Skip to content

Instantly share code, notes, and snippets.

@simonszu
Created April 13, 2022 07:50
Show Gist options
  • Save simonszu/13b583b7d601457cbf28a34dfe545c1c to your computer and use it in GitHub Desktop.
Save simonszu/13b583b7d601457cbf28a34dfe545c1c to your computer and use it in GitHub Desktop.
Terraform Debug Log
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: HTTP/2.0 200 OK
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Content-Length: 567
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Cache-Control: no-cache, private
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Content-Type: application/json
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Date: Wed, 13 Apr 2022 07:49:30 GMT
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5:
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: {
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "kind": "Namespace",
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "apiVersion": "v1",
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "metadata": {
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "name": "ingress-nginx",
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "selfLink": "/api/v1/namespaces/ingress-nginx",
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "uid": "f49d9da0-9d62-4be9-9ccd-da9b83706f10",
2022-04-13T09:49:29.975+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "resourceVersion": "2387607",
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "creationTimestamp": "2022-04-12T13:31:55Z",
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "annotations": {
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "name": "ingress-nginx"
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: },
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "managedFields": [
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: {
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "manager": "HashiCorp",
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "operation": "Update",
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "apiVersion": "v1",
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "time": "2022-04-12T13:31:55Z",
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "fieldsType": "FieldsV1",
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "fieldsV1": {
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:metadata": {
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:annotations": {
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ".": {},
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:name": {}
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: },
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:status": {
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:phase": {}
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ]
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: },
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "spec": {
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "finalizers": [
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "kubernetes"
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ]
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: },
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "status": {
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "phase": "Active"
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5:
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: -----------------------------------------------------
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:29 [INFO] Namespace monitoring exists
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:29 [INFO] Namespace ingress-nginx exists
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:29 [INFO] Reading namespace monitoring
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:29 [INFO] Reading namespace ingress-nginx
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:29 [DEBUG] Kubernetes API Request Details:
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ---[ REQUEST ]---------------------------------------
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: GET /api/v1/namespaces/monitoring HTTP/1.1
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Host: 80.158.88.119:5443
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: User-Agent: HashiCorp/1.0 Terraform/1.1.8
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Accept: application/json, */*
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Accept-Encoding: gzip
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5:
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5:
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: -----------------------------------------------------
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:29 [DEBUG] Kubernetes API Request Details:
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ---[ REQUEST ]---------------------------------------
2022-04-13T09:49:29.976+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: GET /api/v1/namespaces/ingress-nginx HTTP/1.1
2022-04-13T09:49:29.977+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Host: 80.158.88.119:5443
2022-04-13T09:49:29.977+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: User-Agent: HashiCorp/1.0 Terraform/1.1.8
2022-04-13T09:49:29.977+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Accept: application/json, */*
2022-04-13T09:49:29.977+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Accept-Encoding: gzip
2022-04-13T09:49:29.977+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5:
2022-04-13T09:49:29.977+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5:
2022-04-13T09:49:29.977+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: -----------------------------------------------------
2022-04-13T09:49:29.993+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] fluentd Unstructed YAML: map[apiVersion:rbac.authorization.k8s.io/v1 kind:ClusterRole metadata:map[name:fluentd] rules:[map[apiGroups:[] resources:[pods namespaces] verbs:[get list watch]]]]
2022-04-13T09:49:29.993+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] fluentd Unstructed YAML: map[apiVersion:rbac.authorization.k8s.io/v1 kind:ClusterRole metadata:map[name:fluentd] rules:[map[apiGroups:[] resources:[pods namespaces] verbs:[get list watch]]]]
2022-04-13T09:49:29.993+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] kube-system/fluentd Unstructed YAML: map[apiVersion:v1 kind:ServiceAccount metadata:map[name:fluentd namespace:kube-system]]
2022-04-13T09:49:29.993+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] kube-system/fluentd Unstructed YAML: map[apiVersion:v1 kind:ServiceAccount metadata:map[name:fluentd namespace:kube-system]]
2022-04-13T09:49:29.993+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.fluentd_clusterrole, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .force_new: planned value cty.False for a non-computed attribute
- .server_side_apply: planned value cty.False for a non-computed attribute
- .apply_only: planned value cty.False for a non-computed attribute
- .validate_schema: planned value cty.True for a non-computed attribute
- .wait_for_rollout: planned value cty.True for a non-computed attribute
- .force_conflicts: planned value cty.False for a non-computed attribute
2022-04-13T09:49:29.993+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.fluentd_serviceaccount, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .apply_only: planned value cty.False for a non-computed attribute
- .server_side_apply: planned value cty.False for a non-computed attribute
- .wait_for_rollout: planned value cty.True for a non-computed attribute
- .force_conflicts: planned value cty.False for a non-computed attribute
- .validate_schema: planned value cty.True for a non-computed attribute
- .force_new: planned value cty.False for a non-computed attribute
2022-04-13T09:49:29.994+0200 [INFO] ReferenceTransformer: reference not found: "kubectl_manifest.fluentd_serviceaccount"
2022-04-13T09:49:29.994+0200 [INFO] ReferenceTransformer: reference not found: "kubectl_manifest.fluentd_clusterrole"
2022-04-13T09:49:29.994+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.fluentd-clusterrolebinding" references: []
2022-04-13T09:49:29.994+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] kube-system/fluentd Unstructed YAML: map[apiVersion:apps/v1 kind:DaemonSet metadata:map[labels:map[k8s-app:fluentd-logging version:v1] name:fluentd namespace:kube-system] spec:map[selector:map[matchLabels:map[k8s-app:fluentd-logging version:v1]] template:map[metadata:map[labels:map[k8s-app:fluentd-logging version:v1]] spec:map[containers:[map[env:[map[name:FLUENT_ELASTICSEARCH_HOST value:192.168.1.184] map[name:FLUENT_ELASTICSEARCH_PORT value:9200] map[name:FLUENT_ELASTICSEARCH_SCHEME value:http] map[name:FLUENT_ELASTICSEARCH_SSL_VERIFY value:false] map[name:FLUENT_ELASTICSEARCH_SSL_VERSION value:TLSv1_2] map[name:FLUENT_ELASTICSEARCH_USER value:admin] map[name:FLUENT_ELASTICSEARCH_PASSWORD value:i2M#8]b0-Pj(,yPW2wXr]kwM] map[name:FLUENTD_UID value:0] map[name:FLUENTD_SYSTEMD_CONF value:disable] map[name:FLUENTD_PROMETHEUS_CONF value:disable] map[name:FLUENT_ELASTICSEARCH_LOGSTASH_INDEX_NAME value:fluentd]] image:fluent/fluentd-kubernetes-daemonset:v1.13-debian-elasticsearch7-1 name:fluentd resources:map[limits:map[memory:200Mi] requests:map[cpu:100m memory:200Mi]] volumeMounts:[map[mountPath:/var/log name:varlog] map[mountPath:/var/lib/docker/containers name:dockercontainerlogdirectory readOnly:true]]]] serviceAccount:fluentd serviceAccountName:fluentd terminationGracePeriodSeconds:30 tolerations:[map[effect:NoSchedule key:node-role.kubernetes.io/master]] volumes:[map[hostPath:map[path:/var/log] name:varlog] map[hostPath:map[path:/var/lib/docker/containers] name:dockercontainerlogdirectory]]]]]]
2022-04-13T09:49:29.994+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] kube-system/fluentd Unstructed YAML: map[apiVersion:apps/v1 kind:DaemonSet metadata:map[labels:map[k8s-app:fluentd-logging version:v1] name:fluentd namespace:kube-system] spec:map[selector:map[matchLabels:map[k8s-app:fluentd-logging version:v1]] template:map[metadata:map[labels:map[k8s-app:fluentd-logging version:v1]] spec:map[containers:[map[env:[map[name:FLUENT_ELASTICSEARCH_HOST value:192.168.1.184] map[name:FLUENT_ELASTICSEARCH_PORT value:9200] map[name:FLUENT_ELASTICSEARCH_SCHEME value:http] map[name:FLUENT_ELASTICSEARCH_SSL_VERIFY value:false] map[name:FLUENT_ELASTICSEARCH_SSL_VERSION value:TLSv1_2] map[name:FLUENT_ELASTICSEARCH_USER value:admin] map[name:FLUENT_ELASTICSEARCH_PASSWORD value:i2M#8]b0-Pj(,yPW2wXr]kwM] map[name:FLUENTD_UID value:0] map[name:FLUENTD_SYSTEMD_CONF value:disable] map[name:FLUENTD_PROMETHEUS_CONF value:disable] map[name:FLUENT_ELASTICSEARCH_LOGSTASH_INDEX_NAME value:fluentd]] image:fluent/fluentd-kubernetes-daemonset:v1.13-debian-elasticsearch7-1 name:fluentd resources:map[limits:map[memory:200Mi] requests:map[cpu:100m memory:200Mi]] volumeMounts:[map[mountPath:/var/log name:varlog] map[mountPath:/var/lib/docker/containers name:dockercontainerlogdirectory readOnly:true]]]] serviceAccount:fluentd serviceAccountName:fluentd terminationGracePeriodSeconds:30 tolerations:[map[effect:NoSchedule key:node-role.kubernetes.io/master]] volumes:[map[hostPath:map[path:/var/log] name:varlog] map[hostPath:map[path:/var/lib/docker/containers] name:dockercontainerlogdirectory]]]]]]
2022-04-13T09:49:29.995+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.fluentd-daemonset, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .force_new: planned value cty.False for a non-computed attribute
- .apply_only: planned value cty.False for a non-computed attribute
- .server_side_apply: planned value cty.False for a non-computed attribute
- .wait_for_rollout: planned value cty.True for a non-computed attribute
- .force_conflicts: planned value cty.False for a non-computed attribute
- .validate_schema: planned value cty.True for a non-computed attribute
kubectl_manifest.fluentd-clusterrolebinding: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/fluentd]
2022-04-13T09:49:29.996+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] fluentd Unstructed YAML: map[apiVersion:rbac.authorization.k8s.io/v1 kind:ClusterRoleBinding metadata:map[name:fluentd] roleRef:map[apiGroup:rbac.authorization.k8s.io kind:ClusterRole name:fluentd] subjects:[map[kind:ServiceAccount name:fluentd namespace:kube-system]]]
2022-04-13T09:49:29.999+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:29 [DEBUG] fluentd fetch from kubernetes
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:30 [DEBUG] Kubernetes API Response Details:
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ---[ RESPONSE ]--------------------------------------
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: HTTP/2.0 200 OK
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Content-Length: 567
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Cache-Control: no-cache, private
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Content-Type: application/json
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Date: Wed, 13 Apr 2022 07:49:30 GMT
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5:
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: {
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "kind": "Namespace",
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "apiVersion": "v1",
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "metadata": {
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "name": "ingress-nginx",
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "selfLink": "/api/v1/namespaces/ingress-nginx",
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "uid": "f49d9da0-9d62-4be9-9ccd-da9b83706f10",
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "resourceVersion": "2387607",
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "creationTimestamp": "2022-04-12T13:31:55Z",
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "annotations": {
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "name": "ingress-nginx"
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: },
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "managedFields": [
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: {
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "manager": "HashiCorp",
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "operation": "Update",
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "apiVersion": "v1",
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "time": "2022-04-12T13:31:55Z",
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "fieldsType": "FieldsV1",
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "fieldsV1": {
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:metadata": {
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:annotations": {
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ".": {},
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:name": {}
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: },
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:status": {
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:phase": {}
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ]
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: },
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "spec": {
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "finalizers": [
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "kubernetes"
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ]
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: },
2022-04-13T09:49:30.009+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "status": {
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "phase": "Active"
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5:
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: -----------------------------------------------------
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:30 [DEBUG] Kubernetes API Response Details:
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ---[ RESPONSE ]--------------------------------------
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: HTTP/2.0 200 OK
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Content-Length: 558
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Cache-Control: no-cache, private
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Content-Type: application/json
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: Date: Wed, 13 Apr 2022 07:49:30 GMT
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5:
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: {
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "kind": "Namespace",
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "apiVersion": "v1",
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "metadata": {
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "name": "monitoring",
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "selfLink": "/api/v1/namespaces/monitoring",
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "uid": "b66b0395-09fc-493c-978c-f5c5cc06ceaa",
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "resourceVersion": "2271409",
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "creationTimestamp": "2022-04-12T07:40:04Z",
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "annotations": {
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "name": "monitoring"
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: },
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "managedFields": [
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: {
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "manager": "HashiCorp",
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "operation": "Update",
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "apiVersion": "v1",
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "time": "2022-04-12T07:40:04Z",
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "fieldsType": "FieldsV1",
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "fieldsV1": {
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:metadata": {
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:annotations": {
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ".": {},
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:name": {}
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: },
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:status": {
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "f:phase": {}
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ]
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: },
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "spec": {
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "finalizers": [
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "kubernetes"
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: ]
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: },
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "status": {
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: "phase": "Active"
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: }
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5:
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: -----------------------------------------------------
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:30 [INFO] Received namespace: &v1.Namespace{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ingress-nginx", GenerateName:"", Namespace:"", SelfLink:"/api/v1/namespaces/ingress-nginx", UID:"f49d9da0-9d62-4be9-9ccd-da9b83706f10", ResourceVersion:"2387607", Generation:0, CreationTimestamp:v1.Time{Time:time.Time{wall:0x0, ext:63785367115, loc:(*time.Location)(0x3d8ffc0)}}, DeletionTimestamp:(*v1.Time)(nil), DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string{"name":"ingress-nginx"}, OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:"HashiCorp", Operation:"Update", APIVersion:"v1", Time:(*v1.Time)(0xc00000d710), FieldsType:"FieldsV1", FieldsV1:(*v1.FieldsV1)(0xc00000d728), Subresource:""}}}, Spec:v1.NamespaceSpec{Finalizers:[]v1.FinalizerName{"kubernetes"}}, Status:v1.NamespaceStatus{Phase:"Active", Conditions:[]v1.NamespaceCondition(nil)}}
2022-04-13T09:49:30.010+0200 [DEBUG] provider.terraform-provider-kubernetes_v2.10.0_x5: 2022/04/13 09:49:30 [INFO] Received namespace: &v1.Namespace{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"monitoring", GenerateName:"", Namespace:"", SelfLink:"/api/v1/namespaces/monitoring", UID:"b66b0395-09fc-493c-978c-f5c5cc06ceaa", ResourceVersion:"2271409", Generation:0, CreationTimestamp:v1.Time{Time:time.Time{wall:0x0, ext:63785346004, loc:(*time.Location)(0x3d8ffc0)}}, DeletionTimestamp:(*v1.Time)(nil), DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string{"name":"monitoring"}, OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:"HashiCorp", Operation:"Update", APIVersion:"v1", Time:(*v1.Time)(0xc00047f230), FieldsType:"FieldsV1", FieldsV1:(*v1.FieldsV1)(0xc00047f248), Subresource:""}}}, Spec:v1.NamespaceSpec{Finalizers:[]v1.FinalizerName{"kubernetes"}}, Status:v1.NamespaceStatus{Phase:"Active", Conditions:[]v1.NamespaceCondition(nil)}}
2022-04-13T09:49:30.012+0200 [WARN] Provider "registry.terraform.io/hashicorp/kubernetes" produced an invalid plan for kubernetes_namespace.ingress_namespace, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .metadata[0].labels: planned value cty.MapValEmpty(cty.String) for a non-computed attribute
- .metadata[0].generate_name: planned value cty.StringVal("") for a non-computed attribute
2022-04-13T09:49:30.012+0200 [WARN] Provider "registry.terraform.io/hashicorp/kubernetes" produced an invalid plan for kubernetes_namespace.monitoring_namespace, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .metadata[0].generate_name: planned value cty.StringVal("") for a non-computed attribute
- .metadata[0].labels: planned value cty.MapValEmpty(cty.String) for a non-computed attribute
2022-04-13T09:49:30.012+0200 [INFO] ReferenceTransformer: reference not found: "kubernetes_namespace.ingress_namespace"
2022-04-13T09:49:30.012+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.ingress_secret_docker_pull" references: []
2022-04-13T09:49:30.013+0200 [INFO] ReferenceTransformer: reference not found: "kubernetes_namespace.monitoring_namespace"
2022-04-13T09:49:30.013+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.monitoring_secret_docker_pull" references: []
2022-04-13T09:49:30.014+0200 [INFO] ReferenceTransformer: reference not found: "kubernetes_namespace.monitoring_namespace"
2022-04-13T09:49:30.014+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.monitoring_secret_basic_auth" references: []
2022-04-13T09:49:30.014+0200 [INFO] ReferenceTransformer: reference not found: "kubernetes_namespace.monitoring_namespace"
2022-04-13T09:49:30.014+0200 [INFO] ReferenceTransformer: reference not found: "opentelekomcloud_evs_volume_v3.prometheus_volume"
2022-04-13T09:49:30.014+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.prometheus_volume_pv" references: []
2022-04-13T09:49:30.015+0200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2022-04-13T09:49:30.019+0200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/kubernetes/2.10.0/darwin_amd64/terraform-provider-kubernetes_v2.10.0_x5 pid=5230
2022-04-13T09:49:30.019+0200 [DEBUG] provider: plugin exited
2022-04-13T09:49:30.019+0200 [INFO] ReferenceTransformer: reference not found: "kubernetes_namespace.monitoring_namespace"
2022-04-13T09:49:30.019+0200 [INFO] ReferenceTransformer: reference not found: "opentelekomcloud_evs_volume_v3.grafana_volume"
2022-04-13T09:49:30.019+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.grafana_volume_pv" references: []
kubectl_manifest.ingress_secret_docker_pull: Refreshing state... [id=/api/v1/namespaces/ingress-nginx/secrets/regcred]
kubectl_manifest.monitoring_secret_docker_pull: Refreshing state... [id=/api/v1/namespaces/monitoring/secrets/regcred]
2022-04-13T09:49:30.020+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] ingress-nginx/regcred Unstructed YAML: map[apiVersion:v1 data:map[.dockerconfigjson:eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJzaW1vbnN6dXRzeSIsInBhc3N3b3JkIjoiYzhkNmQzNHFjeHkiLCJlbWFpbCI6InNpbW9uLnN6dXN0a293c2tpQGV4dGVybmFsLnQtc3lzdGVtcy5jb20iLCJhdXRoIjoiYzJsdGIyNXplblYwYzNrNll6aGtObVF6TkhGamVIaz0ifX19] kind:Secret metadata:map[name:regcred namespace:ingress-nginx] type:kubernetes.io/dockerconfigjson]
2022-04-13T09:49:30.020+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/regcred Unstructed YAML: map[apiVersion:v1 data:map[.dockerconfigjson:eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJzaW1vbnN6dXRzeSIsInBhc3N3b3JkIjoiYzhkNmQzNHFjeHkiLCJlbWFpbCI6InNpbW9uLnN6dXN0a293c2tpQGV4dGVybmFsLnQtc3lzdGVtcy5jb20iLCJhdXRoIjoiYzJsdGIyNXplblYwYzNrNll6aGtObVF6TkhGamVIaz0ifX19] kind:Secret metadata:map[name:regcred namespace:monitoring] type:kubernetes.io/dockerconfigjson]
2022-04-13T09:49:30.021+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] ingress-nginx/regcred fetch from kubernetes
kubectl_manifest.grafana_volume_pv: Refreshing state... [id=/api/v1/persistentvolumes/cce-evs-grafana-pv]
2022-04-13T09:49:30.024+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/regcred fetch from kubernetes
kubectl_manifest.prometheus_volume_pv: Refreshing state... [id=/api/v1/persistentvolumes/cce-evs-prometheus-pv]
kubectl_manifest.monitoring_secret_basic_auth: Refreshing state... [id=/api/v1/namespaces/monitoring/secrets/basic-auth]
2022-04-13T09:49:30.025+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-grafana-pv Unstructed YAML: map[apiVersion:v1 kind:PersistentVolume metadata:map[annotations:map[everest.io/set-disk-metadata:true pv.kubernetes.io/provisioned-by:everest-csi-provisioner] finalizers:[kubernetes.io/pv-protection everest.io/disk-metadata-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-grafana-pv] spec:map[accessModes:[ReadWriteOnce] capacity:map[storage:10Gi] csi:map[driver:disk.csi.everest.io fsType:ext4 volumeAttributes:map[everest.io/disk-mode:SCSI everest.io/disk-volume-type:SATA storage.kubernetes.io/csiProvisionerIdentity:everest-csi-provisioner] volumeHandle:e5b2742f-25d4-4614-9f6d-c3edd4c537d5] nodeAffinity:map[required:map[nodeSelectorTerms:[map[matchExpressions:[map[key:failure-domain.beta.kubernetes.io/zone operator:In values:[eu-de-01]]]]]]] persistentVolumeReclaimPolicy:Delete storageClassName:csi-disk volumeMode:Filesystem]]
2022-04-13T09:49:30.026+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/basic-auth Unstructed YAML: map[apiVersion:v1 data:map[auth:bWNzX2NhbzokYXByMSRCMDFUWnRTcyR0V0lxODY1NjNOVXAxVTk3M2drbHkwCg==] kind:Secret metadata:map[name:basic-auth namespace:monitoring] type:Opaque]
2022-04-13T09:49:30.026+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-prometheus-pv Unstructed YAML: map[apiVersion:v1 kind:PersistentVolume metadata:map[annotations:map[everest.io/set-disk-metadata:true pv.kubernetes.io/provisioned-by:everest-csi-provisioner] finalizers:[kubernetes.io/pv-protection everest.io/disk-metadata-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-prometheus-pv] spec:map[accessModes:[ReadWriteOnce] capacity:map[storage:10Gi] csi:map[driver:disk.csi.everest.io fsType:ext4 volumeAttributes:map[everest.io/disk-mode:SCSI everest.io/disk-volume-type:SATA storage.kubernetes.io/csiProvisionerIdentity:everest-csi-provisioner] volumeHandle:d7f1a72a-bf91-4862-99d3-eb5305006b4b] nodeAffinity:map[required:map[nodeSelectorTerms:[map[matchExpressions:[map[key:failure-domain.beta.kubernetes.io/zone operator:In values:[eu-de-01]]]]]]] persistentVolumeReclaimPolicy:Delete storageClassName:csi-disk volumeMode:Filesystem]]
2022-04-13T09:49:30.027+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/basic-auth fetch from kubernetes
2022-04-13T09:49:30.028+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-prometheus-pv fetch from kubernetes
2022-04-13T09:49:30.029+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-grafana-pv fetch from kubernetes
2022-04-13T09:49:30.035+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] fluentd Unstructed YAML: map[apiVersion:rbac.authorization.k8s.io/v1 kind:ClusterRoleBinding metadata:map[name:fluentd] roleRef:map[apiGroup:rbac.authorization.k8s.io kind:ClusterRole name:fluentd] subjects:[map[kind:ServiceAccount name:fluentd namespace:kube-system]]]
2022-04-13T09:49:30.035+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] fluentd Unstructed YAML: map[apiVersion:rbac.authorization.k8s.io/v1 kind:ClusterRoleBinding metadata:map[name:fluentd] roleRef:map[apiGroup:rbac.authorization.k8s.io kind:ClusterRole name:fluentd] subjects:[map[kind:ServiceAccount name:fluentd namespace:kube-system]]]
2022-04-13T09:49:30.036+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.fluentd-clusterrolebinding, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .force_conflicts: planned value cty.False for a non-computed attribute
- .validate_schema: planned value cty.True for a non-computed attribute
- .wait_for_rollout: planned value cty.True for a non-computed attribute
- .force_new: planned value cty.False for a non-computed attribute
- .server_side_apply: planned value cty.False for a non-computed attribute
- .apply_only: planned value cty.False for a non-computed attribute
2022-04-13T09:49:30.053+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] ingress-nginx/regcred Unstructed YAML: map[apiVersion:v1 data:map[.dockerconfigjson:eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJzaW1vbnN6dXRzeSIsInBhc3N3b3JkIjoiYzhkNmQzNHFjeHkiLCJlbWFpbCI6InNpbW9uLnN6dXN0a293c2tpQGV4dGVybmFsLnQtc3lzdGVtcy5jb20iLCJhdXRoIjoiYzJsdGIyNXplblYwYzNrNll6aGtObVF6TkhGamVIaz0ifX19] kind:Secret metadata:map[name:regcred namespace:ingress-nginx] type:kubernetes.io/dockerconfigjson]
2022-04-13T09:49:30.053+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] ingress-nginx/regcred Unstructed YAML: map[apiVersion:v1 data:map[.dockerconfigjson:eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJzaW1vbnN6dXRzeSIsInBhc3N3b3JkIjoiYzhkNmQzNHFjeHkiLCJlbWFpbCI6InNpbW9uLnN6dXN0a293c2tpQGV4dGVybmFsLnQtc3lzdGVtcy5jb20iLCJhdXRoIjoiYzJsdGIyNXplblYwYzNrNll6aGtObVF6TkhGamVIaz0ifX19] kind:Secret metadata:map[name:regcred namespace:ingress-nginx] type:kubernetes.io/dockerconfigjson]
2022-04-13T09:49:30.053+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.ingress_secret_docker_pull, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .force_new: planned value cty.False for a non-computed attribute
- .server_side_apply: planned value cty.False for a non-computed attribute
- .apply_only: planned value cty.False for a non-computed attribute
- .force_conflicts: planned value cty.False for a non-computed attribute
- .validate_schema: planned value cty.True for a non-computed attribute
- .wait_for_rollout: planned value cty.True for a non-computed attribute
2022-04-13T09:49:30.061+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/regcred Unstructed YAML: map[apiVersion:v1 data:map[.dockerconfigjson:eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJzaW1vbnN6dXRzeSIsInBhc3N3b3JkIjoiYzhkNmQzNHFjeHkiLCJlbWFpbCI6InNpbW9uLnN6dXN0a293c2tpQGV4dGVybmFsLnQtc3lzdGVtcy5jb20iLCJhdXRoIjoiYzJsdGIyNXplblYwYzNrNll6aGtObVF6TkhGamVIaz0ifX19] kind:Secret metadata:map[name:regcred namespace:monitoring] type:kubernetes.io/dockerconfigjson]
2022-04-13T09:49:30.061+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.monitoring_secret_docker_pull, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .force_new: planned value cty.False for a non-computed attribute
- .server_side_apply: planned value cty.False for a non-computed attribute
- .apply_only: planned value cty.False for a non-computed attribute
- .force_conflicts: planned value cty.False for a non-computed attribute
- .validate_schema: planned value cty.True for a non-computed attribute
- .wait_for_rollout: planned value cty.True for a non-computed attribute
2022-04-13T09:49:30.061+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/regcred Unstructed YAML: map[apiVersion:v1 data:map[.dockerconfigjson:eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJzaW1vbnN6dXRzeSIsInBhc3N3b3JkIjoiYzhkNmQzNHFjeHkiLCJlbWFpbCI6InNpbW9uLnN6dXN0a293c2tpQGV4dGVybmFsLnQtc3lzdGVtcy5jb20iLCJhdXRoIjoiYzJsdGIyNXplblYwYzNrNll6aGtObVF6TkhGamVIaz0ifX19] kind:Secret metadata:map[name:regcred namespace:monitoring] type:kubernetes.io/dockerconfigjson]
2022-04-13T09:49:30.061+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/basic-auth Unstructed YAML: map[apiVersion:v1 data:map[auth:bWNzX2NhbzokYXByMSRCMDFUWnRTcyR0V0lxODY1NjNOVXAxVTk3M2drbHkwCg==] kind:Secret metadata:map[name:basic-auth namespace:monitoring] type:Opaque]
2022-04-13T09:49:30.061+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/basic-auth Unstructed YAML: map[apiVersion:v1 data:map[auth:bWNzX2NhbzokYXByMSRCMDFUWnRTcyR0V0lxODY1NjNOVXAxVTk3M2drbHkwCg==] kind:Secret metadata:map[name:basic-auth namespace:monitoring] type:Opaque]
2022-04-13T09:49:30.062+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-grafana-pv Unstructed YAML: map[apiVersion:v1 kind:PersistentVolume metadata:map[annotations:map[everest.io/set-disk-metadata:true pv.kubernetes.io/provisioned-by:everest-csi-provisioner] finalizers:[kubernetes.io/pv-protection everest.io/disk-metadata-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-grafana-pv] spec:map[accessModes:[ReadWriteOnce] capacity:map[storage:10Gi] csi:map[driver:disk.csi.everest.io fsType:ext4 volumeAttributes:map[everest.io/disk-mode:SCSI everest.io/disk-volume-type:SATA storage.kubernetes.io/csiProvisionerIdentity:everest-csi-provisioner] volumeHandle:e5b2742f-25d4-4614-9f6d-c3edd4c537d5] nodeAffinity:map[required:map[nodeSelectorTerms:[map[matchExpressions:[map[key:failure-domain.beta.kubernetes.io/zone operator:In values:[eu-de-01]]]]]]] persistentVolumeReclaimPolicy:Delete storageClassName:csi-disk volumeMode:Filesystem]]
2022-04-13T09:49:30.063+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-prometheus-pv Unstructed YAML: map[apiVersion:v1 kind:PersistentVolume metadata:map[annotations:map[everest.io/set-disk-metadata:true pv.kubernetes.io/provisioned-by:everest-csi-provisioner] finalizers:[kubernetes.io/pv-protection everest.io/disk-metadata-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-prometheus-pv] spec:map[accessModes:[ReadWriteOnce] capacity:map[storage:10Gi] csi:map[driver:disk.csi.everest.io fsType:ext4 volumeAttributes:map[everest.io/disk-mode:SCSI everest.io/disk-volume-type:SATA storage.kubernetes.io/csiProvisionerIdentity:everest-csi-provisioner] volumeHandle:d7f1a72a-bf91-4862-99d3-eb5305006b4b] nodeAffinity:map[required:map[nodeSelectorTerms:[map[matchExpressions:[map[key:failure-domain.beta.kubernetes.io/zone operator:In values:[eu-de-01]]]]]]] persistentVolumeReclaimPolicy:Delete storageClassName:csi-disk volumeMode:Filesystem]]
2022-04-13T09:49:30.063+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-grafana-pv Unstructed YAML: map[apiVersion:v1 kind:PersistentVolume metadata:map[annotations:map[everest.io/set-disk-metadata:true pv.kubernetes.io/provisioned-by:everest-csi-provisioner] finalizers:[kubernetes.io/pv-protection everest.io/disk-metadata-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-grafana-pv] spec:map[accessModes:[ReadWriteOnce] capacity:map[storage:10Gi] csi:map[driver:disk.csi.everest.io fsType:ext4 volumeAttributes:map[everest.io/disk-mode:SCSI everest.io/disk-volume-type:SATA storage.kubernetes.io/csiProvisionerIdentity:everest-csi-provisioner] volumeHandle:e5b2742f-25d4-4614-9f6d-c3edd4c537d5] nodeAffinity:map[required:map[nodeSelectorTerms:[map[matchExpressions:[map[key:failure-domain.beta.kubernetes.io/zone operator:In values:[eu-de-01]]]]]]] persistentVolumeReclaimPolicy:Delete storageClassName:csi-disk volumeMode:Filesystem]]
2022-04-13T09:49:30.064+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] cce-evs-prometheus-pv Unstructed YAML: map[apiVersion:v1 kind:PersistentVolume metadata:map[annotations:map[everest.io/set-disk-metadata:true pv.kubernetes.io/provisioned-by:everest-csi-provisioner] finalizers:[kubernetes.io/pv-protection everest.io/disk-metadata-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-prometheus-pv] spec:map[accessModes:[ReadWriteOnce] capacity:map[storage:10Gi] csi:map[driver:disk.csi.everest.io fsType:ext4 volumeAttributes:map[everest.io/disk-mode:SCSI everest.io/disk-volume-type:SATA storage.kubernetes.io/csiProvisionerIdentity:everest-csi-provisioner] volumeHandle:d7f1a72a-bf91-4862-99d3-eb5305006b4b] nodeAffinity:map[required:map[nodeSelectorTerms:[map[matchExpressions:[map[key:failure-domain.beta.kubernetes.io/zone operator:In values:[eu-de-01]]]]]]] persistentVolumeReclaimPolicy:Delete storageClassName:csi-disk volumeMode:Filesystem]]
2022-04-13T09:49:30.063+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.monitoring_secret_basic_auth, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .server_side_apply: planned value cty.False for a non-computed attribute
- .apply_only: planned value cty.False for a non-computed attribute
- .force_conflicts: planned value cty.False for a non-computed attribute
- .validate_schema: planned value cty.True for a non-computed attribute
- .wait_for_rollout: planned value cty.True for a non-computed attribute
- .force_new: planned value cty.False for a non-computed attribute
2022-04-13T09:49:30.065+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.grafana_volume_pv, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .force_new: planned value cty.False for a non-computed attribute
- .server_side_apply: planned value cty.False for a non-computed attribute
- .apply_only: planned value cty.False for a non-computed attribute
- .validate_schema: planned value cty.True for a non-computed attribute
- .wait_for_rollout: planned value cty.True for a non-computed attribute
- .force_conflicts: planned value cty.False for a non-computed attribute
2022-04-13T09:49:30.065+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.prometheus_volume_pv, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .apply_only: planned value cty.False for a non-computed attribute
- .server_side_apply: planned value cty.False for a non-computed attribute
- .wait_for_rollout: planned value cty.True for a non-computed attribute
- .force_conflicts: planned value cty.False for a non-computed attribute
- .validate_schema: planned value cty.True for a non-computed attribute
- .force_new: planned value cty.False for a non-computed attribute
2022-04-13T09:49:30.065+0200 [INFO] ReferenceTransformer: reference not found: "kubectl_manifest.grafana_volume_pv"
2022-04-13T09:49:30.065+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.grafana_volume_pvc" references: []
2022-04-13T09:49:30.065+0200 [INFO] ReferenceTransformer: reference not found: "kubectl_manifest.prometheus_volume_pv"
2022-04-13T09:49:30.065+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.prometheus_volume_pvc" references: []
kubectl_manifest.grafana_volume_pvc: Refreshing state... [id=/api/v1/namespaces/monitoring/persistentvolumeclaims/cce-evs-grafana]
kubectl_manifest.prometheus_volume_pvc: Refreshing state... [id=/api/v1/namespaces/monitoring/persistentvolumeclaims/cce-evs-prometheus]
2022-04-13T09:49:30.067+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-prometheus Unstructed YAML: map[apiVersion:v1 kind:PersistentVolumeClaim metadata:map[annotations:map[everest.io/disk-volume-type:SATA volume.beta.kubernetes.io/storage-provisioner:everest-csi-provisioner] finalizers:[kubernetes.io/pvc-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-prometheus namespace:monitoring] spec:map[accessModes:[ReadWriteOnce] resources:map[requests:map[storage:10Gi]] storageClassName:csi-disk volumeMode:Filesystem volumeName:cce-evs-prometheus-pv]]
2022-04-13T09:49:30.067+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-grafana Unstructed YAML: map[apiVersion:v1 kind:PersistentVolumeClaim metadata:map[annotations:map[everest.io/disk-volume-type:SATA volume.beta.kubernetes.io/storage-provisioner:everest-csi-provisioner] finalizers:[kubernetes.io/pvc-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-grafana namespace:monitoring] spec:map[accessModes:[ReadWriteOnce] resources:map[requests:map[storage:10Gi]] storageClassName:csi-disk volumeMode:Filesystem volumeName:cce-evs-grafana-pv]]
2022-04-13T09:49:30.068+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-prometheus fetch from kubernetes
2022-04-13T09:49:30.068+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-grafana fetch from kubernetes
2022-04-13T09:49:30.095+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-prometheus Unstructed YAML: map[apiVersion:v1 kind:PersistentVolumeClaim metadata:map[annotations:map[everest.io/disk-volume-type:SATA volume.beta.kubernetes.io/storage-provisioner:everest-csi-provisioner] finalizers:[kubernetes.io/pvc-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-prometheus namespace:monitoring] spec:map[accessModes:[ReadWriteOnce] resources:map[requests:map[storage:10Gi]] storageClassName:csi-disk volumeMode:Filesystem volumeName:cce-evs-prometheus-pv]]
2022-04-13T09:49:30.095+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-prometheus Unstructed YAML: map[apiVersion:v1 kind:PersistentVolumeClaim metadata:map[annotations:map[everest.io/disk-volume-type:SATA volume.beta.kubernetes.io/storage-provisioner:everest-csi-provisioner] finalizers:[kubernetes.io/pvc-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-prometheus namespace:monitoring] spec:map[accessModes:[ReadWriteOnce] resources:map[requests:map[storage:10Gi]] storageClassName:csi-disk volumeMode:Filesystem volumeName:cce-evs-prometheus-pv]]
2022-04-13T09:49:30.096+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.prometheus_volume_pvc, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .force_conflicts: planned value cty.False for a non-computed attribute
- .validate_schema: planned value cty.True for a non-computed attribute
- .wait_for_rollout: planned value cty.True for a non-computed attribute
- .force_new: planned value cty.False for a non-computed attribute
- .server_side_apply: planned value cty.False for a non-computed attribute
- .apply_only: planned value cty.False for a non-computed attribute
2022-04-13T09:49:30.096+0200 [INFO] ReferenceTransformer: reference not found: "kubectl_manifest.prometheus_volume_pvc"
2022-04-13T09:49:30.096+0200 [INFO] ReferenceTransformer: reference not found: "kubectl_manifest.monitoring_secret_docker_pull"
2022-04-13T09:49:30.096+0200 [DEBUG] ReferenceTransformer: "helm_release.monitoring_prometheus" references: []
2022-04-13T09:49:30.102+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-grafana Unstructed YAML: map[apiVersion:v1 kind:PersistentVolumeClaim metadata:map[annotations:map[everest.io/disk-volume-type:SATA volume.beta.kubernetes.io/storage-provisioner:everest-csi-provisioner] finalizers:[kubernetes.io/pvc-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-grafana namespace:monitoring] spec:map[accessModes:[ReadWriteOnce] resources:map[requests:map[storage:10Gi]] storageClassName:csi-disk volumeMode:Filesystem volumeName:cce-evs-grafana-pv]]
2022-04-13T09:49:30.102+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:30 [DEBUG] monitoring/cce-evs-grafana Unstructed YAML: map[apiVersion:v1 kind:PersistentVolumeClaim metadata:map[annotations:map[everest.io/disk-volume-type:SATA volume.beta.kubernetes.io/storage-provisioner:everest-csi-provisioner] finalizers:[kubernetes.io/pvc-protection] labels:map[failure-domain.beta.kubernetes.io/region:eu-de failure-domain.beta.kubernetes.io/zone:eu-de-01] name:cce-evs-grafana namespace:monitoring] spec:map[accessModes:[ReadWriteOnce] resources:map[requests:map[storage:10Gi]] storageClassName:csi-disk volumeMode:Filesystem volumeName:cce-evs-grafana-pv]]
2022-04-13T09:49:30.103+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.grafana_volume_pvc, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .force_new: planned value cty.False for a non-computed attribute
- .apply_only: planned value cty.False for a non-computed attribute
- .server_side_apply: planned value cty.False for a non-computed attribute
- .wait_for_rollout: planned value cty.True for a non-computed attribute
- .force_conflicts: planned value cty.False for a non-computed attribute
- .validate_schema: planned value cty.True for a non-computed attribute
helm_release.monitoring_prometheus: Refreshing state... [id=prometheus]
2022-04-13T09:49:30.107+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [resourceReleaseExists: prometheus] Start: timestamp=2022-04-13T09:49:30.107+0200
2022-04-13T09:49:30.107+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:30.107+0200
2022-04-13T09:49:30.108+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:30.108+0200
2022-04-13T09:49:30.108+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:30.108+0200
2022-04-13T09:49:30.108+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease wait for lock: timestamp=2022-04-13T09:49:30.108+0200
2022-04-13T09:49:30.108+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease got lock, started: timestamp=2022-04-13T09:49:30.108+0200
2022-04-13T09:49:30.108+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease post action created: timestamp=2022-04-13T09:49:30.108+0200
2022-04-13T09:49:30.248+0200 [INFO] provider.terraform-provider-opentelekomcloud_v1.29.0: 2022/04/13 09:49:30 [DEBUG] Retrieved loadbalancer 7b0ba8d1-13ae-4409-ae33-073712bbe251: &loadbalancers.LoadBalancer{Description:"", AdminStateUp:true, TenantID:"bb084a5f9a2642a2be3697eb197f17ad", ProvisioningStatus:"ACTIVE", VipAddress:"192.168.1.182", VipPortID:"8987d026-8578-403b-80b3-f4cf4e553df2", VipSubnetID:"f7a7ee1f-455c-4b40-9968-f17340c45140", ID:"7b0ba8d1-13ae-4409-ae33-073712bbe251", OperatingStatus:"ONLINE", Name:"dLS-test-cce-elb", Flavor:"", Provider:"vlb", Listeners:[]listeners.Listener{listeners.Listener{ID:"67b9c2af-ac8f-451f-bb43-ac9a1a870c31", TenantID:"", Name:"", Description:"", Protocol:"", ProtocolPort:0, DefaultPoolID:"", Loadbalancers:[]listeners.LoadBalancerID(nil), ConnLimit:0, Http2Enable:false, SniContainerRefs:[]string(nil), CAContainerRef:"", DefaultTlsContainerRef:"", TlsCiphersPolicy:"", AdminStateUp:false, Pools:[]pools.Pool(nil), L7Policies:[]l7policies.L7Policy(nil), ProvisioningStatus:""}, listeners.Listener{ID:"04cc991b-427b-43d4-afa6-3eb8c23a13e9", TenantID:"", Name:"", Description:"", Protocol:"", ProtocolPort:0, DefaultPoolID:"", Loadbalancers:[]listeners.LoadBalancerID(nil), ConnLimit:0, Http2Enable:false, SniContainerRefs:[]string(nil), CAContainerRef:"", DefaultTlsContainerRef:"", TlsCiphersPolicy:"", AdminStateUp:false, Pools:[]pools.Pool(nil), L7Policies:[]l7policies.L7Policy(nil), ProvisioningStatus:""}}, Pools:[]pools.Pool{pools.Pool{LBMethod:"", Protocol:"", Description:"", Listeners:[]pools.ListenerID(nil), Members:[]pools.Member(nil), MonitorID:"", SubnetID:"", TenantID:"", AdminStateUp:false, Name:"", ID:"a0897881-4a15-47d7-97db-3b176f84ad0c", Loadbalancers:[]pools.LoadBalancerID(nil), Persistence:pools.SessionPersistence{Type:"", CookieName:""}, Provider:"", Monitor:monitors.Monitor{ID:"", Name:"", TenantID:"", Type:"", Delay:0, DomainName:"", Timeout:0, MaxRetries:0, HTTPMethod:"", URLPath:"", ExpectedCodes:"", AdminStateUp:false, MonitorPort:0, Status:"", Pools:[]monitors.PoolID(nil), ProvisioningStatus:""}, ProvisioningStatus:""}, pools.Pool{LBMethod:"", Protocol:"", Description:"", Listeners:[]pools.ListenerID(nil), Members:[]pools.Member(nil), MonitorID:"", SubnetID:"", TenantID:"", AdminStateUp:false, Name:"", ID:"0fd45f89-04e3-423c-bd00-5123ba201f43", Loadbalancers:[]pools.LoadBalancerID(nil), Persistence:pools.SessionPersistence{Type:"", CookieName:""}, Provider:"", Monitor:monitors.Monitor{ID:"", Name:"", TenantID:"", Type:"", Delay:0, DomainName:"", Timeout:0, MaxRetries:0, HTTPMethod:"", URLPath:"", ExpectedCodes:"", AdminStateUp:false, MonitorPort:0, Status:"", Pools:[]monitors.PoolID(nil), ProvisioningStatus:""}, ProvisioningStatus:""}}}: timestamp=2022-04-13T09:49:30.247+0200
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease post run: timestamp=2022-04-13T09:49:30.451+0200
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease done: timestamp=2022-04-13T09:49:30.451+0200
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [resourceReleaseExists: prometheus] Done: timestamp=2022-04-13T09:49:30.451+0200
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [resourceReleaseRead: prometheus] Started: timestamp=2022-04-13T09:49:30.451+0200
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:30.451+0200
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:30.452+0200
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:30.452+0200
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease wait for lock: timestamp=2022-04-13T09:49:30.452+0200
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease got lock, started: timestamp=2022-04-13T09:49:30.452+0200
2022-04-13T09:49:30.452+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease post action created: timestamp=2022-04-13T09:49:30.452+0200
2022-04-13T09:49:30.509+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease post run: timestamp=2022-04-13T09:49:30.509+0200
2022-04-13T09:49:30.509+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] prometheus getRelease done: timestamp=2022-04-13T09:49:30.509+0200
2022-04-13T09:49:30.510+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [resourceReleaseRead: prometheus] Done: timestamp=2022-04-13T09:49:30.510+0200
2022-04-13T09:49:30.533+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [resourceDiff: prometheus] Start: timestamp=2022-04-13T09:49:30.533+0200
2022-04-13T09:49:30.533+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:30.533+0200
2022-04-13T09:49:30.533+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:30.533+0200
2022-04-13T09:49:30.533+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:30.533+0200
2022-04-13T09:49:30.695+0200 [WARN] Provider "registry.terraform.io/opentelekomcloud/opentelekomcloud" produced an invalid plan for opentelekomcloud_lb_loadbalancer_v2.cce_elb, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .description: planned value cty.StringVal("") for a non-computed attribute
- .admin_state_up: planned value cty.True for a non-computed attribute
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "var.application"
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "var.env"
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "var.env"
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "var.cce_ingress_bandwidth"
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "var.application"
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "var.env"
2022-04-13T09:49:30.695+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_vpc_eip_v1.cce_ingress_eip" references: []
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "kubectl_manifest.ingress_secret_docker_pull"
2022-04-13T09:49:30.695+0200 [INFO] ReferenceTransformer: reference not found: "var.cce_node_pool_initial_node_count"
2022-04-13T09:49:30.695+0200 [DEBUG] ReferenceTransformer: "helm_release.ingress_nginx" references: []
opentelekomcloud_vpc_eip_v1.cce_ingress_eip: Refreshing state... [id=0a16b98f-7297-4639-a35a-80fdcf4fb864]
helm_release.ingress_nginx: Refreshing state... [id=ingress-nginx]
2022-04-13T09:49:30.698+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:30 [DEBUG] [resourceReleaseExists: ingress-nginx] Start: timestamp=2022-04-13T09:49:30.698+0200
2022-04-13T09:49:31.278+0200 [WARN] Provider "registry.terraform.io/opentelekomcloud/opentelekomcloud" produced an invalid plan for opentelekomcloud_cce_node_pool_v3.cce_node_pool, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .root_volume[0].extend_param: planned value cty.StringVal("") for a non-computed attribute
- .data_volumes[0].extend_param: planned value cty.StringVal("") for a non-computed attribute
- .data_volumes[0].kms_id: planned value cty.StringVal("") for a non-computed attribute
2022-04-13T09:49:31.468+0200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2022-04-13T09:49:31.472+0200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/opentelekomcloud/opentelekomcloud/1.29.0/darwin_amd64/terraform-provider-opentelekomcloud_v1.29.0 pid=5226
2022-04-13T09:49:31.472+0200 [DEBUG] provider: plugin exited
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] [resourceDiff: prometheus] Got chart: timestamp=2022-04-13T09:49:32.953+0200
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:32.953+0200
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] [resourceDiff: prometheus] Release validated: timestamp=2022-04-13T09:49:32.953+0200
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] [resourceDiff: prometheus] Done: timestamp=2022-04-13T09:49:32.953+0200
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:32.953+0200
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:32.953+0200
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] ingress-nginx getRelease wait for lock: timestamp=2022-04-13T09:49:32.953+0200
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] ingress-nginx getRelease got lock, started: timestamp=2022-04-13T09:49:32.953+0200
2022-04-13T09:49:32.953+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:32 [DEBUG] ingress-nginx getRelease post action created: timestamp=2022-04-13T09:49:32.953+0200
2022-04-13T09:49:32.954+0200 [WARN] Provider "registry.terraform.io/hashicorp/helm" produced an invalid plan for helm_release.monitoring_prometheus, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .recreate_pods: planned value cty.False for a non-computed attribute
- .dependency_update: planned value cty.False for a non-computed attribute
- .max_history: planned value cty.NumberIntVal(0) for a non-computed attribute
- .verify: planned value cty.False for a non-computed attribute
- .force_update: planned value cty.False for a non-computed attribute
- .skip_crds: planned value cty.False for a non-computed attribute
- .wait: planned value cty.True for a non-computed attribute
- .disable_openapi_validation: planned value cty.False for a non-computed attribute
- .reset_values: planned value cty.False for a non-computed attribute
- .reuse_values: planned value cty.False for a non-computed attribute
- .cleanup_on_fail: planned value cty.False for a non-computed attribute
- .replace: planned value cty.False for a non-computed attribute
- .atomic: planned value cty.False for a non-computed attribute
- .render_subchart_notes: planned value cty.True for a non-computed attribute
- .wait_for_jobs: planned value cty.False for a non-computed attribute
- .create_namespace: planned value cty.False for a non-computed attribute
- .disable_crd_hooks: planned value cty.False for a non-computed attribute
- .disable_webhooks: planned value cty.False for a non-computed attribute
- .timeout: planned value cty.NumberIntVal(300) for a non-computed attribute
- .lint: planned value cty.False for a non-computed attribute
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] ingress-nginx getRelease post run: timestamp=2022-04-13T09:49:33.066+0200
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] ingress-nginx getRelease done: timestamp=2022-04-13T09:49:33.066+0200
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [resourceReleaseExists: ingress-nginx] Done: timestamp=2022-04-13T09:49:33.066+0200
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [resourceReleaseRead: ingress-nginx] Started: timestamp=2022-04-13T09:49:33.066+0200
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:33.066+0200
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:33.066+0200
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:33.066+0200
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] ingress-nginx getRelease wait for lock: timestamp=2022-04-13T09:49:33.066+0200
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] ingress-nginx getRelease got lock, started: timestamp=2022-04-13T09:49:33.066+0200
2022-04-13T09:49:33.066+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] ingress-nginx getRelease post action created: timestamp=2022-04-13T09:49:33.066+0200
2022-04-13T09:49:33.129+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] ingress-nginx getRelease post run: timestamp=2022-04-13T09:49:33.129+0200
2022-04-13T09:49:33.129+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] ingress-nginx getRelease done: timestamp=2022-04-13T09:49:33.129+0200
2022-04-13T09:49:33.129+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [resourceReleaseRead: ingress-nginx] Done: timestamp=2022-04-13T09:49:33.129+0200
2022-04-13T09:49:33.134+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [resourceDiff: ingress-nginx] Start: timestamp=2022-04-13T09:49:33.134+0200
2022-04-13T09:49:33.134+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:33.134+0200
2022-04-13T09:49:33.134+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:33.134+0200
2022-04-13T09:49:33.134+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:33 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:33.134+0200
2022-04-13T09:49:35.271+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceDiff: ingress-nginx] Got chart: timestamp=2022-04-13T09:49:35.271+0200
2022-04-13T09:49:35.271+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceDiff: ingress-nginx] Release validated: timestamp=2022-04-13T09:49:35.271+0200
