Open ksuderman opened 3 years ago
/validate
This plan appears to be valid.
/plan
openstack_compute_floatingip_v2.ip: Refreshing state... [id=6fbaf721-997c-443a-bb27-15a8552b3d57] openstack_networking_secgroup_v2.fw: Refreshing state... [id=ed1211ea-a1bf-4c64-a0f0-1b093b519921] openstack_networking_secgroup_rule_v2.ipv4_tcp_public["8443"]: Refreshing state... [id=447ff3b2-e52a-4216-9e21-6ee4bf67b5d6] openstack_networking_secgroup_rule_v2.ipv4_tcp_public["8000"]: Refreshing state... [id=b05097e3-9025-4739-9a08-26fc5275d47f] openstack_compute_instance_v2.node: Refreshing state... [id=be141f96-0fd2-4875-b121-4e547420e8e1] openstack_networking_secgroup_rule_v2.egress_ip4: Refreshing state... [id=db27625a-ed5f-4612-99ce-df9d4fdfd38f] openstack_networking_secgroup_rule_v2.ipv4_tcp_public["8080"]: Refreshing state... [id=c8a06b71-2909-4ce4-b43f-0b8bea2dba00] openstack_networking_secgroup_rule_v2.ipv4_tcp_public["443"]: Refreshing state... [id=fc1fc164-e132-47b3-9e5c-8f91f348b71e] openstack_networking_secgroup_rule_v2.ipv4_tcp_public["22"]: Refreshing state... [id=9796b943-059c-4464-94dd-09d0b5be5176] openstack_networking_secgroup_rule_v2.ipv4_tcp_public["80"]: Refreshing state... [id=7518927c-456a-4bba-9cda-570a0b754df3] openstack_networking_secgroup_rule_v2.ipv4_tcp_public["6443"]: Refreshing state... [id=c127f7e5-3f15-4917-a286-0b9c8067ae1c] local_file.ipfile: Refreshing state... [id=eaac3c408902c7260b851339f17b995c905119d6] openstack_compute_floatingip_associate_v2.node_ips: Refreshing state... [id=149.165.156.65/be141f96-0fd2-4875-b121-4e547420e8e1/]
Note: Objects have changed outside of Terraform
Terraform detected the following changes made outside of Terraform since the last "terraform apply":
resource "local_file" "ipfile" {
content = <<-EOT Your instance will be available shortly at: 149.165.156.65 Use the SSH key ks-cluster that was provided to you, or ask ksuderman for the key.
EOT -> null
~ resource "openstack_compute_floatingip_v2" "ip" {
}
~ resource "openstack_compute_instance_v2" "node" { id = "be141f96-0fd2-4875-b121-4e547420e8e1" name = "ks-github-terraform-bot" ~ security_groups = [
]
tags = []
}
~ resource "openstack_networking_secgroup_v2" "fw" { id = "ed1211ea-a1bf-4c64-a0f0-1b093b519921" name = "ks-github-terraform-bot-firewall"
}
Unless you have made equivalent changes to your configuration, or ignored the relevant attributes using ignore_changes, the following plan may include actions to undo or respond to these changes.
─────────────────────────────────────────────────────────────────────────────
Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
Terraform will perform the following actions:
resource "local_file" "ipfile" {
content = <<-EOT Your instance will be available shortly at: 149.165.156.65 Use the SSH key ks-cluster that was provided to you, or ask ksuderman for the key.
EOT
~ resource "openstack_compute_instance_v2" "node" { id = "be141f96-0fd2-4875-b121-4e547420e8e1" name = "ks-github-terraform-bot" ~ security_groups = [
"ks-github-terraform-bot-firewall",
] tags = []
}
Plan: 1 to add, 1 to change, 0 to destroy.
─────────────────────────────────────────────────────────────────────────────
Note: You didn't use the -out option to save this plan, so Terraform can't guarantee to take exactly these actions if you run "terraform apply" now.
/plan
module.bootstrap.aws_s3_bucket.state_bucket: Refreshing state... [id=ks-github-tf-aws] module.bootstrap.aws_dynamodb_table.tf_lock_state: Refreshing state... [id=ks-github-tf-aws]
Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
Terraform will perform the following actions:
resource "aws_eip" "frontend" {
resource "aws_instance" "vm1" {
ami = "ami-09e67e426f25ce0d7"
arn = (known after apply)
associate_public_ip_address = (known after apply)
availability_zone = (known after apply)
cpu_core_count = (known after apply)
cpu_threads_per_core = (known after apply)
disable_api_termination = (known after apply)
ebs_optimized = (known after apply)
get_password_data = false
host_id = (known after apply)
id = (known after apply)
instance_initiated_shutdown_behavior = (known after apply)
instance_state = (known after apply)
instance_type = "m5.2xlarge"
ipv6_address_count = (known after apply)
ipv6_addresses = (known after apply)
key_name = "ks-galaxy-aws"
monitoring = (known after apply)
outpost_arn = (known after apply)
password_data = (known after apply)
placement_group = (known after apply)
primary_network_interface_id = (known after apply)
private_dns = (known after apply)
private_ip = (known after apply)
public_dns = (known after apply)
public_ip = (known after apply)
secondary_private_ips = (known after apply)
security_groups = (known after apply)
subnet_id = (known after apply)
tags = {
tags_all = {
tenancy = (known after apply)
user_data = (known after apply)
user_data_base64 = (known after apply)
vpc_security_group_ids = (known after apply)
capacity_reservation_specification {
capacity_reservation_preference = (known after apply)
capacity_reservation_target {
ebs_block_device {
enclave_options {
ephemeral_block_device {
metadata_options {
network_interface {
root_block_device {
resource "aws_network_interface" "gateway" {
id = (known after apply)
interface_type = (known after apply)
ipv6_address_count = (known after apply)
ipv6_addresses = (known after apply)
mac_address = (known after apply)
outpost_arn = (known after apply)
private_dns_name = (known after apply)
private_ip = (known after apply)
private_ips = (known after apply)
private_ips_count = (known after apply)
security_groups = [
source_dest_check = true
subnet_id = "subnet-082222bb425b6e856"
tags = {
tags_all = {
attachment {
resource "aws_route53_record" "bench3" {
Plan: 5 to add, 0 to change, 0 to destroy.
─────────────────────────────────────────────────────────────────────────────
Note: You didn't use the -out option to save this plan, so Terraform can't guarantee to take exactly these actions if you run "terraform apply" now.
/validate
The plan for the aws-test branch appears to be valid.
/apply
Your instance will be available shortly at: 34.231.202.100 Use the SSH key ks-galaxy-aws that was provided to you, or ask ksuderman for the key.
/plan
module.bootstrap.aws_dynamodb_table.tf_lock_state: Refreshing state... [id=ks-github-tf-aws] aws_network_interface.gateway: Refreshing state... [id=eni-0853fea075ecf1a29] module.bootstrap.aws_s3_bucket.state_bucket: Refreshing state... [id=ks-github-tf-aws] aws_instance.vm1: Refreshing state... [id=i-00329515fbdee9bdf] aws_eip.frontend: Refreshing state... [id=eipalloc-00ecc415a8e8eed61] aws_route53_record.bench3: Refreshing state... [id=Z01092892MLURSVI2K4L4_bench3.usegvl.org_A] local_file.ipfile: Refreshing state... [id=7e8803cb3446ccd556c93eab76acdf39ea5d64c9]
Note: Objects have changed outside of Terraform
Terraform detected the following changes made outside of Terraform since the last "terraform apply":
~ resource "aws_route53_record" "bench3" { id = "Z01092892MLURSVI2K4L4_bench3.usegvl.org_A" name = "bench3.usegvl.org"
}
resource "local_file" "ipfile" {
content = <<-EOT Your instance will be available shortly at: 34.231.202.100 Use the SSH key ks-galaxy-aws that was provided to you, or ask ksuderman for the key.
EOT -> null
directory_permission = "0777" -> null
file_permission = "0777" -> null
filename = "./comment.txt" -> null
id = "7e8803cb3446ccd556c93eab76acdf39ea5d64c9" -> null }
~ resource "aws_eip" "frontend" { id = "eipalloc-00ecc415a8e8eed61"
tags = {}
}
~ resource "aws_instance" "vm1" { ~ associate_public_ip_address = false -> true id = "i-00329515fbdee9bdf"
public_dns = "ec2-34-231-202-100.compute-1.amazonaws.com"
public_ip = "34.231.202.100" ~ tags = {
} ~ tags_all = {
}
~ root_block_device {
}
}
~ resource "aws_network_interface" "gateway" { id = "eni-0853fea075ecf1a29" tags = { "Name" = "primary_network_interface" }
attachment {
Unless you have made equivalent changes to your configuration, or ignored the relevant attributes using ignore_changes, the following plan may include actions to undo or respond to these changes.
─────────────────────────────────────────────────────────────────────────────
Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
Terraform will perform the following actions:
resource "aws_iam_instance_profile" "profile" {
resource "aws_iam_policy" "cn" {
resource "aws_iam_policy" "policy" {
resource "aws_iam_policy" "trust" {
resource "aws_iam_policy_attachment" "cn-attach" {
resource "aws_iam_policy_attachment" "policy-attach" {
resource "aws_iam_policy_attachment" "trust-attach" {
resource "aws_iam_role" "this" {
arn = (known after apply)
assume_role_policy = jsonencode( {
create_date = (known after apply)
force_detach_policies = false
id = (known after apply)
managed_policy_arns = (known after apply)
max_session_duration = 3600
name = "gha-role"
name_prefix = (known after apply)
path = "/"
tags_all = (known after apply)
unique_id = (known after apply)
inline_policy {
~ resource "aws_instance" "vm1" {
iam_instance_profile = "profile" id = "i-00329515fbdee9bdf" ~ tags = {
} ~ tags_all = {
}
}
resource "local_file" "ipfile" {
content = <<-EOT Your instance will be available shortly at: 34.231.202.100 Use the SSH key ks-galaxy-aws that was provided to you, or ask ksuderman for the key.
EOT
Plan: 9 to add, 1 to change, 0 to destroy.
─────────────────────────────────────────────────────────────────────────────
Note: You didn't use the -out option to save this plan, so Terraform can't guarantee to take exactly these actions if you run "terraform apply" now.
/apply
/apply
Your instance will be available shortly.
IP : 3.81.188.204 AWS IID: i-09a3f817ef0c2c0d8 SSH Key: ks-galaxy-aws.pem
/destroy
Cluster has been destroyed.
/apply
Your instance will be available shortly.
public_ip: 54.82.121.214
instance_id: i-0cb1d2837b51b586c
SSH Key: ks-galaxy-aws.pem
/destroy
Cluster has been destroyed.
/show
/show
There are no resources provisioned.
Branch to launch a single EC2 instance.