hashicorp / terraform

Terraform enables you to safely and predictably create, change, and improve infrastructure. It is a source-available tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned.
https://www.terraform.io
Other
42.79k stars 9.56k forks source link

Terraform crashed while setting UP tanzu tas env #33373

Closed swastik7853 closed 1 year ago

swastik7853 commented 1 year ago

Terraform Version

Terraform v0.11.15
+ provider.google v1.20.0
+ provider.random v2.3.1
+ provider.template v2.2.0
+ provider.tls v2.2.0

Your version of Terraform is out of date! The latest version
is 1.5.0. You can update by downloading from www.terraform.io/downloads.html

Terraform Configuration Files

cat variables.tf variable "project" { type = "string" }

variable "env_name" { type = "string" }

variable "region" { type = "string" }

variable "buckets_location" { type = "string" default = "US" }

variable "global_lb" { description = "Use global load balancers for CF instead regional load balancers" default = 1 }

variable "infrastructure_cidr" { type = "string" description = "cidr for infrastructure subnet" default = "10.0.0.0/26" }

variable "pas_cidr" { type = "string" description = "cidr for pas subnet" default = "10.0.4.0/24" }

variable "services_cidr" { type = "string" description = "cidr for services subnet" default = "10.0.8.0/24" }

variable "zones" { type = "list" }

variable "opsman_image_url" { type = "string" description = "Location of ops manager image on google cloud storage" }

variable "optional_opsman_image_url" { type = "string" description = "Location of ops manager image (to be used for optional extra instance) on google cloud storage" default = "" }

variable "opsman_machine_type" { type = "string" default = "n1-standard-2" }

variable "service_account_key" { type = "string" }

variable "dns_suffix" { type = "string" description = "Domain to add environment subdomain to (e.g. foo.example.com). Trailing dots are not supported." }

variable "ssl_cert" { type = "string" description = "The contents of an SSL certificate to be used by the LB, optional if ssl_ca_cert is provided" default = "" }

variable "ssl_private_key" { type = "string" description = "The contents of an SSL private key to be used by the LB, optional if ssl_ca_cert is provided" default = "" }

variable "ssl_ca_cert" { type = "string" description = "The contents of a CA public key to be used to sign the generated LB certificate, optional if ssl_cert is provided" default = "" }

variable "ssl_ca_private_key" { type = "string" description = "the contents of a CA private key to be used to sign the generated LB certificate, optional if ssl_cert is provided" default = "" }

variable "create_iam_service_account_members" { description = "If set to true, create an IAM Service Account project roles" default = true }

variable "external_database" { description = "Stands up a cloud SQL database instance for the Ops Manager and PAS" default = false }

variable "internetless" { description = "When set to true, all traffic going outside the 10.* network is denied." default = false }

///** // OpsMan Options // **/

variable "opsman_storage_bucket_count" { type = "string" description = "Optional configuration of a Google Storage Bucket for BOSH's blobstore" default = "0" }

variable "pas_sql_db_host" { type = "string" description = "The host the user can connect from." default = "" }

variable "opsman_sql_db_host" { type = "string" description = "The host the user can connect from." default = "" }

/*****

variable "isolation_segment" { description = "create the required infrastructure to deploy isolation segment" default = false }

variable "iso_seg_with_firewalls" { description = "create firewalls to lock down ports on the isolation segment" default = false }

variable "iso_seg_ssl_cert" { type = "string" description = "the contents of an SSL certificate to be used by the LB, optional if iso_seg_ssl_ca_cert is provided" default = "" }

variable "iso_seg_ssl_private_key" { type = "string" description = "The contents of an SSL private key to be used by the LB, optional if iso_seg_ssl_ca_cert is provided" default = "" }

variable "iso_seg_ssl_ca_cert" { type = "string" description = "The contents of a CA public key to be used to sign the generated iso seg LB certificate, optional if iso_seg_ssl_cert is provided" default = "" }

variable "iso_seg_ssl_ca_private_key" { type = "string" description = "The contents of a CA private key to be used to sign the generated iso seg LB certificate, optional if iso_seg_ssl_cert is provided" default = "" }

variable "iso_seg_replicated_suffix" { type = "string" description = "If you are using the tile replicator CLI, set this variable to match the replicated suffix. Will be used to set networking firewall rules." default = "-replicated" }

/*****

variable "create_gcs_buckets" { description = "Create Google Storage Buckets for Elastic Runtime Cloud Controller's file storage" default = true }

variable "create_blobstore_service_account_key" { description = "Create a scoped service account key for gcs storage access" default = true }

/***

variable "jumpbox_init_script" { description = "Path to the script for initiliazing the jumpbox vm." default = "" }

cat main.tf provider "google" { project = "${var.project}" region = "${var.region}" credentials = "${var.service_account_key}"

version = "~> 1.20" }

terraform { required_version = "< 0.12.0" }

module "infra" { source = "../modules/infra"

project = "${var.project}" env_name = "${var.env_name}" region = "${var.region}" infrastructure_cidr = "${var.infrastructure_cidr}" internetless = "${var.internetless}" create_blobstore_service_account_key = "${var.create_blobstore_service_account_key}" internal_access_source_ranges = ["${var.pas_cidr}", "${var.services_cidr}"] root_domain = "${var.env_name}.${var.dns_suffix}" }

module "ops_manager" { source = "../modules/ops_manager"

project = "${var.project}" env_name = "${var.env_name}" zones = "${var.zones}"

opsman_storage_bucket_count = "${var.opsman_storage_bucket_count}"

opsman_machine_type = "${var.opsman_machine_type}" opsman_image_url = "${var.opsman_image_url}" optional_opsman_image_url = "${var.optional_opsman_image_url}" create_iam_service_account_members = "${var.create_iam_service_account_members}"

pcf_network_name = "${module.infra.network}" subnet = "${module.infra.subnet}"

dns_zone_name = "${module.infra.dns_zone_name}" dns_zone_dns_name = "${module.infra.dns_zone_dns_name}"

external_database = "${var.external_database}" sql_instance = "${module.external_database.sql_instance}" opsman_sql_db_host = "${var.opsman_sql_db_host}" }

module "pas_certs" { source = "../modules/certs"

subdomains = [".apps", ".sys", ".login.sys", ".uaa.sys"] env_name = "${var.env_name}" dns_suffix = "${var.dns_suffix}" resource_name = "pas-lbcert"

ssl_cert = "${var.ssl_cert}" ssl_private_key = "${var.ssl_private_key}" ssl_ca_cert = "${var.ssl_ca_cert}" ssl_ca_private_key = "${var.ssl_ca_private_key}" }

module "pas" { source = "../modules/pas"

project = "${var.project}" env_name = "${var.env_name}" region = "${var.region}" zones = "${var.zones}" pas_cidr = "${var.pas_cidr}" services_cidr = "${var.services_cidr}" internetless = "${var.internetless}" global_lb = "${var.global_lb}" create_gcs_buckets = "${var.create_gcs_buckets}" buckets_location = "${var.buckets_location}"

network = "${module.infra.network}" dns_zone_name = "${module.infra.dns_zone_name}" dns_zone_dns_name = "${module.infra.dns_zone_dns_name}" ssl_certificate = "${module.pas_certs.ssl_certificate}"

isoseg_lb_name = "${module.isolation_segment.load_balancer_name}" external_database = "${var.external_database}" sql_instance = "${module.external_database.sql_instance}" pas_sql_db_host = "${var.pas_sql_db_host}" }

Optional

module "isoseg_certs" { source = "../modules/certs"

subdomains = ["*.iso"] env_name = "${var.env_name}" dns_suffix = "${var.dns_suffix}" resource_name = "isoseg-lbcert"

ssl_cert = "${var.iso_seg_ssl_cert}" ssl_private_key = "${var.iso_seg_ssl_private_key}" ssl_ca_cert = "${var.iso_seg_ssl_ca_cert}" ssl_ca_private_key = "${var.iso_seg_ssl_ca_private_key}" }

module "isolation_segment" { source = "../modules/isolation_segment"

count = "${var.isolation_segment}"

env_name = "${var.env_name}" zones = "${var.zones}" internetless = "${var.internetless}" dns_zone_dns_name = "${var.env_name}.${var.dns_suffix}" with_firewalls = "${var.iso_seg_with_firewalls}"

network = "${module.infra.network}" dns_zone_name = "${module.infra.dns_zone_name}" public_health_check_link = "${module.pas.cf_public_health_check}" infrastructure_subnet_cidr = "${var.infrastructure_cidr}" pas_subnet_cidr = "${module.pas.pas_subnet_ip_cidr_range}" ssl_certificate = "${module.isoseg_certs.ssl_certificate}" replicated_suffix = "${var.iso_seg_replicated_suffix}" }

module "external_database" { source = "../modules/external_database"

create = "${var.external_database}"

env_name = "${var.env_name}" region = "${var.region}" sql_db_tier = "db-n1-standard-1" }

module "internetless" { source = "../modules/internetless"

env_name = "${var.env_name}" internetless = "${var.internetless}" network = "${module.infra.network}"

egress_target_account = "${module.ops_manager.service_account_email}"

internal_cidr_ranges = [ "${module.infra.ip_cidr_range}", "${module.pas.pas_subnet_ip_cidr_range}", "${module.pas.services_subnet_ip_cidr_range}", ] }

module "jumpbox" { source = "../modules/jumpbox"

dns_suffix = "${var.dns_suffix}" availability_zone = "${var.zones[0]}" subnet = "${module.infra.subnet}"

jumpbox_init_script = "${var.jumpbox_init_script}" jumpbox_public_key = "${module.ops_manager.ops_manager_ssh_public_key}" jumpbox_private_key = "${module.ops_manager.ops_manager_ssh_private_key}" env_name = "${var.env_name}" username = "ubuntu" pcf_network = "${module.infra.network}" pcf_managed_zone_name = "${module.infra.dns_zone_name}" }

cat outputs.tf output "iaas" { value = "gcp" }

output "project" { value = "${var.project}" }

output "opsman_service_account_key" { sensitive = true value = "${module.ops_manager.service_account_key}" }

output "region" { value = "${var.region}" }

output "azs" { value = "${var.zones}" }

output "vm_tag" { value = "${var.env_name}-vms" }

output "dns_managed_zone" { value = "${module.infra.dns_zone_name}" }

output "env_dns_zone_name_servers" { value = "${module.infra.dns_zone_name_servers}" }

output "network_name" { value = "${module.infra.network_name}" }

output "director_blobstore_bucket" { value = "${module.ops_manager.director_blobstore_bucket}" }

output "infrastructure_subnet_gateway" { value = "${module.infra.subnet_gateway}" }

output "infrastructure_subnet_cidr" { value = "${module.infra.ip_cidr_range}" }

output "infrastructure_subnet_name" { value = "${module.infra.subnet_name}" }

output "infrastructure_subnets" { value = ["${module.infra.subnet_name}"] }

Ops Manager

output "service_account_email" { value = "${module.ops_manager.service_account_email}" }

output "ops_manager_dns" { value = "${module.ops_manager.ops_manager_dns}" }

output "ops_manager_public_ip" { value = "${module.ops_manager.ops_manager_public_ip}" }

output "ops_manager_ip" { value = "${module.ops_manager.ops_manager_ip}" }

output "ops_manager_ssh_private_key" { sensitive = true value = "${module.ops_manager.ops_manager_ssh_private_key}" }

output "ops_manager_ssh_public_key" { sensitive = true value = "${module.ops_manager.ops_manager_ssh_public_key}" }

Optional Ops Manager

output "optional_ops_manager_dns" { value = "${module.ops_manager.optional_ops_manager_dns}" }

output "optional_ops_manager_public_ip" { value = "${module.ops_manager.optional_ops_manager_public_ip}" }

output "ops_manager_private_ip" { value = "${module.ops_manager.ops_manager_private_ip}" }

PAS

output "pas_blobstore_gcp_service_account_key" { value = "${module.infra.blobstore_gcp_service_account_key}" sensitive = true }

output "pas_blobstore_service_account_email" { value = "${module.infra.blobstore_service_account_email}" }

output "pas_blobstore_service_account_project" { value = "${module.infra.blobstore_service_account_project}" }

output "sys_domain" { value = "${module.pas.sys_domain}" }

output "apps_domain" { value = "${module.pas.apps_domain}" }

output "tcp_domain" { value = "${module.pas.tcp_domain}" }

output "ws_router_pool" { value = "${module.pas.ws_router_pool}" }

output "ssh_lb_name" { value = "${module.pas.ssh_lb_name}" }

output "ssh_router_pool" { value = "${module.pas.ssh_router_pool}" }

output "tcp_lb_name" { value = "${module.pas.tcp_lb_name}" }

output "tcp_router_pool" { value = "${module.pas.tcp_router_pool}" }

output "buildpacks_bucket" { value = "${module.pas.buildpacks_bucket}" }

output "droplets_bucket" { value = "${module.pas.droplets_bucket}" }

output "packages_bucket" { value = "${module.pas.packages_bucket}" }

output "resources_bucket" { value = "${module.pas.resources_bucket}" }

output "backup_bucket" { value = "${module.pas.backup_bucket}" }

output "pas_subnet_gateway" { value = "${module.pas.pas_subnet_gateway}" }

output "pas_subnet_cidr" { value = "${module.pas.pas_subnet_ip_cidr_range}" }

output "pas_subnet_name" { value = "${module.pas.pas_subnet_name}" }

output "pas_subnet" { value = "${module.pas.pas_subnet_name}" }

output "services_subnet_gateway" { value = "${module.pas.services_subnet_gateway}" }

output "services_subnet_cidr" { value = "${module.pas.services_subnet_ip_cidr_range}" }

output "services_subnet_name" { value = "${module.pas.services_subnet_name}" }

output "services_subnet" { value = "${module.pas.services_subnet_name}" }

output "web_lb_name" { value = "${module.pas.lb_name}" }

output "http_lb_backend_name" { value = "${module.pas.lb_name}" }

output "cf_ws_address" { value = "${module.pas.cf_ws_address}" }

output "haproxy_static_ip" { value = "${module.pas.haproxy_static_ip}" }

Certificates

output "ssl_cert" { sensitive = true value = "${module.pas_certs.ssl_cert}" }

output "ssl_private_key" { sensitive = true value = "${module.pas_certs.ssl_private_key}" }

Isolation Segment

output "isoseg_domain" { value = "${module.isolation_segment.domain}" }

output "isoseg_lb_backend_name" { value = "${module.isolation_segment.load_balancer_name}" }

output "iso_seg_ssl_cert" { sensitive = true value = "${module.isoseg_certs.ssl_cert}" }

output "iso_seg_ssl_private_key" { sensitive = true value = "${module.isoseg_certs.ssl_private_key}" }

output "iso_seg_haproxy_static_ip" { value = "${module.isolation_segment.haproxy_static_ip}" }

External Database

output "sql_db_ip" { value = "${module.external_database.ip}" }

output "pas_sql_username" { value = "${module.pas.sql_username}" }

output "pas_sql_password" { sensitive = true value = "${module.pas.sql_password}" }

output "opsman_sql_username" { value = "${module.ops_manager.sql_username}" }

output "opsman_sql_password" { sensitive = true value = "${module.ops_manager.sql_password}" }

output "opsman_sql_db_name" { value = "${module.ops_manager.sql_db_name}" }

/*****

output "management_subnet_gateway" { value = "${module.infra.subnet_gateway}" }

output "management_subnet_cidrs" { value = "${module.infra.subnet_cidrs}" }

output "management_subnet_name" { value = "${module.infra.subnet_name}" }

output "management_subnets" { value = ["${module.infra.subnet_name}"] }

output "infrastructure_subnet_cidrs" { value = "${module.infra.subnet_cidrs}" }

output "pas_subnet_cidrs" { value = ["${module.pas.pas_subnet_ip_cidr_range}"] }

output "services_subnet_cidrs" { value = ["${module.pas.services_subnet_ip_cidr_range}"] }

output "services_subnets" { value = ["${module.pas.services_subnet_name}"] }

output "pas_subnets" { value = ["${module.pas.pas_subnet_name}"] }

Debug Output

An execution plan has been generated and is shown below. Resource actions are indicated with the following symbols:

Terraform will perform the following actions:

Plan: 9 to add, 0 to change, 0 to destroy.

Do you want to perform these actions? Terraform will perform the actions described above. Only 'yes' will be accepted to approve.

Enter a value: yes

module.pas.module.gorouter.google_compute_target_http_proxy.http_lb_proxy: Creating... creation_timestamp: "" => "" description: "" => "really a load balancer but listed as an https proxy" name: "" => "tanzu-httpproxy" project: "" => "" proxy_id: "" => "" self_link: "" => "" url_map: "" => "https://www.googleapis.com/compute/v1/projects/cavisson-tas/global/urlMaps/tanzu-cf-http" module.pas.module.gorouter.google_compute_target_https_proxy.https_lb_proxy: Creating... creation_timestamp: "" => "" description: "" => "really a load balancer but listed as an https proxy" name: "" => "tanzu-httpsproxy" project: "" => "" proxy_id: "" => "" self_link: "" => "" ssl_certificates.#: "" => "1" url_map: "" => "https://www.googleapis.com/compute/v1/projects/cavisson-tas/global/urlMaps/tanzu-cf-http" module.ops_manager.google_compute_image.ops-manager-image: Creating... label_fingerprint: "" => "" licenses.#: "" => "" name: "" => "tanzu-ops-manager-image" project: "" => "" raw_disk.#: "" => "1" raw_disk.0.container_type: "" => "TAR" raw_disk.0.source: "" => "https://storage.googleapis.com/ops-manager-us/pcf-gcp-2.10.21-build.330.tar.gz" self_link: "" => ""

Error: Error applying plan:

4 errors occurred:

Terraform does not automatically rollback in the face of errors. Instead, your Terraform state file has been partially updated with any resources that successfully completed. Please address the error above and apply again to incrementally change your infrastructure.

panic: interface conversion: interface {} is nil, not string 2023-06-15T06:08:59.676Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: 2023-06-15T06:08:59.676Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: goroutine 429 [running]: 2023-06-15T06:08:59.676Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: github.com/terraform-providers/terraform-provider-google/google.expandComputeTargetHttpsProxySslCertificates(0x16cc860, 0xc000633020, 0xc0006416c0, 0xc0005b4b00, 0xc000633020, 0xc00009ea00, 0x756ea1b9d0aa4d, 0x10) 2023-06-15T06:08:59.676Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-google/google/resource_compute_target_https_proxy.go:514 +0x3ec 2023-06-15T06:08:59.676Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: github.com/terraform-providers/terraform-provider-google/google.resourceComputeTargetHttpsProxyCreate(0xc0006416c0, 0x1806920, 0xc0005b4b00, 0xc0006416c0, 0x0) 2023-06-15T06:08:59.678Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-google/google/resource_compute_target_https_proxy.go:124 +0x45e 2023-06-15T06:08:59.678Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: github.com/terraform-providers/terraform-provider-google/vendor/github.com/hashicorp/terraform/helper/schema.(Resource).Apply(0xc0002a58f0, 0xc0009431d0, 0xc000632740, 0x1806920, 0xc0005b4b00, 0x40ba01, 0xc00009eb80, 0x4c11dc) 2023-06-15T06:08:59.678Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-google/vendor/github.com/hashicorp/terraform/helper/schema/resource.go:225 +0x351 2023-06-15T06:08:59.678Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: github.com/terraform-providers/terraform-provider-google/vendor/github.com/hashicorp/terraform/helper/schema.(Provider).Apply(0xc00067d7a0, 0xc000943180, 0xc0009431d0, 0xc000632740, 0xc0003f5880, 0x53380d134d2c6dfc, 0x7fdf041066c0) 2023-06-15T06:08:59.678Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-google/vendor/github.com/hashicorp/terraform/helper/schema/provider.go:283 +0x9c 2023-06-15T06:08:59.678Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: github.com/terraform-providers/terraform-provider-google/vendor/github.com/hashicorp/terraform/plugin.(ResourceProviderServer).Apply(0xc000620560, 0xc0006326e0, 0xc0006d2c90, 0x0, 0x0) 2023-06-15T06:08:59.678Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-google/vendor/github.com/hashicorp/terraform/plugin/resource_provider.go:527 +0x57 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: reflect.Value.call(0xc000075080, 0xc0008df1f8, 0x13, 0x1b9210e, 0x4, 0xc00009ef18, 0x3, 0x3, 0xc0002b0fc0, 0x4130f7, ...) 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/goenv/versions/1.11.0/src/reflect/value.go:447 +0x449 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: reflect.Value.Call(0xc000075080, 0xc0008df1f8, 0x13, 0xc000882f18, 0x3, 0x3, 0x12a05f200, 0xc000882f10, 0xc000882fb8) 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/goenv/versions/1.11.0/src/reflect/value.go:308 +0xa4 2023/06/15 06:08:59 [ERROR] root.infra: eval: terraform.EvalDiff, err: unexpected EOF 2023/06/15 06:08:59 [ERROR] root.infra: eval: terraform.EvalSequence, err: unexpected EOF 2023/06/15 06:08:59 [TRACE] [walkApply] Exiting eval tree: module.infra.google_service_account.blobstore 2023-06-15T06:08:59.679Z [DEBUG] plugin: plugin process exited: path=/home/ubuntu/pivotal-cf-terraforming-gcp-f4aab02/terraforming-pas/.terraform/plugins/linux_amd64/terraform-provider-google_v1.20.0_x4 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: net/rpc.(service).call(0xc000776880, 0xc000942b40, 0xc000639e78, 0xc000639e90, 0xc000140800, 0xc000620ac0, 0x167a0a0, 0xc0006326e0, 0x16, 0x167a0e0, ...) 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/goenv/versions/1.11.0/src/net/rpc/server.go:384 +0x14e 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: created by net/rpc.(Server).ServeCodec 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/goenv/versions/1.11.0/src/net/rpc/server.go:481 +0x47e 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.infra.output.blobstore_service_account_project" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "output.pas_blobstore_service_account_project" 2023/06/15 06:08:59 [TRACE] root.ops_manager: eval: terraform.EvalWriteState 2023/06/15 06:08:59 [TRACE] root.ops_manager: eval: terraform.EvalApplyProvisioners 2023/06/15 06:08:59 [TRACE] root.ops_manager: eval: terraform.EvalIf 2023/06/15 06:08:59 [TRACE] root.ops_manager: eval: terraform.EvalWriteState 2023/06/15 06:08:59 [TRACE] root.ops_manager: eval: terraform.EvalWriteDiff 2023/06/15 06:08:59 [TRACE] root.ops_manager: eval: terraform.EvalApplyPost 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalWriteState 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalApplyProvisioners 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalIf 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalWriteState 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalWriteDiff 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalApplyPost 2023/06/15 06:08:59 [ERROR] root.pas.gorouter: eval: terraform.EvalApplyPost, err: 1 error occurred:

2023/06/15 06:08:59 [ERROR] root.pas.gorouter: eval: *terraform.EvalSequence, err: 1 error occurred:

2023/06/15 06:08:59 [TRACE] [walkApply] Exiting eval tree: module.pas.module.gorouter.google_compute_target_http_proxy.http_lb_proxy 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.pas.module.gorouter.google_compute_global_forwarding_rule.cf_http" 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalWriteState 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalApplyProvisioners 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalIf 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalWriteState 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalWriteDiff 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalApplyPost 2023/06/15 06:08:59 [ERROR] root.pas.gorouter: eval: *terraform.EvalApplyPost, err: 1 error occurred:

2023/06/15 06:08:59 [ERROR] root.pas.gorouter: eval: *terraform.EvalSequence, err: 1 error occurred:

2023/06/15 06:08:59 [TRACE] [walkApply] Exiting eval tree: module.pas.module.gorouter.google_compute_target_https_proxy.https_lb_proxy 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.infra.google_service_account_key.blobstore" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.infra.output.blobstore_gcp_service_account_key" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "output.pas_blobstore_gcp_service_account_key" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.infra.output.blobstore_service_account_email" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "output.pas_blobstore_service_account_email" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.infra.google_project_iam_member.blobstore_cloud_storage_admin" 2023/06/15 06:08:59 [ERROR] root.ops_manager: eval: *terraform.EvalApplyPost, err: 1 error occurred:

2023/06/15 06:08:59 [ERROR] root.ops_manager: eval: *terraform.EvalSequence, err: 1 error occurred:

2023/06/15 06:08:59 [TRACE] [walkApply] Exiting eval tree: module.ops_manager.google_compute_image.ops-manager-image 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.ops_manager.google_compute_instance.ops-manager" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.ops_manager.output.ops_manager_private_ip" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "output.ops_manager_private_ip" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.pas.module.gorouter.google_compute_global_forwarding_rule.cf_https" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "meta.count-boundary (count boundary fixup)" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "provider.google (close)" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "root" 2023/06/15 06:08:59 [TRACE] Preserving existing state lineage "6378d989-3802-1b94-eda2-92a1e2338153" 2023/06/15 06:08:59 [TRACE] Preserving existing state lineage "6378d989-3802-1b94-eda2-92a1e2338153" 2023/06/15 06:08:59 [TRACE] Preserving existing state lineage "6378d989-3802-1b94-eda2-92a1e2338153" 2023/06/15 06:08:59 [TRACE] Preserving existing state lineage "6378d989-3802-1b94-eda2-92a1e2338153" 2023/06/15 06:08:59 [DEBUG] plugin: waiting for all plugin processes to complete... 2023-06-15T06:08:59.716Z [WARN ] plugin: error closing client during Kill: err="connection is shut down" 2023-06-15T06:08:59.716Z [DEBUG] plugin.terraform: remote-exec-provisioner (internal) 2023/06/15 06:08:59 [ERR] plugin: plugin server: accept unix /tmp/plugin084793115: use of closed network connection 2023-06-15T06:08:59.716Z [DEBUG] plugin.terraform: remote-exec-provisioner (internal) 2023/06/15 06:08:59 [DEBUG] plugin: waiting for all plugin processes to complete... 2023-06-15T06:08:59.716Z [DEBUG] plugin.terraform-provider-template_v2.2.0_x4: 2023/06/15 06:08:59 [ERR] plugin: plugin server: accept unix /tmp/plugin513075468: use of closed network connection 2023/06/15 06:08:59 [ERR] yamux: Failed to write header: write unix @->/tmp/plugin513075468: write: broken pipe 2023-06-15T06:08:59.716Z [DEBUG] plugin: plugin process exited: path=/usr/local/bin/terraform 2023-06-15T06:08:59.716Z [DEBUG] plugin.terraform: file-provisioner (internal) 2023/06/15 06:08:59 [ERR] plugin: plugin server: accept unix /tmp/plugin507725272: use of closed network connection 2023-06-15T06:08:59.716Z [DEBUG] plugin.terraform: file-provisioner (internal) 2023/06/15 06:08:59 [DEBUG] plugin: waiting for all plugin processes to complete... 2023-06-15T06:08:59.716Z [DEBUG] plugin.terraform-provider-tls_v2.2.0_x4: 2023/06/15 06:08:59 [ERR] plugin: plugin server: accept unix /tmp/plugin926187663: use of closed network connection 2023-06-15T06:08:59.717Z [DEBUG] plugin: plugin process exited: path=/home/ubuntu/pivotal-cf-terraforming-gcp-f4aab02/terraforming-pas/.terraform/plugins/linux_amd64/terraform-provider-template_v2.2.0_x4 2023-06-15T06:08:59.720Z [DEBUG] plugin: plugin process exited: path=/usr/local/bin/terraform 2023-06-15T06:08:59.720Z [DEBUG] plugin: plugin process exited: path=/home/ubuntu/pivotal-cf-terraforming-gcp-f4aab02/terraforming-pas/.terraform/plugins/linux_amd64/terraform-provider-tls_v2.2.0_x4 2023-06-15T06:08:59.720Z [DEBUG] plugin.terraform-provider-random_v2.3.1_x4: 2023/06/15 06:08:59 [ERR] plugin: plugin server: accept unix /tmp/plugin087542132: use of closed network connection 2023-06-15T06:08:59.720Z [DEBUG] plugin: plugin process exited: path=/home/ubuntu/pivotal-cf-terraforming-gcp-f4aab02/terraforming-pas/.terraform/plugins/linux_amd64/terraform-provider-random_v2.3.1_x4

!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!

Terraform crashed! This is always indicative of a bug within Terraform. A crash log has been placed at "crash.log" relative to your current working directory. It would be immensely helpful if you could please report the crash with Terraform1 so that we can fix this.

When reporting bugs, please include your terraform version. That information is available on the first line of crash.log. You can also get it by running 'terraform --version' on the command line.

!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!

Expected Behavior

all the services should be created properly without any crash dump

Actual Behavior

It is getting crashed

Steps to Reproduce

terraform init terraform plan terraform apply

Additional Context

No response

References

No response

jbardin commented 1 year ago

Hi @swastik7853,

The crash you see here is from the google provider, so perhaps something you changed related to a google resource might lead to a workaround. Unfortunately the versions of Terraform and providers you are using are extremely old (the Google provider for example is from 2018), so there is not going to be any way to fix the issue other than to begin the upgrade process. I would urge you to work on upgrading as soon as possible, since it only gets more difficult as the world around the old releases moves on and support for the old versions continues to wain.

Thanks!

github-actions[bot] commented 11 months ago

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.