2022-04-13T09:49:35.271+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceDiff: ingress-nginx] Done: timestamp=2022-04-13T09:49:35.271+0200
2022-04-13T09:49:35.272+0200 [WARN] Provider "registry.terraform.io/hashicorp/helm" produced an invalid plan for helm_release.ingress_nginx, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .lint: planned value cty.False for a non-computed attribute
- .timeout: planned value cty.NumberIntVal(300) for a non-computed attribute
- .dependency_update: planned value cty.False for a non-computed attribute
- .max_history: planned value cty.NumberIntVal(0) for a non-computed attribute
- .recreate_pods: planned value cty.False for a non-computed attribute
- .force_update: planned value cty.False for a non-computed attribute
- .skip_crds: planned value cty.False for a non-computed attribute
- .verify: planned value cty.False for a non-computed attribute
- .disable_openapi_validation: planned value cty.False for a non-computed attribute
- .reset_values: planned value cty.False for a non-computed attribute
- .wait: planned value cty.True for a non-computed attribute
- .cleanup_on_fail: planned value cty.False for a non-computed attribute
- .reuse_values: planned value cty.False for a non-computed attribute
- .atomic: planned value cty.False for a non-computed attribute
- .render_subchart_notes: planned value cty.True for a non-computed attribute
- .replace: planned value cty.False for a non-computed attribute
- .wait_for_jobs: planned value cty.False for a non-computed attribute
- .create_namespace: planned value cty.False for a non-computed attribute
- .disable_crd_hooks: planned value cty.False for a non-computed attribute
- .disable_webhooks: planned value cty.False for a non-computed attribute
2022-04-13T09:49:35.272+0200 [INFO] ReferenceTransformer: reference not found: "helm_release.ingress_nginx"
2022-04-13T09:49:35.272+0200 [DEBUG] ReferenceTransformer: "helm_release.ingress_certmanager" references: []
helm_release.ingress_certmanager: Refreshing state... [id=cert-manager]
2022-04-13T09:49:35.275+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceReleaseExists: cert-manager] Start: timestamp=2022-04-13T09:49:35.275+0200
2022-04-13T09:49:35.275+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:35.275+0200
2022-04-13T09:49:35.275+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:35.275+0200
2022-04-13T09:49:35.275+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:35.275+0200
2022-04-13T09:49:35.275+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease wait for lock: timestamp=2022-04-13T09:49:35.275+0200
2022-04-13T09:49:35.275+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease got lock, started: timestamp=2022-04-13T09:49:35.275+0200
2022-04-13T09:49:35.275+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease post action created: timestamp=2022-04-13T09:49:35.275+0200
2022-04-13T09:49:35.415+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease post run: timestamp=2022-04-13T09:49:35.415+0200
2022-04-13T09:49:35.415+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease done: timestamp=2022-04-13T09:49:35.415+0200
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceReleaseExists: cert-manager] Done: timestamp=2022-04-13T09:49:35.415+0200
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceReleaseRead: cert-manager] Started: timestamp=2022-04-13T09:49:35.415+0200
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:35.415+0200
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:35.416+0200
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:35.416+0200
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease wait for lock: timestamp=2022-04-13T09:49:35.416+0200
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease got lock, started: timestamp=2022-04-13T09:49:35.416+0200
2022-04-13T09:49:35.416+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease post action created: timestamp=2022-04-13T09:49:35.416+0200
2022-04-13T09:49:35.520+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease post run: timestamp=2022-04-13T09:49:35.520+0200
2022-04-13T09:49:35.520+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] cert-manager getRelease done: timestamp=2022-04-13T09:49:35.520+0200
2022-04-13T09:49:35.520+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceReleaseRead: cert-manager] Done: timestamp=2022-04-13T09:49:35.520+0200
2022-04-13T09:49:35.523+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [resourceDiff: cert-manager] Start: timestamp=2022-04-13T09:49:35.523+0200
2022-04-13T09:49:35.523+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2022-04-13T09:49:35.523+0200
2022-04-13T09:49:35.523+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [INFO] Successfully initialized kubernetes config: timestamp=2022-04-13T09:49:35.523+0200
2022-04-13T09:49:35.523+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:35 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2022-04-13T09:49:35.523+0200
2022-04-13T09:49:37.300+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:37 [DEBUG] [resourceDiff: cert-manager] Got chart: timestamp=2022-04-13T09:49:37.300+0200
2022-04-13T09:49:37.300+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:37 [DEBUG] [resourceDiff: cert-manager] Release validated: timestamp=2022-04-13T09:49:37.300+0200
2022-04-13T09:49:37.300+0200 [INFO] provider.terraform-provider-helm_v2.5.0_x5: 2022/04/13 09:49:37 [DEBUG] [resourceDiff: cert-manager] Done: timestamp=2022-04-13T09:49:37.300+0200
2022-04-13T09:49:37.300+0200 [WARN] Provider "registry.terraform.io/hashicorp/helm" produced an invalid plan for helm_release.ingress_certmanager, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .reuse_values: planned value cty.False for a non-computed attribute
- .cleanup_on_fail: planned value cty.False for a non-computed attribute
- .render_subchart_notes: planned value cty.True for a non-computed attribute
- .replace: planned value cty.False for a non-computed attribute
- .atomic: planned value cty.False for a non-computed attribute
- .disable_webhooks: planned value cty.False for a non-computed attribute
- .wait_for_jobs: planned value cty.False for a non-computed attribute
- .create_namespace: planned value cty.False for a non-computed attribute
- .disable_crd_hooks: planned value cty.False for a non-computed attribute
- .timeout: planned value cty.NumberIntVal(300) for a non-computed attribute
- .lint: planned value cty.False for a non-computed attribute
- .recreate_pods: planned value cty.False for a non-computed attribute
- .dependency_update: planned value cty.False for a non-computed attribute
- .max_history: planned value cty.NumberIntVal(0) for a non-computed attribute
- .skip_crds: planned value cty.False for a non-computed attribute
- .verify: planned value cty.False for a non-computed attribute
- .force_update: planned value cty.False for a non-computed attribute
- .reset_values: planned value cty.False for a non-computed attribute
- .wait: planned value cty.True for a non-computed attribute
- .disable_openapi_validation: planned value cty.False for a non-computed attribute
2022-04-13T09:49:37.301+0200 [INFO] ReferenceTransformer: reference not found: "helm_release.ingress_certmanager"
2022-04-13T09:49:37.301+0200 [INFO] ReferenceTransformer: reference not found: "var.letsencrypt_email"
2022-04-13T09:49:37.301+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.letsencrypt_staging_issuer" references: []
2022-04-13T09:49:37.301+0200 [INFO] ReferenceTransformer: reference not found: "helm_release.ingress_certmanager"
2022-04-13T09:49:37.301+0200 [INFO] ReferenceTransformer: reference not found: "var.letsencrypt_email"
2022-04-13T09:49:37.301+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.letsencrypt_prod_issuer" references: []
2022-04-13T09:49:37.301+0200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2022-04-13T09:49:37.335+0200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/helm/2.5.0/darwin_amd64/terraform-provider-helm_v2.5.0_x5 pid=5232
2022-04-13T09:49:37.335+0200 [DEBUG] provider: plugin exited
kubectl_manifest.letsencrypt_prod_issuer: Refreshing state... [id=/apis/cert-manager.io/v1/clusterissuers/letsencrypt-prod]
kubectl_manifest.letsencrypt_staging_issuer: Refreshing state... [id=/apis/cert-manager.io/v1/clusterissuers/letsencrypt-staging]
2022-04-13T09:49:37.336+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-staging Unstructed YAML: map[apiVersion:cert-manager.io/v1 kind:ClusterIssuer metadata:map[name:letsencrypt-staging namespace:ingress-nginx] spec:map[acme:map[email:simon.szustkowski@external.t-systems.com privateKeySecretRef:map[name:letsencrypt-staging-accountkey] server:https://acme-staging-v02.api.letsencrypt.org/directory solvers:[map[http01:map[ingress:map[class:nginx]]]]]]]
2022-04-13T09:49:37.336+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-prod Unstructed YAML: map[apiVersion:cert-manager.io/v1 kind:ClusterIssuer metadata:map[name:letsencrypt-prod namespace:ingress-nginx] spec:map[acme:map[email:simon.szustkowski@external.t-systems.com privateKeySecretRef:map[name:letsencrypt-prod-accountkey] server:https://acme-v02.api.letsencrypt.org/directory solvers:[map[http01:map[ingress:map[class:nginx]]]]]]]
2022-04-13T09:49:37.338+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-staging fetch from kubernetes
2022-04-13T09:49:37.338+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-prod fetch from kubernetes
2022-04-13T09:49:37.363+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [TRACE] yaml drift detected in /apis/cert-manager.io/v1/namespaces/ingress-nginx/clusterissuers/letsencrypt-staging for metadata.namespace, was ingress-nginx now blank
2022-04-13T09:49:37.366+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-staging Unstructed YAML: map[apiVersion:cert-manager.io/v1 kind:ClusterIssuer metadata:map[name:letsencrypt-staging namespace:ingress-nginx] spec:map[acme:map[email:simon.szustkowski@external.t-systems.com privateKeySecretRef:map[name:letsencrypt-staging-accountkey] server:https://acme-staging-v02.api.letsencrypt.org/directory solvers:[map[http01:map[ingress:map[class:nginx]]]]]]]
2022-04-13T09:49:37.366+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-staging Unstructed YAML: map[apiVersion:cert-manager.io/v1 kind:ClusterIssuer metadata:map[name:letsencrypt-staging namespace:ingress-nginx] spec:map[acme:map[email:simon.szustkowski@external.t-systems.com privateKeySecretRef:map[name:letsencrypt-staging-accountkey] server:https://acme-staging-v02.api.letsencrypt.org/directory solvers:[map[http01:map[ingress:map[class:nginx]]]]]]]
2022-04-13T09:49:37.366+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.letsencrypt_staging_issuer, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .force_new: planned value cty.False for a non-computed attribute
- .server_side_apply: planned value cty.False for a non-computed attribute
- .apply_only: planned value cty.False for a non-computed attribute
- .validate_schema: planned value cty.True for a non-computed attribute
- .wait_for_rollout: planned value cty.True for a non-computed attribute
- .force_conflicts: planned value cty.False for a non-computed attribute
2022-04-13T09:49:37.370+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [TRACE] yaml drift detected in /apis/cert-manager.io/v1/namespaces/ingress-nginx/clusterissuers/letsencrypt-prod for metadata.namespace, was ingress-nginx now blank
2022-04-13T09:49:37.373+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-prod Unstructed YAML: map[apiVersion:cert-manager.io/v1 kind:ClusterIssuer metadata:map[name:letsencrypt-prod namespace:ingress-nginx] spec:map[acme:map[email:simon.szustkowski@external.t-systems.com privateKeySecretRef:map[name:letsencrypt-prod-accountkey] server:https://acme-v02.api.letsencrypt.org/directory solvers:[map[http01:map[ingress:map[class:nginx]]]]]]]
2022-04-13T09:49:37.373+0200 [DEBUG] provider.terraform-provider-kubectl_v1.14.0: 2022/04/13 09:49:37 [DEBUG] ingress-nginx/letsencrypt-prod Unstructed YAML: map[apiVersion:cert-manager.io/v1 kind:ClusterIssuer metadata:map[name:letsencrypt-prod namespace:ingress-nginx] spec:map[acme:map[email:simon.szustkowski@external.t-systems.com privateKeySecretRef:map[name:letsencrypt-prod-accountkey] server:https://acme-v02.api.letsencrypt.org/directory solvers:[map[http01:map[ingress:map[class:nginx]]]]]]]
2022-04-13T09:49:37.373+0200 [WARN] Provider "registry.terraform.io/gavinbunney/kubectl" produced an invalid plan for kubectl_manifest.letsencrypt_prod_issuer, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .apply_only: planned value cty.False for a non-computed attribute
- .server_side_apply: planned value cty.False for a non-computed attribute
- .wait_for_rollout: planned value cty.True for a non-computed attribute
- .force_conflicts: planned value cty.False for a non-computed attribute
- .validate_schema: planned value cty.True for a non-computed attribute
- .force_new: planned value cty.False for a non-computed attribute
2022-04-13T09:49:37.374+0200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2022-04-13T09:49:37.377+0200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/gavinbunney/kubectl/1.14.0/darwin_amd64/terraform-provider-kubectl_v1.14.0 pid=5231
2022-04-13T09:49:37.377+0200 [DEBUG] provider: plugin exited
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
2022-04-13T09:49:37.378+0200 [DEBUG] command: asking for input: "\nDo you want to perform these actions?"
# opentelekomcloud_dns_recordset_v2.k8s_api_record will be created
+ resource "opentelekomcloud_dns_recordset_v2" "k8s_api_record" {
+ description = "The A record for the CCE k8s API"
+ id = (known after apply)
+ name = "k8s.test.cloud4log.dev"
+ records = [
+ "https://80.158.88.119:5443",
]
+ region = (known after apply)
+ shared = false
+ tags = {
+ "Application" = "dLS"
+ "Environment" = "test"
+ "Name" = "cloud4log-dev-test-k8s-api-record"
}
+ ttl = 3600
+ type = "A"
+ zone_id = "ff80808275f5fc0f018021c4af121480"
}
Plan: 1 to add, 0 to change, 0 to destroy.
Do you want to perform these actions?
Terraform will perform the actions described above.
Only 'yes' will be accepted to approve.
Enter a value: yes
2022-04-13T09:49:39.529+0200 [INFO] backend/local: apply calling Apply
2022-04-13T09:49:39.529+0200 [DEBUG] Building and walking apply graph for NormalMode plan
2022-04-13T09:49:39.532+0200 [DEBUG] Resource state not found for node "opentelekomcloud_dns_recordset_v2.k8s_api_record", instance opentelekomcloud_dns_recordset_v2.k8s_api_record
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.prometheus_volume_pv (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_evs_volume_v3.prometheus_volume (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.fluentd_serviceaccount (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.grafana_volume_pvc (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_vpc_subnet_v1.subnet (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_networking_secgroup_rule_v2.css_rule_inbound_icmp (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_compute_keypair_v2.cce_node_keypair (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "helm_release.monitoring_prometheus (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/helm"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.monitoring_secret_docker_pull (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubernetes_namespace.ingress_namespace (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/kubernetes"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.grafana_volume_pv (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "data.template_file.kubeconfig (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/template"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_evs_volume_v3.grafana_volume (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_lb_loadbalancer_v2.cce_elb (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.letsencrypt_staging_issuer (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_vpc_eip_v1.cce_cli_eip (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_cce_node_pool_v3.cce_node_pool (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_css_cluster_v1.css (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "helm_release.ingress_nginx (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/helm"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "local_sensitive_file.privkey (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/local"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_dns_zone_v2.public_dns (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.fluentd-clusterrolebinding (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_cce_addon_v3.cce_autoscaler_addon (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "helm_release.ingress_certmanager (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/helm"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_cce_cluster_v3.cce (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.fluentd-daemonset (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.prometheus_volume_pvc (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "local_sensitive_file.kubeconfig (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/local"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_networking_secgroup_v2.css_secgroup (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.ingress_secret_docker_pull (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_networking_secgroup_rule_v2.css_rule_css_inbound_9200 (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.letsencrypt_prod_issuer (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_vpc_v1.vpc (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.fluentd_clusterrole (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubectl_manifest.monitoring_secret_basic_auth (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/gavinbunney/kubectl"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "kubernetes_namespace.monitoring_namespace (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/kubernetes"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "random_password.css_admin_password (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/random"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_dns_recordset_v2.k8s_api_record (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_dns_recordset_v2.k8s_api_record" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_vpc_eip_v1.cce_ingress_eip (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.534+0200 [DEBUG] ProviderTransformer: "opentelekomcloud_networking_secgroup_rule_v2.css_rule_inbound_9300 (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/opentelekomcloud/opentelekomcloud"]
2022-04-13T09:49:39.535+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_initial_node_count" references: []
2022-04-13T09:49:39.535+0200 [DEBUG] ReferenceTransformer: "var.env" references: []
2022-04-13T09:49:39.535+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_root_volumetype" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_vpc_eip_v1.cce_ingress_eip (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.letsencrypt_prod_issuer (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.prometheus_volume_pvc (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_vpc_v1.vpc (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "output.dns_info" references: [var.env var.dns_domain]
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/kubernetes\"]" references: [opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand)]
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_networking_secgroup_rule_v2.css_rule_inbound_icmp (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.grafana_volume_size" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_max_node_count" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/helm\"]" references: [opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand)]
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_networking_secgroup_v2.css_secgroup (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.ingress_secret_docker_pull (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.domain_name" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_subnet_cidr" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "output.css_indexpattern_notify" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_dns_zone_v2.public_dns (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.css_flavor" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/gavinbunney/kubectl\"]" references: [opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand)]
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.fluentd-clusterrolebinding (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "local_sensitive_file.kubeconfig (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.fluentd_serviceaccount (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_subnet_gateway_ip" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_min_node_count" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.OTC_ACCESS_KEY" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_cce_node_pool_v3.cce_node_pool (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "helm_release.ingress_nginx (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_cce_addon_v3.cce_autoscaler_addon (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_data_volumetype" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_flavor" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "output.cce_ingress_ip_address" references: [opentelekomcloud_vpc_eip_v1.cce_ingress_eip (expand)]
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_networking_secgroup_rule_v2.css_rule_inbound_9300 (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_css_cluster_v1.css (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.fluentd_clusterrole (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.monitoring_secret_basic_auth (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.grafana_volume_pv (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.application" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubernetes_namespace.monitoring_namespace (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.grafana_volume_pvc (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_scale_down_cooldown_time" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.OTC_SECRET_KEY" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.letsencrypt_email" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_ingress_bandwidth" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_compute_keypair_v2.cce_node_keypair (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_evs_volume_v3.grafana_volume (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.prometheus_volume_pv (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.css_volume_size" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.dns_admin_email" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.dns_domain" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.vpc_cidr" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_lb_loadbalancer_v2.cce_elb (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "helm_release.ingress_certmanager (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_evs_volume_v3.prometheus_volume (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "data.template_file.kubeconfig (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_root_volume_size" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.prometheus_volume_size" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "output.cce_cli_ip_address" references: [opentelekomcloud_vpc_eip_v1.cce_cli_eip (expand)]
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_data_volumes_size" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/local\"]" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "helm_release.monitoring_prometheus (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "random_password.css_admin_password (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.monitoring_secret_docker_pull (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_cce_cluster_v3.cce (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_dns_recordset_v2.k8s_api_record (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_availability_zone" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/random\"]" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "local_sensitive_file.privkey (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.letsencrypt_staging_issuer (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "var.tenant_name" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "kubectl_manifest.fluentd-daemonset (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_vpc_subnet_v1.subnet (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_vpc_eip_v1.cce_cli_eip (expand)" references: []
2022-04-13T09:49:39.536+0200 [DEBUG] ReferenceTransformer: "output.css_admin_password" references: [random_password.css_admin_password (expand)]
2022-04-13T09:49:39.537+0200 [INFO] ReferenceTransformer: reference not found: "opentelekomcloud_cce_cluster_v3.cce#destroy"
2022-04-13T09:49:39.537+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_dns_recordset_v2.k8s_api_record" references: [opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_cce_cluster_v3.cce (expand) opentelekomcloud_dns_zone_v2.public_dns (expand) var.dns_domain var.env var.application var.env var.env var.dns_domain]
2022-04-13T09:49:39.537+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/template\"]" references: []
2022-04-13T09:49:39.537+0200 [DEBUG] ReferenceTransformer: "opentelekomcloud_networking_secgroup_rule_v2.css_rule_css_inbound_9200 (expand)" references: []
2022-04-13T09:49:39.537+0200 [DEBUG] ReferenceTransformer: "kubernetes_namespace.ingress_namespace (expand)" references: []
2022-04-13T09:49:39.537+0200 [DEBUG] ReferenceTransformer: "var.cce_node_pool_flavor" references: []
2022-04-13T09:49:39.537+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/opentelekomcloud/opentelekomcloud\"]" references: [var.OTC_SECRET_KEY var.domain_name var.tenant_name var.OTC_ACCESS_KEY]
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: helm_release.ingress_nginx (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_cce_addon_v3.cce_autoscaler_addon (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_cce_node_pool_v3.cce_node_pool (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_css_cluster_v1.css (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.fluentd_clusterrole (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.monitoring_secret_basic_auth (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.grafana_volume_pv (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_networking_secgroup_rule_v2.css_rule_inbound_9300 (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.grafana_volume_pvc (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubernetes_namespace.monitoring_namespace (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_evs_volume_v3.grafana_volume (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.prometheus_volume_pv (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_compute_keypair_v2.cce_node_keypair (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: helm_release.ingress_certmanager (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_evs_volume_v3.prometheus_volume (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: data.template_file.kubeconfig (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_lb_loadbalancer_v2.cce_elb (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: random_password.css_admin_password (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.monitoring_secret_docker_pull (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: helm_release.monitoring_prometheus (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: provider["registry.terraform.io/hashicorp/random"] is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.letsencrypt_staging_issuer (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: local_sensitive_file.privkey (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_vpc_subnet_v1.subnet (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_vpc_eip_v1.cce_cli_eip (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: provider["registry.terraform.io/hashicorp/template"] is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.fluentd-daemonset (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubernetes_namespace.ingress_namespace (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.fluentd-clusterrolebinding (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.fluentd_serviceaccount (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: local_sensitive_file.kubeconfig (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_networking_secgroup_v2.css_secgroup (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.ingress_secret_docker_pull (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_networking_secgroup_rule_v2.css_rule_inbound_icmp (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: provider["registry.terraform.io/hashicorp/helm"] is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_vpc_eip_v1.cce_ingress_eip (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: provider["registry.terraform.io/hashicorp/local"] is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: provider["registry.terraform.io/hashicorp/kubernetes"] is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_vpc_v1.vpc (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: opentelekomcloud_networking_secgroup_rule_v2.css_rule_css_inbound_9200 (expand) is no longer needed, removing
2022-04-13T09:49:39.538+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.letsencrypt_prod_issuer (expand) is no longer needed, removing
2022-04-13T09:49:39.539+0200 [DEBUG] pruneUnusedNodes: kubectl_manifest.prometheus_volume_pvc (expand) is no longer needed, removing
2022-04-13T09:49:39.539+0200 [DEBUG] pruneUnusedNodes: provider["registry.terraform.io/gavinbunney/kubectl"] is no longer needed, removing
2022-04-13T09:49:39.540+0200 [DEBUG] Starting graph walk: walkApply
2022-04-13T09:49:39.546+0200 [DEBUG] created provider logger: level=debug
2022-04-13T09:49:39.546+0200 [INFO] provider: configuring client automatic mTLS
2022-04-13T09:49:39.563+0200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/opentelekomcloud/opentelekomcloud/1.29.0/darwin_amd64/terraform-provider-opentelekomcloud_v1.29.0 args=[.terraform/providers/registry.terraform.io/opentelekomcloud/opentelekomcloud/1.29.0/darwin_amd64/terraform-provider-opentelekomcloud_v1.29.0]
2022-04-13T09:49:39.568+0200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/opentelekomcloud/opentelekomcloud/1.29.0/darwin_amd64/terraform-provider-opentelekomcloud_v1.29.0 pid=5240
2022-04-13T09:49:39.569+0200 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/opentelekomcloud/opentelekomcloud/1.29.0/darwin_amd64/terraform-provider-opentelekomcloud_v1.29.0
2022-04-13T09:49:39.585+0200 [INFO] provider.terraform-provider-opentelekomcloud_v1.29.0: configuring server automatic mTLS: timestamp=2022-04-13T09:49:39.584+0200
2022-04-13T09:49:39.619+0200 [DEBUG] provider.terraform-provider-opentelekomcloud_v1.29.0: plugin address: address=/var/folders/9x/_9sr4dkx4s133y82cbvmzfqr0000gn/T/plugin205929039 network=unix timestamp=2022-04-13T09:49:39.619+0200
2022-04-13T09:49:39.619+0200 [DEBUG] provider: using plugin: version=5
2022-04-13T09:49:39.677+0200 [WARN] ValidateProviderConfig from "provider[\"registry.terraform.io/opentelekomcloud/opentelekomcloud\"]" changed the config value, but that value is unused
2022-04-13T09:49:41.046+0200 [INFO] provider.terraform-provider-opentelekomcloud_v1.29.0: 2022/04/13 09:49:41 [INFO] Building Swift S3 auth structure: timestamp=2022-04-13T09:49:41.046+0200
2022-04-13T09:49:41.046+0200 [INFO] provider.terraform-provider-opentelekomcloud_v1.29.0: 2022/04/13 09:49:41 [INFO] Setting AWS metadata API timeout to 100ms: timestamp=2022-04-13T09:49:41.046+0200
2022-04-13T09:49:42.475+0200 [INFO] provider.terraform-provider-opentelekomcloud_v1.29.0: 2022/04/13 09:49:42 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id: timestamp=2022-04-13T09:49:42.474+0200
2022-04-13T09:49:42.475+0200 [INFO] provider.terraform-provider-opentelekomcloud_v1.29.0: 2022/04/13 09:49:42 [INFO] Swift S3 Auth provider used: "StaticProvider": timestamp=2022-04-13T09:49:42.475+0200
opentelekomcloud_dns_recordset_v2.k8s_api_record: Creating...
2022-04-13T09:49:43.019+0200 [INFO] Starting apply for opentelekomcloud_dns_recordset_v2.k8s_api_record
2022-04-13T09:49:43.020+0200 [DEBUG] opentelekomcloud_dns_recordset_v2.k8s_api_record: applying the planned Create change
2022-04-13T09:49:43.021+0200 [INFO] provider.terraform-provider-opentelekomcloud_v1.29.0: 2022/04/13 09:49:43 [DEBUG] Create Options: dns.RecordSetCreateOpts{CreateOpts:recordsets.CreateOpts{Name:"k8s.test.cloud4log.dev", Description:"The A record for the CCE k8s API", Records:[]string{"https://80.158.88.119:5443"}, TTL:3600, Type:"A"}, ValueSpecs:map[string]string{}}: timestamp=2022-04-13T09:49:43.021+0200
2022-04-13T09:49:43.306+0200 [ERROR] vertex "opentelekomcloud_dns_recordset_v2.k8s_api_record" error: error creating OpenTelekomCloud DNS record set: Bad request with: [POST https://dns.eu-de.otc.t-systems.com/v2/zones/ff80808275f5fc0f018021c4af121480/recordsets], error message: {"code":"DNS.0308","message":"Attribute 'records' is invalid. When type is 'A', records should be ipv4 address list."}
│ Error: error creating OpenTelekomCloud DNS record set: Bad request with: [POST https://dns.eu-de.otc.t-systems.com/v2/zones/ff80808275f5fc0f018021c4af121480/recordsets], error message: {"code":"DNS.0308","message":"Attribute 'records' is invalid. When type is 'A', records should be ipv4 address list."}
│ with opentelekomcloud_dns_recordset_v2.k8s_api_record,
│ on dns.tf line 14, in resource "opentelekomcloud_dns_recordset_v2" "k8s_api_record":
│ 14: resource "opentelekomcloud_dns_recordset_v2" "k8s_api_record" {
2022-04-13T09:49:43.345+0200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2022-04-13T09:49:43.348+0200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/opentelekomcloud/opentelekomcloud/1.29.0/darwin_amd64/terraform-provider-opentelekomcloud_v1.29.0 pid=5240
2022-04-13T09:49:43.348+0200 [DEBUG] provider: plugin exited
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment