Created
September 27, 2021 22:43
-
-
Save DutchEllie/20f3875ee8ff203ef1f7af3f185f6ef2 to your computer and use it in GitHub Desktop.
tf debug info
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
-----------------------------------------------------: timestamp=2021-09-27T11:58:43.730Z | |
2021-09-27T11:58:43.730Z [INFO] provider.terraform-provider-aws_v3.58.0_x5: 2021/09/27 11:58:43 [DEBUG] [aws-sdk-go] <AddRoleToInstanceProfileResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ResponseMetadata> | |
<RequestId>328eada8-9f6f-428d-9729-c79e03b13e96</RequestId> | |
</ResponseMetadata> | |
</AddRoleToInstanceProfileResponse>: timestamp=2021-09-27T11:58:43.730Z | |
2021-09-27T11:58:43.734Z [TRACE] NodeAbstractResouceInstance.writeResourceInstanceState to workingState for module.mastercluster.aws_iam_instance_profile.workers[0] | |
2021-09-27T11:58:43.735Z [TRACE] NodeAbstractResouceInstance.writeResourceInstanceState: writing state object for module.mastercluster.aws_iam_instance_profile.workers[0] | |
2021-09-27T11:58:43.736Z [TRACE] NodeAbstractResouceInstance.writeResourceInstanceState to workingState for module.mastercluster.aws_iam_instance_profile.workers[0] | |
2021-09-27T11:58:43.736Z [TRACE] NodeAbstractResouceInstance.writeResourceInstanceState: writing state object for module.mastercluster.aws_iam_instance_profile.workers[0] | |
[0m[1mmodule.mastercluster.aws_iam_instance_profile.workers[0]: Creation complete after 1s [id=mastercluster][0m | |
2021-09-27T11:58:43.740Z [TRACE] vertex "module.mastercluster.aws_iam_instance_profile.workers[0]": visit complete | |
2021-09-27T11:58:43.741Z [TRACE] vertex "module.mastercluster.aws_launch_configuration.workers[0]": starting visit (*terraform.NodeApplyableResourceInstance) | |
2021-09-27T11:58:43.742Z [TRACE] readDiff: Read Create change from plan for module.mastercluster.aws_launch_configuration.workers[0] | |
2021-09-27T11:58:43.742Z [TRACE] readResourceInstanceState: reading state for module.mastercluster.aws_launch_configuration.workers[0] | |
2021-09-27T11:58:43.742Z [TRACE] readResourceInstanceState: no state present for module.mastercluster.aws_launch_configuration.workers[0] | |
2021-09-27T11:58:43.743Z [TRACE] vertex "module.mastercluster.local.auth_worker_roles (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021-09-27T11:58:43.743Z [TRACE] vertex "module.mastercluster.local.auth_worker_roles (expand)": expanding dynamic subgraph | |
2021-09-27T11:58:43.743Z [TRACE] Expanding local: adding module.mastercluster.local.auth_worker_roles as *terraform.NodeLocal | |
2021-09-27T11:58:43.744Z [TRACE] vertex "module.mastercluster.local.auth_worker_roles (expand)": entering dynamic subgraph | |
2021-09-27T11:58:43.744Z [TRACE] readDiff: Read Create change from plan for module.mastercluster.aws_launch_configuration.workers[0] | |
2021-09-27T11:58:43.745Z [TRACE] vertex "module.mastercluster.local.auth_worker_roles": starting visit (*terraform.NodeLocal) | |
2021-09-27T11:58:43.750Z [TRACE] vertex "module.mastercluster.local.auth_worker_roles": visit complete | |
2021-09-27T11:58:43.750Z [TRACE] vertex "module.mastercluster.local.auth_worker_roles (expand)": dynamic subgraph completed successfully | |
2021-09-27T11:58:43.750Z [TRACE] vertex "module.mastercluster.local.auth_worker_roles (expand)": visit complete | |
2021-09-27T11:58:43.752Z [TRACE] vertex "module.mastercluster.local.configmap_roles (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021-09-27T11:58:43.753Z [TRACE] vertex "module.mastercluster.local.configmap_roles (expand)": expanding dynamic subgraph | |
2021-09-27T11:58:43.753Z [TRACE] Expanding local: adding module.mastercluster.local.configmap_roles as *terraform.NodeLocal | |
2021-09-27T11:58:43.754Z [TRACE] vertex "module.mastercluster.local.configmap_roles (expand)": entering dynamic subgraph | |
2021-09-27T11:58:43.755Z [TRACE] vertex "module.mastercluster.local.configmap_roles": starting visit (*terraform.NodeLocal) | |
2021-09-27T11:58:43.758Z [TRACE] Re-validating config for "module.mastercluster.aws_launch_configuration.workers[0]" | |
2021-09-27T11:58:43.759Z [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-09-27T11:58:43.760Z [TRACE] vertex "module.mastercluster.local.configmap_roles": visit complete | |
2021-09-27T11:58:43.761Z [TRACE] vertex "module.mastercluster.local.configmap_roles (expand)": dynamic subgraph completed successfully | |
2021-09-27T11:58:43.761Z [TRACE] vertex "module.mastercluster.local.configmap_roles (expand)": visit complete | |
2021-09-27T11:58:43.762Z [TRACE] vertex "module.mastercluster.kubernetes_config_map.aws_auth[0]": starting visit (*terraform.NodeApplyableResourceInstance) | |
2021-09-27T11:58:43.763Z [TRACE] readDiff: Read Create change from plan for module.mastercluster.kubernetes_config_map.aws_auth[0] | |
2021-09-27T11:58:43.764Z [TRACE] readResourceInstanceState: reading state for module.mastercluster.kubernetes_config_map.aws_auth[0] | |
2021-09-27T11:58:43.765Z [TRACE] readResourceInstanceState: no state present for module.mastercluster.kubernetes_config_map.aws_auth[0] | |
2021-09-27T11:58:43.767Z [TRACE] readDiff: Read Create change from plan for module.mastercluster.kubernetes_config_map.aws_auth[0] | |
2021-09-27T11:58:43.770Z [TRACE] Re-validating config for "module.mastercluster.kubernetes_config_map.aws_auth[0]" | |
2021-09-27T11:58:43.768Z [TRACE] GRPCProvider: PlanResourceChange | |
2021-09-27T11:58:43.767Z [INFO] provider.terraform-provider-aws_v3.58.0_x5: 2021/09/27 11:58:43 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-09-27T11:58:43.767Z | |
2021-09-27T11:58:43.771Z [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-09-27T11:58:43.774Z [TRACE] GRPCProvider: PlanResourceChange | |
2021-09-27T11:58:43.779Z [TRACE] checkPlannedChange: Verifying that actual change (action Create) matches planned change (action Create) | |
2021-09-27T11:58:43.780Z [TRACE] readResourceInstanceState: reading state for module.mastercluster.kubernetes_config_map.aws_auth[0] | |
2021-09-27T11:58:43.780Z [TRACE] readResourceInstanceState: no state present for module.mastercluster.kubernetes_config_map.aws_auth[0] | |
2021-09-27T11:58:43.781Z [INFO] Starting apply for module.mastercluster.kubernetes_config_map.aws_auth[0] | |
[0m[1mmodule.mastercluster.kubernetes_config_map.aws_auth[0]: Creating...[0m[0m | |
2021-09-27T11:58:43.783Z [DEBUG] module.mastercluster.kubernetes_config_map.aws_auth[0]: applying the planned Create change | |
2021-09-27T11:58:43.783Z [TRACE] GRPCProvider: ApplyResourceChange | |
2021-09-27T11:58:43.787Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: 2021/09/27 11:58:43 [INFO] Creating new config map: v1.ConfigMap{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"aws-auth", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:v1.Time{Time:time.Time{wall:0x0, ext:0, loc:(*time.Location)(nil)}}, DeletionTimestamp:(*v1.Time)(nil), DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/managed-by":"Terraform", "terraform.io/module":"terraform-aws-modules.eks.aws"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Immutable:(*bool)(nil), Data:map[string]string{"mapAccounts":"[]\n", "mapRoles":"- \"groups\":\n - \"system:bootstrappers\"\n - \"system:nodes\"\n \"rolearn\": \"arn:aws:iam::accountid:role/mastercluster\"\n \"username\": \"system:node:{{EC2PrivateDNSName}}\"\n", "mapUsers":"[]\n"}, BinaryData:map[string][]uint8{}} | |
2021-09-27T11:58:43.787Z [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for module.mastercluster.aws_launch_configuration.workers[0], but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .ebs_block_device: attribute representing nested block must not be unknown itself; set nested attribute values to unknown instead | |
2021-09-27T11:58:43.789Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: 2021/09/27 11:58:43 [DEBUG] Kubernetes API Request Details: | |
2021-09-27T11:58:43.789Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: ---[ REQUEST ]--------------------------------------- | |
2021-09-27T11:58:43.789Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: POST /api/v1/namespaces/kube-system/configmaps HTTP/1.1 | |
2021-09-27T11:58:43.789Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: Host: localhost | |
2021-09-27T11:58:43.789Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: User-Agent: HashiCorp/1.0 Terraform/1.0.3 | |
2021-09-27T11:58:43.789Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: Content-Length: 504 | |
2021-09-27T11:58:43.789Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: Accept: application/json, */* | |
2021-09-27T11:58:43.789Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: Content-Type: application/json | |
2021-09-27T11:58:43.789Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: Accept-Encoding: gzip | |
2021-09-27T11:58:43.789Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: | |
2021-09-27T11:58:43.789Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: { | |
2021-09-27T11:58:43.790Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: "kind": "ConfigMap", | |
2021-09-27T11:58:43.790Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: "apiVersion": "v1", | |
2021-09-27T11:58:43.790Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: "metadata": { | |
2021-09-27T11:58:43.790Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: "name": "aws-auth", | |
2021-09-27T11:58:43.790Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: "namespace": "kube-system", | |
2021-09-27T11:58:43.790Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: "creationTimestamp": null, | |
2021-09-27T11:58:43.790Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: "labels": { | |
2021-09-27T11:58:43.790Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: "app.kubernetes.io/managed-by": "Terraform", | |
2021-09-27T11:58:43.791Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: "terraform.io/module": "terraform-aws-modules.eks.aws" | |
2021-09-27T11:58:43.791Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: } | |
2021-09-27T11:58:43.792Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: }, | |
2021-09-27T11:58:43.792Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: "data": { | |
2021-09-27T11:58:43.792Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: "mapAccounts": "[]\n", | |
2021-09-27T11:58:43.792Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: "mapRoles": "- \"groups\":\n - \"system:bootstrappers\"\n - \"system:nodes\"\n \"rolearn\": \"arn:aws:iam::accountid:role/mastercluster\"\n \"username\": \"system:node:{{EC2PrivateDNSName}}\"\n", | |
2021-09-27T11:58:43.792Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: "mapUsers": "[]\n" | |
2021-09-27T11:58:43.792Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: } | |
2021-09-27T11:58:43.792Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: } | |
2021-09-27T11:58:43.792Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: | |
2021-09-27T11:58:43.792Z [DEBUG] provider.terraform-provider-kubernetes_v2.5.0_x5: ----------------------------------------------------- |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment