00 [ERROR] root: eval: *terraform.EvalInitProvider, err: unexpected EOF
2019/05/03 13:41:00 [ERROR] root: eval: *terraform.EvalSequence, err: unexpected EOF
2019/05/03 13:41:00 [TRACE] [walkPlan] Exiting eval tree: provider.null
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "null_resource.start_email"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "provider.null (close)"
2019/05/03 13:41:00 [ERROR] root: eval: *terraform.EvalInitProvider, err: connection is shut down
2019/05/03 13:41:00 [ERROR] root: eval: *terraform.EvalSequence, err: connection is shut down
2019/05/03 13:41:00 [TRACE] [walkPlan] Exiting eval tree: provider.google
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_network.mgmt"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.internet-ingress-for-mgt"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_network.outside"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.internet-ingress-for-outside"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_subnetwork.mgmt-net"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.inside-to-outside"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_subnetwork.outside-net"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_route.outside-route-to-inside"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_instance.kali"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "output.kali-pip"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_network.inside"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.db-to-inside"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_subnetwork.inside-net"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_route.inside-route-to-database"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.outside-to-inside"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.internet-ingress-for-inside"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_instance.linux"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_route.inside-route-to-real-internet"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_route.inside-route-to-outside"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_network.database"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.inside-to-db"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_subnetwork.database-net"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_route.database-route-to-inside"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_instance.vm-series"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "output.panos-untrust-pip"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_instance.db"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "provisioner.local-exec (close)"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "output.panos-mgmt-pip"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "google_compute_firewall.internet-ingress-for-db"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "provider.google (close)"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "meta.count-boundary (count boundary fixup)"
2019/05/03 13:41:00 [TRACE] dag/walk: upstream errored, not walking "root"
2019-05-03T13:41:00.124Z [DEBUG] plugin: plugin process exited: path=/drive/testing/7/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.2_x4
2019/05/03 13:41:00 [DEBUG] plugin: waiting for all plugin processes to complete...
2019-05-03T13:41:00.144Z [WARN ] plugin: error closing client during Kill: err="connection is shut down"
2019-05-03T13:41:00.145Z [DEBUG] plugin.terraform: local-exec-provisioner (internal) 2019/05/03 13:41:00 [ERR] plugin: plugin server: accept unix /tmp/plugin935352528: use of closed network connection
2019-05-03T13:41:00.145Z [DEBUG] plugin.terraform: local-exec-provisioner (internal) 2019/05/03 13:41:00 [DEBUG] plugin: waiting for all plugin processes to complete...
2019-05-03T13:41:00.144Z [WARN ] plugin: error closing client during Kill: err="connection is shut down"
2019-05-03T13:41:00.157Z [DEBUG] plugin: plugin process exited: path=/usr/local/bin/terraform
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment