Skip to content

Instantly share code, notes, and snippets.

@salecharohit
Created February 28, 2023 15:16
Show Gist options
  • Save salecharohit/c3c7dfb5d024bcdb950b2858c639e555 to your computer and use it in GitHub Desktop.
Save salecharohit/c3c7dfb5d024bcdb950b2858c639e555 to your computer and use it in GitHub Desktop.
Terraform Debug
data.aws_availability_zones.availability_zones: Reading...
data.aws_ami.ubuntu: Reading...
data.aws_availability_zones.availability_zones: Read complete after 1s [id=us-east-1]
data.aws_ami.ubuntu: Read complete after 1s [id=ami-07dc2dd8e0efbc46a]
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create

Terraform will perform the following actions:
 # aws_instance.web-template will be created
 + resource "aws_instance" "web-template" {
+ ami = "ami-07dc2dd8e0efbc46a"
+ arn = (known after apply)
+ associate_public_ip_address = (known after apply)
+ availability_zone = (known after apply)
+ cpu_core_count = (known after apply)
+ cpu_threads_per_core = (known after apply)
+ disable_api_stop = (known after apply)
+ disable_api_termination = (known after apply)
+ ebs_optimized = (known after apply)
+ get_password_data = false
+ host_id = (known after apply)
+ host_resource_group_arn = (known after apply)
+ iam_instance_profile = (known after apply)
+ id = (known after apply)
+ instance_initiated_shutdown_behavior = (known after apply)
+ instance_state = (known after apply)
+ instance_type = "t3.micro"
+ ipv6_address_count = (known after apply)
+ ipv6_addresses = (known after apply)
+ key_name = "ubuntu"
+ monitoring = (known after apply)
+ outpost_arn = (known after apply)
+ password_data = (known after apply)
+ placement_group = (known after apply)
+ placement_partition_number = (known after apply)
+ primary_network_interface_id = (known after apply)
+ private_dns = (known after apply)
+ private_ip = (known after apply)
+ public_dns = (known after apply)
+ public_ip = (known after apply)
+ secondary_private_ips = (known after apply)
+ security_groups = (known after apply)
+ subnet_id = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-web-template"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-web-template"
+ "terraform-managed" = "true"
}
+ tenancy = (known after apply)
+ user_data = (known after apply)
+ user_data_base64 = (known after apply)
+ user_data_replace_on_change = false
+ vpc_security_group_ids = (known after apply)
+ capacity_reservation_specification {
+ capacity_reservation_preference = (known after apply)
+ capacity_reservation_target {
+ capacity_reservation_id = (known after apply)
+ capacity_reservation_resource_group_arn = (known after apply)
}
}
+ ebs_block_device {
+ delete_on_termination = (known after apply)
+ device_name = (known after apply)
+ encrypted = (known after apply)
+ iops = (known after apply)
+ kms_key_id = (known after apply)
+ snapshot_id = (known after apply)
+ tags = (known after apply)
+ throughput = (known after apply)
+ volume_id = (known after apply)
+ volume_size = (known after apply)
+ volume_type = (known after apply)
}
+ enclave_options {
+ enabled = (known after apply)
}
+ ephemeral_block_device {
+ device_name = (known after apply)
+ no_device = (known after apply)
+ virtual_name = (known after apply)
}
+ maintenance_options {
+ auto_recovery = (known after apply)
}
+ metadata_options {
+ http_endpoint = "disabled"
+ http_put_response_hop_limit = (known after apply)
+ http_tokens = (known after apply)
+ instance_metadata_tags = (known after apply)
}
+ network_interface {
+ delete_on_termination = false
+ device_index = 0
+ network_card_index = 0
+ network_interface_id = (known after apply)
}
+ private_dns_name_options {
+ enable_resource_name_dns_a_record = (known after apply)
+ enable_resource_name_dns_aaaa_record = (known after apply)
+ hostname_type = (known after apply)
}
+ root_block_device {
+ delete_on_termination = (known after apply)
+ device_name = (known after apply)
+ encrypted = (known after apply)
+ iops = (known after apply)
+ kms_key_id = (known after apply)
+ tags = (known after apply)
+ throughput = (known after apply)
+ volume_id = (known after apply)
+ volume_size = (known after apply)
+ volume_type = (known after apply)
}
}
 # aws_key_pair.generated_key will be created
 + resource "aws_key_pair" "generated_key" {
+ arn = (known after apply)
+ fingerprint = (known after apply)
+ id = (known after apply)
+ key_name = "ubuntu"
+ key_name_prefix = (known after apply)
+ key_pair_id = (known after apply)
+ key_type = (known after apply)
+ public_key = (known after apply)
+ tags_all = (known after apply)
}
 # aws_network_interface.ubuntu will be created
 + resource "aws_network_interface" "ubuntu" {
+ arn = (known after apply)
+ id = (known after apply)
+ interface_type = (known after apply)
+ ipv4_prefix_count = (known after apply)
+ ipv4_prefixes = (known after apply)
+ ipv6_address_count = (known after apply)
+ ipv6_address_list = (known after apply)
+ ipv6_address_list_enabled = false
+ ipv6_addresses = (known after apply)
+ ipv6_prefix_count = (known after apply)
+ ipv6_prefixes = (known after apply)
+ mac_address = (known after apply)
+ outpost_arn = (known after apply)
+ owner_id = (known after apply)
+ private_dns_name = (known after apply)
+ private_ip = (known after apply)
+ private_ip_list = (known after apply)
+ private_ip_list_enabled = false
+ private_ips = (known after apply)
+ private_ips_count = (known after apply)
+ security_groups = (known after apply)
+ source_dest_check = true
+ subnet_id = (known after apply)
+ tags = {
+ "Name" = "ubuntu_network_interface"
}
+ tags_all = {
+ "Name" = "ubuntu_network_interface"
}
+ attachment {
+ attachment_id = (known after apply)
+ device_index = (known after apply)
+ instance = (known after apply)
}
}
 # local_file.ubuntu_key will be created
 + resource "local_file" "ubuntu_key" {
+ content = (sensitive value)
+ directory_permission = "0777"
+ file_permission = "400"
+ filename = "ubuntu_key.pem"
+ id = (known after apply)
}
 # tls_private_key.ubuntu will be created
 + resource "tls_private_key" "ubuntu" {
+ algorithm = "RSA"
+ ecdsa_curve = "P224"
+ id = (known after apply)
+ private_key_openssh = (sensitive value)
+ private_key_pem = (sensitive value)
+ private_key_pem_pkcs8 = (sensitive value)
+ public_key_fingerprint_md5 = (known after apply)
+ public_key_fingerprint_sha256 = (known after apply)
+ public_key_openssh = (known after apply)
+ public_key_pem = (known after apply)
+ rsa_bits = 4096
}
 # module.generic_sg_egress.aws_security_group.security_group will be created
 + resource "aws_security_group" "security_group" {
+ arn = (known after apply)
+ description = "Allow servers to connect to outbound internet"
+ egress = (known after apply)
+ id = (known after apply)
+ ingress = (known after apply)
+ name = (known after apply)
+ name_prefix = "generic_sg_egress-"
+ owner_id = (known after apply)
+ revoke_rules_on_delete = false
+ tags = {
+ "Environment" = "dev"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.generic_sg_egress.aws_security_group_rule.security_group_rule will be created
 + resource "aws_security_group_rule" "security_group_rule" {
+ cidr_blocks = [
+ "0.0.0.0/0",
]
+ from_port = 0
+ id = (known after apply)
+ protocol = "-1"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 0
+ type = "egress"
}
 # module.port_22.aws_security_group.security_group will be created
 + resource "aws_security_group" "security_group" {
+ arn = (known after apply)
+ description = "Allow Port 22"
+ egress = (known after apply)
+ id = (known after apply)
+ ingress = (known after apply)
+ name = (known after apply)
+ name_prefix = "port_22-"
+ owner_id = (known after apply)
+ revoke_rules_on_delete = false
+ tags = {
+ "Environment" = "dev"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.port_22.aws_security_group_rule.security_group_rule will be created
 + resource "aws_security_group_rule" "security_group_rule" {
+ cidr_blocks = [
+ "0.0.0.0/0",
]
+ from_port = 22
+ id = (known after apply)
+ protocol = "tcp"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 22
+ type = "ingress"
}
 # module.port_443.aws_security_group.security_group will be created
 + resource "aws_security_group" "security_group" {
+ arn = (known after apply)
+ description = "Allow Port 443"
+ egress = (known after apply)
+ id = (known after apply)
+ ingress = (known after apply)
+ name = (known after apply)
+ name_prefix = "port_443-"
+ owner_id = (known after apply)
+ revoke_rules_on_delete = false
+ tags = {
+ "Environment" = "dev"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.port_443.aws_security_group_rule.security_group_rule will be created
 + resource "aws_security_group_rule" "security_group_rule" {
+ cidr_blocks = [
+ "0.0.0.0/0",
]
+ from_port = 443
+ id = (known after apply)
+ protocol = "tcp"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 443
+ type = "ingress"
}
 # module.port_80.aws_security_group.security_group will be created
 + resource "aws_security_group" "security_group" {
+ arn = (known after apply)
+ description = "Allow Port 80"
+ egress = (known after apply)
+ id = (known after apply)
+ ingress = (known after apply)
+ name = (known after apply)
+ name_prefix = "port_80-"
+ owner_id = (known after apply)
+ revoke_rules_on_delete = false
+ tags = {
+ "Environment" = "dev"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.port_80.aws_security_group_rule.security_group_rule will be created
 + resource "aws_security_group_rule" "security_group_rule" {
+ cidr_blocks = [
+ "0.0.0.0/0",
]
+ from_port = 80
+ id = (known after apply)
+ protocol = "tcp"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 80
+ type = "ingress"
}
 # module.ssmw-instance-id.aws_ssm_parameter.ssm_parameter will be created
 + resource "aws_ssm_parameter" "ssm_parameter" {
+ arn = (known after apply)
+ data_type = (known after apply)
+ description = "Web Instance ID"
+ id = (known after apply)
+ insecure_value = (known after apply)
+ key_id = (known after apply)
+ name = "/instance_id/web_id"
+ overwrite = true
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ssm-/instance_id/web_id"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ssm-/instance_id/web_id"
+ "terraform-managed" = "true"
}
+ tier = (known after apply)
+ type = "String"
+ value = (sensitive value)
+ version = (known after apply)
}
 # module.networking.module.vpc.aws_eip.nat[0] will be created
 + resource "aws_eip" "nat" {
+ allocation_id = (known after apply)
+ association_id = (known after apply)
+ carrier_ip = (known after apply)
+ customer_owned_ip = (known after apply)
+ domain = (known after apply)
+ id = (known after apply)
+ instance = (known after apply)
+ network_border_group = (known after apply)
+ network_interface = (known after apply)
+ private_dns = (known after apply)
+ private_ip = (known after apply)
+ public_dns = (known after apply)
+ public_ip = (known after apply)
+ public_ipv4_pool = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ vpc = true
}
 # module.networking.module.vpc.aws_internet_gateway.this[0] will be created
 + resource "aws_internet_gateway" "this" {
+ arn = (known after apply)
+ id = (known after apply)
+ owner_id = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.networking.module.vpc.aws_nat_gateway.this[0] will be created
 + resource "aws_nat_gateway" "this" {
+ allocation_id = (known after apply)
+ connectivity_type = "public"
+ id = (known after apply)
+ network_interface_id = (known after apply)
+ private_ip = (known after apply)
+ public_ip = (known after apply)
+ subnet_id = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
}
 # module.networking.module.vpc.aws_route.private_nat_gateway[0] will be created
 + resource "aws_route" "private_nat_gateway" {
+ destination_cidr_block = "0.0.0.0/0"
+ id = (known after apply)
+ instance_id = (known after apply)
+ instance_owner_id = (known after apply)
+ nat_gateway_id = (known after apply)
+ network_interface_id = (known after apply)
+ origin = (known after apply)
+ route_table_id = (known after apply)
+ state = (known after apply)
+ timeouts {
+ create = "5m"
}
}
 # module.networking.module.vpc.aws_route.public_internet_gateway[0] will be created
 + resource "aws_route" "public_internet_gateway" {
+ destination_cidr_block = "0.0.0.0/0"
+ gateway_id = (known after apply)
+ id = (known after apply)
+ instance_id = (known after apply)
+ instance_owner_id = (known after apply)
+ network_interface_id = (known after apply)
+ origin = (known after apply)
+ route_table_id = (known after apply)
+ state = (known after apply)
+ timeouts {
+ create = "5m"
}
}
 # module.networking.module.vpc.aws_route_table.private[0] will be created
 + resource "aws_route_table" "private" {
+ arn = (known after apply)
+ id = (known after apply)
+ owner_id = (known after apply)
+ propagating_vgws = (known after apply)
+ route = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.networking.module.vpc.aws_route_table.public[0] will be created
 + resource "aws_route_table" "public" {
+ arn = (known after apply)
+ id = (known after apply)
+ owner_id = (known after apply)
+ propagating_vgws = (known after apply)
+ route = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.networking.module.vpc.aws_route_table_association.database[0] will be created
 + resource "aws_route_table_association" "database" {
+ id = (known after apply)
+ route_table_id = (known after apply)
+ subnet_id = (known after apply)
}
 # module.networking.module.vpc.aws_route_table_association.database[1] will be created
 + resource "aws_route_table_association" "database" {
+ id = (known after apply)
+ route_table_id = (known after apply)
+ subnet_id = (known after apply)
}
 # module.networking.module.vpc.aws_route_table_association.database[2] will be created
 + resource "aws_route_table_association" "database" {
+ id = (known after apply)
+ route_table_id = (known after apply)
+ subnet_id = (known after apply)
}
 # module.networking.module.vpc.aws_route_table_association.private[0] will be created
 + resource "aws_route_table_association" "private" {
+ id = (known after apply)
+ route_table_id = (known after apply)
+ subnet_id = (known after apply)
}
 # module.networking.module.vpc.aws_route_table_association.private[1] will be created
 + resource "aws_route_table_association" "private" {
+ id = (known after apply)
+ route_table_id = (known after apply)
+ subnet_id = (known after apply)
}
 # module.networking.module.vpc.aws_route_table_association.private[2] will be created
 + resource "aws_route_table_association" "private" {
+ id = (known after apply)
+ route_table_id = (known after apply)
+ subnet_id = (known after apply)
}
 # module.networking.module.vpc.aws_route_table_association.public[0] will be created
 + resource "aws_route_table_association" "public" {
+ id = (known after apply)
+ route_table_id = (known after apply)
+ subnet_id = (known after apply)
}
 # module.networking.module.vpc.aws_route_table_association.public[1] will be created
 + resource "aws_route_table_association" "public" {
+ id = (known after apply)
+ route_table_id = (known after apply)
+ subnet_id = (known after apply)
}
 # module.networking.module.vpc.aws_route_table_association.public[2] will be created
 + resource "aws_route_table_association" "public" {
+ id = (known after apply)
+ route_table_id = (known after apply)
+ subnet_id = (known after apply)
}
 # module.networking.module.vpc.aws_subnet.database[0] will be created
 + resource "aws_subnet" "database" {
+ arn = (known after apply)
+ assign_ipv6_address_on_creation = false
+ availability_zone = "us-east-1a"
+ availability_zone_id = (known after apply)
+ cidr_block = "10.0.21.0/24"
+ enable_dns64 = false
+ enable_resource_name_dns_a_record_on_launch = false
+ enable_resource_name_dns_aaaa_record_on_launch = false
+ id = (known after apply)
+ ipv6_cidr_block_association_id = (known after apply)
+ ipv6_native = false
+ map_public_ip_on_launch = false
+ owner_id = (known after apply)
+ private_dns_hostname_type_on_launch = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.networking.module.vpc.aws_subnet.database[1] will be created
 + resource "aws_subnet" "database" {
+ arn = (known after apply)
+ assign_ipv6_address_on_creation = false
+ availability_zone = "us-east-1b"
+ availability_zone_id = (known after apply)
+ cidr_block = "10.0.22.0/24"
+ enable_dns64 = false
+ enable_resource_name_dns_a_record_on_launch = false
+ enable_resource_name_dns_aaaa_record_on_launch = false
+ id = (known after apply)
+ ipv6_cidr_block_association_id = (known after apply)
+ ipv6_native = false
+ map_public_ip_on_launch = false
+ owner_id = (known after apply)
+ private_dns_hostname_type_on_launch = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.networking.module.vpc.aws_subnet.database[2] will be created
 + resource "aws_subnet" "database" {
+ arn = (known after apply)
+ assign_ipv6_address_on_creation = false
+ availability_zone = "us-east-1c"
+ availability_zone_id = (known after apply)
+ cidr_block = "10.0.23.0/24"
+ enable_dns64 = false
+ enable_resource_name_dns_a_record_on_launch = false
+ enable_resource_name_dns_aaaa_record_on_launch = false
+ id = (known after apply)
+ ipv6_cidr_block_association_id = (known after apply)
+ ipv6_native = false
+ map_public_ip_on_launch = false
+ owner_id = (known after apply)
+ private_dns_hostname_type_on_launch = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.networking.module.vpc.aws_subnet.private[0] will be created
 + resource "aws_subnet" "private" {
+ arn = (known after apply)
+ assign_ipv6_address_on_creation = false
+ availability_zone = "us-east-1a"
+ availability_zone_id = (known after apply)
+ cidr_block = "10.0.11.0/24"
+ enable_dns64 = false
+ enable_resource_name_dns_a_record_on_launch = false
+ enable_resource_name_dns_aaaa_record_on_launch = false
+ id = (known after apply)
+ ipv6_cidr_block_association_id = (known after apply)
+ ipv6_native = false
+ map_public_ip_on_launch = false
+ owner_id = (known after apply)
+ private_dns_hostname_type_on_launch = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.networking.module.vpc.aws_subnet.private[1] will be created
 + resource "aws_subnet" "private" {
+ arn = (known after apply)
+ assign_ipv6_address_on_creation = false
+ availability_zone = "us-east-1b"
+ availability_zone_id = (known after apply)
+ cidr_block = "10.0.12.0/24"
+ enable_dns64 = false
+ enable_resource_name_dns_a_record_on_launch = false
+ enable_resource_name_dns_aaaa_record_on_launch = false
+ id = (known after apply)
+ ipv6_cidr_block_association_id = (known after apply)
+ ipv6_native = false
+ map_public_ip_on_launch = false
+ owner_id = (known after apply)
+ private_dns_hostname_type_on_launch = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.networking.module.vpc.aws_subnet.private[2] will be created
 + resource "aws_subnet" "private" {
+ arn = (known after apply)
+ assign_ipv6_address_on_creation = false
+ availability_zone = "us-east-1c"
+ availability_zone_id = (known after apply)
+ cidr_block = "10.0.13.0/24"
+ enable_dns64 = false
+ enable_resource_name_dns_a_record_on_launch = false
+ enable_resource_name_dns_aaaa_record_on_launch = false
+ id = (known after apply)
+ ipv6_cidr_block_association_id = (known after apply)
+ ipv6_native = false
+ map_public_ip_on_launch = false
+ owner_id = (known after apply)
+ private_dns_hostname_type_on_launch = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.networking.module.vpc.aws_subnet.public[0] will be created
 + resource "aws_subnet" "public" {
+ arn = (known after apply)
+ assign_ipv6_address_on_creation = false
+ availability_zone = "us-east-1a"
+ availability_zone_id = (known after apply)
+ cidr_block = "10.0.1.0/24"
+ enable_dns64 = false
+ enable_resource_name_dns_a_record_on_launch = false
+ enable_resource_name_dns_aaaa_record_on_launch = false
+ id = (known after apply)
+ ipv6_cidr_block_association_id = (known after apply)
+ ipv6_native = false
+ map_public_ip_on_launch = true
+ owner_id = (known after apply)
+ private_dns_hostname_type_on_launch = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.networking.module.vpc.aws_subnet.public[1] will be created
 + resource "aws_subnet" "public" {
+ arn = (known after apply)
+ assign_ipv6_address_on_creation = false
+ availability_zone = "us-east-1b"
+ availability_zone_id = (known after apply)
+ cidr_block = "10.0.2.0/24"
+ enable_dns64 = false
+ enable_resource_name_dns_a_record_on_launch = false
+ enable_resource_name_dns_aaaa_record_on_launch = false
+ id = (known after apply)
+ ipv6_cidr_block_association_id = (known after apply)
+ ipv6_native = false
+ map_public_ip_on_launch = true
+ owner_id = (known after apply)
+ private_dns_hostname_type_on_launch = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.networking.module.vpc.aws_subnet.public[2] will be created
 + resource "aws_subnet" "public" {
+ arn = (known after apply)
+ assign_ipv6_address_on_creation = false
+ availability_zone = "us-east-1c"
+ availability_zone_id = (known after apply)
+ cidr_block = "10.0.3.0/24"
+ enable_dns64 = false
+ enable_resource_name_dns_a_record_on_launch = false
+ enable_resource_name_dns_aaaa_record_on_launch = false
+ id = (known after apply)
+ ipv6_cidr_block_association_id = (known after apply)
+ ipv6_native = false
+ map_public_ip_on_launch = true
+ owner_id = (known after apply)
+ private_dns_hostname_type_on_launch = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ vpc_id = (known after apply)
}
 # module.networking.module.vpc.aws_vpc.this[0] will be created
 + resource "aws_vpc" "this" {
+ arn = (known after apply)
+ cidr_block = "10.0.0.0/16"
+ default_network_acl_id = (known after apply)
+ default_route_table_id = (known after apply)
+ default_security_group_id = (known after apply)
+ dhcp_options_id = (known after apply)
+ enable_classiclink = (known after apply)
+ enable_classiclink_dns_support = (known after apply)
+ enable_dns_hostnames = true
+ enable_dns_support = true
+ enable_network_address_usage_metrics = (known after apply)
+ id = (known after apply)
+ instance_tenancy = "default"
+ ipv6_association_id = (known after apply)
+ ipv6_cidr_block = (known after apply)
+ ipv6_cidr_block_network_border_group = (known after apply)
+ main_route_table_id = (known after apply)
+ owner_id = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "ec2-vpc"
+ "terraform-managed" = "true"
}
}
Plan: 40 to add, 0 to change, 0 to destroy.

Changes to Outputs:
+ instance_id = (known after apply)
+ server_ip = (known after apply)
tls_private_key.ubuntu: Creating...
tls_private_key.ubuntu: Creation complete after 0s [id=28937d77b141ebbb129b4362514cee808639b37a]
local_file.ubuntu_key: Creating...
local_file.ubuntu_key: Creation complete after 0s [id=41167fbbcfb72d3014ae1c0d6c282cd8ee22d9d1]
aws_key_pair.generated_key: Creating...
module.networking.module.vpc.aws_vpc.this[0]: Creating...
module.networking.module.vpc.aws_eip.nat[0]: Creating...
aws_key_pair.generated_key: Creation complete after 3s [id=ubuntu]
module.networking.module.vpc.aws_eip.nat[0]: Creation complete after 3s [id=eipalloc-0b9caecb5b2d1abaa]
module.networking.module.vpc.aws_vpc.this[0]: Still creating... [10s elapsed]
module.networking.module.vpc.aws_vpc.this[0]: Creation complete after 17s [id=vpc-0019837a0f8256986]
module.networking.module.vpc.aws_subnet.public[0]: Creating...
module.networking.module.vpc.aws_route_table.private[0]: Creating...
module.networking.module.vpc.aws_subnet.public[1]: Creating...
module.networking.module.vpc.aws_subnet.private[2]: Creating...
module.networking.module.vpc.aws_subnet.database[1]: Creating...
module.networking.module.vpc.aws_subnet.private[1]: Creating...
module.networking.module.vpc.aws_subnet.database[0]: Creating...
module.networking.module.vpc.aws_route_table.public[0]: Creating...
module.networking.module.vpc.aws_internet_gateway.this[0]: Creating...
module.networking.module.vpc.aws_subnet.private[0]: Creating...
module.networking.module.vpc.aws_subnet.private[1]: Creation complete after 2s [id=subnet-02bca7dfba9b6e28a]
module.networking.module.vpc.aws_subnet.public[2]: Creating...
module.networking.module.vpc.aws_route_table.private[0]: Creation complete after 2s [id=rtb-021987169b12b3eb5]
module.networking.module.vpc.aws_subnet.database[2]: Creating...
module.networking.module.vpc.aws_subnet.database[1]: Creation complete after 3s [id=subnet-0f6e6ab42712a6965]
module.networking.module.vpc.aws_subnet.private[0]: Creation complete after 3s [id=subnet-0f217547be3a600c5]
module.networking.module.vpc.aws_internet_gateway.this[0]: Creation complete after 3s [id=igw-04ad14e6d8e2d41fb]
module.networking.module.vpc.aws_subnet.private[2]: Creation complete after 3s [id=subnet-0579f9178aaef5a18]
module.networking.module.vpc.aws_route_table_association.private[2]: Creating...
module.networking.module.vpc.aws_route_table_association.private[1]: Creating...
module.networking.module.vpc.aws_route_table_association.private[0]: Creating...
module.networking.module.vpc.aws_subnet.database[0]: Creation complete after 3s [id=subnet-009d39ae298a0f2f4]
module.networking.module.vpc.aws_route_table.public[0]: Creation complete after 3s [id=rtb-02445e34c3144d513]
module.networking.module.vpc.aws_route.public_internet_gateway[0]: Creating...
module.networking.module.vpc.aws_subnet.database[2]: Creation complete after 2s [id=subnet-077771f1df3ddd57d]
module.networking.module.vpc.aws_route_table_association.database[0]: Creating...
module.networking.module.vpc.aws_route_table_association.database[1]: Creating...
module.networking.module.vpc.aws_route_table_association.database[2]: Creating...
module.networking.module.vpc.aws_route_table_association.private[0]: Creation complete after 1s [id=rtbassoc-0454553d70b8199e8]
module.networking.module.vpc.aws_route_table_association.private[2]: Creation complete after 1s [id=rtbassoc-0b9f036b070ae9b2c]
module.networking.module.vpc.aws_route_table_association.private[1]: Creation complete after 1s [id=rtbassoc-0df0ff8bca8b4d9f6]
module.networking.module.vpc.aws_route.public_internet_gateway[0]: Creation complete after 2s [id=r-rtb-02445e34c3144d5131080289494]
module.networking.module.vpc.aws_route_table_association.database[0]: Creation complete after 1s [id=rtbassoc-05dd8f1022c7dfeb6]
module.networking.module.vpc.aws_route_table_association.database[1]: Creation complete after 1s [id=rtbassoc-0a1d6e883275e1392]
module.networking.module.vpc.aws_route_table_association.database[2]: Creation complete after 1s [id=rtbassoc-0fafa672491e04bfc]
module.networking.module.vpc.aws_subnet.public[0]: Still creating... [10s elapsed]
module.networking.module.vpc.aws_subnet.public[1]: Still creating... [10s elapsed]
module.networking.module.vpc.aws_subnet.public[2]: Still creating... [10s elapsed]
module.networking.module.vpc.aws_subnet.public[1]: Creation complete after 13s [id=subnet-045f4244018ba1377]
module.networking.module.vpc.aws_subnet.public[0]: Creation complete after 13s [id=subnet-041ffcb97c04426c9]
module.networking.module.vpc.aws_subnet.public[2]: Creation complete after 13s [id=subnet-0ee71a09fedab0386]
module.networking.module.vpc.aws_route_table_association.public[2]: Creating...
module.networking.module.vpc.aws_route_table_association.public[1]: Creating...
module.networking.module.vpc.aws_route_table_association.public[0]: Creating...
module.networking.module.vpc.aws_nat_gateway.this[0]: Creating...
module.networking.module.vpc.aws_route_table_association.public[0]: Creation complete after 1s [id=rtbassoc-07e78b30f4b31e5a1]
module.networking.module.vpc.aws_route_table_association.public[1]: Creation complete after 1s [id=rtbassoc-0bbec24d03a332c1e]
module.networking.module.vpc.aws_route_table_association.public[2]: Creation complete after 1s [id=rtbassoc-035469cbf541bdfe8]
module.networking.module.vpc.aws_nat_gateway.this[0]: Still creating... [10s elapsed]
module.networking.module.vpc.aws_nat_gateway.this[0]: Still creating... [20s elapsed]
module.networking.module.vpc.aws_nat_gateway.this[0]: Still creating... [30s elapsed]
module.networking.module.vpc.aws_nat_gateway.this[0]: Still creating... [40s elapsed]
module.networking.module.vpc.aws_nat_gateway.this[0]: Still creating... [50s elapsed]
module.networking.module.vpc.aws_nat_gateway.this[0]: Still creating... [1m0s elapsed]
module.networking.module.vpc.aws_nat_gateway.this[0]: Still creating... [1m10s elapsed]
module.networking.module.vpc.aws_nat_gateway.this[0]: Still creating... [1m20s elapsed]
module.networking.module.vpc.aws_nat_gateway.this[0]: Still creating... [1m30s elapsed]
module.networking.module.vpc.aws_nat_gateway.this[0]: Still creating... [1m40s elapsed]
module.networking.module.vpc.aws_nat_gateway.this[0]: Creation complete after 1m49s [id=nat-07caa09d34f83dd7c]
module.networking.module.vpc.aws_route.private_nat_gateway[0]: Creating...
module.networking.module.vpc.aws_route.private_nat_gateway[0]: Creation complete after 2s [id=r-rtb-021987169b12b3eb51080289494]
module.generic_sg_egress.aws_security_group.security_group: Creating...
module.port_22.aws_security_group.security_group: Creating...
module.port_80.aws_security_group.security_group: Creating...
module.port_443.aws_security_group.security_group: Creating...
module.generic_sg_egress.aws_security_group.security_group: Creation complete after 5s [id=sg-0c7189b0c52e59e4e]
module.generic_sg_egress.aws_security_group_rule.security_group_rule: Creating...
module.port_80.aws_security_group.security_group: Creation complete after 5s [id=sg-02393bbafb37ceb03]
module.port_80.aws_security_group_rule.security_group_rule: Creating...
module.port_22.aws_security_group.security_group: Creation complete after 6s [id=sg-0eb17a8bccaa120df]
module.port_22.aws_security_group_rule.security_group_rule: Creating...
module.port_443.aws_security_group.security_group: Creation complete after 6s [id=sg-005a0a357b22da483]
module.port_443.aws_security_group_rule.security_group_rule: Creating...
aws_network_interface.ubuntu: Creating...
module.port_80.aws_security_group_rule.security_group_rule: Creation complete after 2s [id=sgrule-3314170492]
module.generic_sg_egress.aws_security_group_rule.security_group_rule: Creation complete after 2s [id=sgrule-1420582209]
module.port_22.aws_security_group_rule.security_group_rule: Creation complete after 1s [id=sgrule-3018360882]
module.port_443.aws_security_group_rule.security_group_rule: Creation complete after 1s [id=sgrule-280212388]
aws_network_interface.ubuntu: Creation complete after 2s [id=eni-0657bf02791bf9e2c]
aws_instance.web-template: Creating...
aws_instance.web-template: Still creating... [10s elapsed]
aws_instance.web-template: Provisioning with 'file'...
aws_instance.web-template: Still creating... [20s elapsed]
aws_instance.web-template: Still creating... [30s elapsed]
aws_instance.web-template: Still creating... [40s elapsed]
aws_instance.web-template: Still creating... [50s elapsed]
aws_instance.web-template: Still creating... [1m0s elapsed]
aws_instance.web-template: Still creating... [1m10s elapsed]
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment