aliyun / terraform-provider-alicloud Goto Github PK
View Code? Open in Web Editor NEWTerraform AliCloud provider
Home Page: https://www.terraform.io/docs/providers/alicloud/
License: Mozilla Public License 2.0
Terraform AliCloud provider
Home Page: https://www.terraform.io/docs/providers/alicloud/
License: Mozilla Public License 2.0
Hi
Is there a possibility to add creating Automatic Scaling for Kubernetes cluster?
Thanks.
Hi,
I have difficulties to destroy complete infrastructure through terraform.
It seems like if I have instances still running, it still tries to destroy the vswitch first while it should stop and release the instances first. And even if I remove the instances manually and retry the destroy of the rest it says the vpc has been destroyed, but it still here in Aliyun.
Thanks.
Terraform v0.11.10
data "alicloud_dns_domains" "all_domains" {
domain_name_regex = ".*"
output_file = "domains.txt"
}
output "all_domains" {
value = ["${data.alicloud_dns_domains.all_domains.domains.*.domain_name}"]
}
the output as follow:
all_domains = [
3
]
If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the crash.log
.
I want to get all domain name, not the number of domain name.
get the number of domain name
Please list the steps required to reproduce the issue, for example:
terraform apply
Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? Custom version of OpenStack? Tight ACLs?
Are there any other GitHub issues (open or closed) or Pull Requests that should be linked here? For example:
The example has an instance_network_type
field for the alicloud_instance
resource, which is not a valid field.
Hi,
I was using Terraform 0.9.5 and just switched to 0.9.8 to double-check. The documentation is a bit misleading on the fact that either the SourceGroupId or SourceCidrIp is required. It should be mentioned.
Also if you specify any of the two it forces the creation of a new resource, which is annoying. So is there any chance a new resource would not be created when I reapply a plan I just applied and that completed perfectly fine?
Thanks,
Sonny
This issue was originally opened by @teachmyself as hashicorp/terraform#17566. It was migrated here as a result of the provider split. The original body of the issue is below.
Terraform v0.11.3
+ provider.alicloud v1.8.1
provider "alicloud" {
access_key = "xxxx"
secret_key = "xxxxx"
region = "cn-beijing"
}
resource "alicloud_vpc" "demo" {
name = "demo"
description = "demo"
cidr_block = "192.168.0.0/16"
}
2018/03/13 16:37:09 [INFO] Terraform version: 0.11.3 3802b14260603f90c7a1faf55994dcc8933e2069
2018/03/13 16:37:09 [INFO] Go runtime version: go1.9.1
2018/03/13 16:37:09 [INFO] CLI args: []string{"/Users/hanyouqing/Server/bin/terraform", "plan"}
2018/03/13 16:37:09 [DEBUG] Attempting to open CLI config file: /Users/hanyouqing/.terraformrc
2018/03/13 16:37:09 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2018/03/13 16:37:09 [INFO] CLI command args: []string{"plan"}
2018/03/13 16:37:09 [INFO] command: empty terraform config, returning nil
2018/03/13 16:37:09 [DEBUG] command: no data state file found for backend config
2018/03/13 16:37:09 [DEBUG] New state was assigned lineage "aeed91aa-96fc-4c76-b290-a5d520dca880"
2018/03/13 16:37:09 [INFO] command: backend initialized: <nil>
2018/03/13 16:37:09 [DEBUG] checking for provider in "."
2018/03/13 16:37:09 [DEBUG] checking for provider in "/Users/hanyouqing/Server/bin"
2018/03/13 16:37:09 [WARN] found legacy provider "terraform-provider-alicloud.bk"
2018/03/13 16:37:09 [DEBUG] checking for provider in ".terraform/plugins/darwin_amd64"
2018/03/13 16:37:09 [DEBUG] found provider "terraform-provider-alicloud_v1.8.1_x4"
2018/03/13 16:37:09 [DEBUG] found valid plugin: "alicloud.bk", "0.0.0", "/Users/hanyouqing/Server/bin/terraform-provider-alicloud.bk"
2018/03/13 16:37:09 [DEBUG] found valid plugin: "alicloud", "1.8.1", "/Users/hanyouqing/Work/github.com/icmdb/applications/demo/tpl/.terraform/plugins/darwin_amd64/terraform-provider-alicloud_v1.8.1_x4"
2018/03/13 16:37:09 [DEBUG] checking for provisioner in "."
2018/03/13 16:37:09 [DEBUG] checking for provisioner in "/Users/hanyouqing/Server/bin"
2018/03/13 16:37:09 [DEBUG] checking for provisioner in ".terraform/plugins/darwin_amd64"
2018/03/13 16:37:09 [INFO] command: backend <nil> is not enhanced, wrapping in local
2018/03/13 16:37:09 [INFO] backend/local: starting Plan operation
2018/03/13 16:37:09 [DEBUG] New state was assigned lineage "c3a632d7-9941-4099-aa86-3ed005c9ab57"
2018/03/13 16:37:09 [INFO] terraform: building graph: GraphTypeInput
2018/03/13 16:37:09 [TRACE] ConfigTransformer: Starting for path: []
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.ConfigTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.LocalTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.OutputTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.OrphanResourceTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.OrphanOutputTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
2018/03/13 16:37:09 [TRACE] AttachResourceConfigTransformer: Beginning...
2018/03/13 16:37:09 [TRACE] AttachResourceConfigTransformer: Attach resource config request: alicloud_vpc.demo
2018/03/13 16:37:09 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"demo", Type:"alicloud_vpc", RawCount:(*config.RawConfig)(0xc420391b90), RawConfig:(*config.RawConfig)(0xc420391b20), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
2018/03/13 16:37:09 [DEBUG] Resource state not found for "alicloud_vpc.demo": alicloud_vpc.demo
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.AttachStateTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.RootVariableTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] ProviderConfigTransformer: Starting for path: []
2018/03/13 16:37:09 [TRACE] Attach provider request: []string{} alicloud
2018/03/13 16:37:09 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"alicloud", Alias:"", Version:"1.8.1", RawConfig:(*config.RawConfig)(0xc420391ab0)}
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.ProviderConfigTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.MissingProviderTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [DEBUG] resource alicloud_vpc.demo using provider provider.alicloud
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.ProviderTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.PruneProviderTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.ParentProviderTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.graphTransformerMulti:
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.ModuleVariableTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.RemovedModuleTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.alicloud_access_key" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.alicloud_secret_key" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.alicloud_region" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.alicloud_password" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.alicloud_vpc_name" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.alicloud_vpc_description" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.alicloud_cidr_block" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.aws_access_key" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "provider.alicloud" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "alicloud_vpc.demo" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.aws_secret_key" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.aws_region" references: []
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.ReferenceTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.CountBoundaryTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.TargetsTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.CloseProviderTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.CloseProvisionerTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.RootTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.alicloud (close) - *terraform.graphNodeCloseProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.TransitiveReductionTransformer:
alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
alicloud_vpc.demo - *terraform.NodeAbstractResource
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
alicloud_vpc.demo - *terraform.NodeAbstractResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.alicloud (close) - *terraform.graphNodeCloseProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [DEBUG] Starting graph walk: walkInput
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.alicloud_region"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.alicloud_vpc_name"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.alicloud_access_key"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.aws_access_key"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "provider.alicloud"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.alicloud_password"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.alicloud_cidr_block"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "root"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.alicloud_vpc_description"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.aws_secret_key"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.aws_region"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "provider.alicloud (close)"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.alicloud_secret_key"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "alicloud_vpc.demo"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_region"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_cidr_block"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "alicloud_vpc.demo" waiting on "provider.alicloud"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.aws_region"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "provider.alicloud (close)" waiting on "alicloud_vpc.demo"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "root" waiting on "provider.alicloud (close)"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_vpc_name"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_password"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.aws_secret_key"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_secret_key"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "alicloud_vpc.demo"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.aws_access_key"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_vpc_description"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_access_key"
2018/03/13 16:37:09 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps
2018/03/13 16:37:09 [TRACE] dag/walk: dependencies changed for "alicloud_vpc.demo", sending new deps
2018/03/13 16:37:09 [TRACE] dag/walk: dependencies changed for "provider.alicloud (close)", sending new deps
2018/03/13 16:37:09 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.alicloud_vpc_description"
2018/03/13 16:37:09 [TRACE] vertex 'root.var.alicloud_vpc_description': walking
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.alicloud_secret_key"
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.aws_secret_key"
2018/03/13 16:37:09 [TRACE] vertex 'root.var.aws_secret_key': walking
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.aws_region"
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.alicloud_password"
2018/03/13 16:37:09 [TRACE] vertex 'root.var.alicloud_password': walking
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.alicloud_access_key"
2018/03/13 16:37:09 [TRACE] vertex 'root.var.alicloud_secret_key': walking
2018/03/13 16:37:09 [TRACE] dag/walk: walking "provider.alicloud"
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.aws_access_key"
2018/03/13 16:37:09 [TRACE] vertex 'root.var.aws_access_key': walking
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.alicloud_cidr_block"
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.alicloud_region"
2018/03/13 16:37:09 [TRACE] vertex 'root.var.alicloud_cidr_block': walking
2018/03/13 16:37:09 [TRACE] vertex 'root.var.alicloud_region': walking
2018/03/13 16:37:09 [TRACE] vertex 'root.var.aws_region': walking
2018/03/13 16:37:09 [TRACE] vertex 'root.provider.alicloud': walking
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.alicloud_vpc_name"
2018/03/13 16:37:09 [TRACE] vertex 'root.var.alicloud_vpc_name': walking
2018/03/13 16:37:09 [TRACE] vertex 'root.var.alicloud_access_key': walking
2018/03/13 16:37:09 [TRACE] vertex 'root.provider.alicloud': evaluating
2018/03/13 16:37:09 [TRACE] [walkInput] Entering eval tree: provider.alicloud
2018/03/13 16:37:09 [TRACE] root: eval: *terraform.EvalSequence
2018/03/13 16:37:09 [TRACE] root: eval: *terraform.EvalInitProvider
2018-03-13T16:37:09.897+0800 [DEBUG] plugin: starting plugin: path=/Users/hanyouqing/Work/github.com/icmdb/applications/demo/tpl/.terraform/plugins/darwin_amd64/terraform-provider-alicloud_v1.8.1_x4 args=[/Users/hanyouqing/Work/github.com/icmdb/applications/demo/tpl/.terraform/plugins/darwin_amd64/terraform-provider-alicloud_v1.8.1_x4]
2018-03-13T16:37:09.902+0800 [DEBUG] plugin: waiting for RPC address: path=/Users/hanyouqing/Work/github.com/icmdb/applications/demo/tpl/.terraform/plugins/darwin_amd64/terraform-provider-alicloud_v1.8.1_x4
2018-03-13T16:37:10.138+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: 2018/03/13 16:37:10 [DEBUG] plugin: plugin address: unix /var/folders/31/3h5llf9d7g7b916t0l89dnvh0000gn/T/plugin015133682
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalOpFilter
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalSequence
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalGetProvider
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalInputProvider
2018/03/13 16:37:10 [TRACE] root: eval: terraform.EvalNoop
2018/03/13 16:37:10 [TRACE] root: eval: terraform.EvalNoop
2018/03/13 16:37:10 [TRACE] root: eval: terraform.EvalNoop
2018/03/13 16:37:10 [TRACE] [walkInput] Exiting eval tree: provider.alicloud
2018/03/13 16:37:10 [TRACE] dag/walk: walking "alicloud_vpc.demo"
2018/03/13 16:37:10 [TRACE] vertex 'root.alicloud_vpc.demo': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "provider.alicloud (close)"
2018/03/13 16:37:10 [TRACE] vertex 'root.provider.alicloud (close)': walking
2018/03/13 16:37:10 [TRACE] vertex 'root.provider.alicloud (close)': evaluating
2018/03/13 16:37:10 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)"
2018/03/13 16:37:10 [TRACE] [walkInput] Entering eval tree: provider.alicloud (close)
2018/03/13 16:37:10 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalCloseProvider
2018/03/13 16:37:10 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating
2018/03/13 16:37:10 [TRACE] [walkInput] Entering eval tree: meta.count-boundary (count boundary fixup)
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2018/03/13 16:37:10 [TRACE] [walkInput] Exiting eval tree: meta.count-boundary (count boundary fixup)
2018/03/13 16:37:10 [TRACE] [walkInput] Exiting eval tree: provider.alicloud (close)
2018/03/13 16:37:10 [TRACE] dag/walk: walking "root"
2018/03/13 16:37:10 [TRACE] vertex 'root.root': walking
2018/03/13 16:37:10 [INFO] terraform: building graph: GraphTypeValidate
2018/03/13 16:37:10 [TRACE] ConfigTransformer: Starting for path: []
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ConfigTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.LocalTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.OutputTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.OrphanResourceTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.OrphanOutputTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
2018/03/13 16:37:10 [TRACE] AttachResourceConfigTransformer: Beginning...
2018/03/13 16:37:10 [TRACE] AttachResourceConfigTransformer: Attach resource config request: alicloud_vpc.demo
2018/03/13 16:37:10 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"demo", Type:"alicloud_vpc", RawCount:(*config.RawConfig)(0xc420391b90), RawConfig:(*config.RawConfig)(0xc420391b20), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
2018/03/13 16:37:10 [DEBUG] Resource state not found for "alicloud_vpc.demo": alicloud_vpc.demo
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.AttachStateTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.RootVariableTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] ProviderConfigTransformer: Starting for path: []
2018/03/13 16:37:10 [TRACE] Attach provider request: []string{} alicloud
2018/03/13 16:37:10 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"alicloud", Alias:"", Version:"1.8.1", RawConfig:(*config.RawConfig)(0xc420391ab0)}
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ProviderConfigTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.MissingProviderTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [DEBUG] resource alicloud_vpc.demo using provider provider.alicloud
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ProviderTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.PruneProviderTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ParentProviderTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.graphTransformerMulti:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.MissingProvisionerTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ProvisionerTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.graphTransformerMulti:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ModuleVariableTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.RemovedModuleTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.alicloud_access_key" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.alicloud_secret_key" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.alicloud_region" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.alicloud_vpc_name" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.alicloud_vpc_description" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.aws_access_key" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.aws_secret_key" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "alicloud_vpc.demo" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.alicloud_cidr_block" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.aws_region" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "provider.alicloud" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.alicloud_password" references: []
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ReferenceTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.CountBoundaryTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.TargetsTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.CloseProviderTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.CloseProvisionerTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.RootTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.alicloud (close) - *terraform.graphNodeCloseProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.TransitiveReductionTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
alicloud_vpc.demo - *terraform.NodeValidatableResource
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
alicloud_vpc.demo - *terraform.NodeValidatableResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.alicloud (close) - *terraform.graphNodeCloseProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [DEBUG] Starting graph walk: walkValidate
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.alicloud_secret_key"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.alicloud_password"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.alicloud_vpc_name"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.alicloud_cidr_block"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "provider.alicloud (close)"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.aws_secret_key"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.aws_region"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "alicloud_vpc.demo"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.aws_access_key"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "root"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "provider.alicloud"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.alicloud_vpc_description"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.alicloud_access_key"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.alicloud_region"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "provider.alicloud (close)" waiting on "alicloud_vpc.demo"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_access_key"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.aws_secret_key"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_vpc_name"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_password"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_cidr_block"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "alicloud_vpc.demo"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "alicloud_vpc.demo" waiting on "provider.alicloud"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "root" waiting on "provider.alicloud (close)"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_region"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_vpc_description"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.aws_region"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.aws_access_key"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_secret_key"
2018/03/13 16:37:10 [TRACE] dag/walk: dependencies changed for "alicloud_vpc.demo", sending new deps
2018/03/13 16:37:10 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2018/03/13 16:37:10 [TRACE] dag/walk: dependencies changed for "provider.alicloud (close)", sending new deps
2018/03/13 16:37:10 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.alicloud_password"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.alicloud_password': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.alicloud_vpc_name"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.alicloud_vpc_name': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.aws_access_key"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.aws_access_key': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.alicloud_cidr_block"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.alicloud_cidr_block': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "provider.alicloud"
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.alicloud_vpc_description"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.alicloud_vpc_description': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.alicloud_secret_key"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.alicloud_secret_key': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.alicloud_access_key"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.alicloud_access_key': walking
2018/03/13 16:37:10 [TRACE] vertex 'root.provider.alicloud': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.aws_secret_key"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.aws_secret_key': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.alicloud_region"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.alicloud_region': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.aws_region"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.aws_region': walking
2018/03/13 16:37:10 [TRACE] vertex 'root.provider.alicloud': evaluating
2018/03/13 16:37:10 [TRACE] [walkValidate] Entering eval tree: provider.alicloud
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalSequence
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalInitProvider
2018/03/13 16:37:10 [TRACE] root: eval: terraform.EvalNoop
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalOpFilter
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalSequence
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalGetProvider
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalValidateProvider
2018/03/13 16:37:10 [TRACE] root: eval: terraform.EvalNoop
2018/03/13 16:37:10 [TRACE] root: eval: terraform.EvalNoop
2018/03/13 16:37:10 [TRACE] [walkValidate] Exiting eval tree: provider.alicloud
2018/03/13 16:37:10 [TRACE] dag/walk: walking "alicloud_vpc.demo"
2018/03/13 16:37:10 [TRACE] vertex 'root.alicloud_vpc.demo': walking
2018/03/13 16:37:10 [TRACE] vertex 'root.alicloud_vpc.demo': evaluating
2018/03/13 16:37:10 [TRACE] [walkValidate] Entering eval tree: alicloud_vpc.demo
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalSequence
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalInterpolate
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalIf
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalValidateCount
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2018/03/13 16:37:10 [TRACE] [walkValidate] Exiting eval tree: alicloud_vpc.demo
2018/03/13 16:37:10 [TRACE] vertex 'root.alicloud_vpc.demo': expanding/walking dynamic subgraph
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ResourceCountTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResourceInstance
2018/03/13 16:37:10 [DEBUG] Resource state not found for "alicloud_vpc.demo": alicloud_vpc.demo
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.AttachStateTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResourceInstance
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.TargetsTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResourceInstance
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "alicloud_vpc.demo" references: []
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ReferenceTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResourceInstance
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.RootTransformer:
alicloud_vpc.demo - *terraform.NodeValidatableResourceInstance
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "alicloud_vpc.demo"
2018/03/13 16:37:10 [TRACE] dag/walk: walking "alicloud_vpc.demo"
2018/03/13 16:37:10 [TRACE] vertex 'root.alicloud_vpc.demo': walking
2018/03/13 16:37:10 [TRACE] vertex 'root.alicloud_vpc.demo': evaluating
2018/03/13 16:37:10 [TRACE] [walkValidate] Entering eval tree: alicloud_vpc.demo
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalSequence
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalGetProvider
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalInterpolate
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalValidateResource
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: panic: interface conversion: interface {} is string, not int
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4:
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: goroutine 50 [running]:
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/alicloud.validateIntegerInRange.func1(0x1bf9600, 0xc420444370, 0x1e7e12b, 0xb, 0x0, 0x0, 0x400204442b0, 0x10, 0xc42031b258, 0x10104f7)
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/alicloud/validators.go:558 +0x2e4
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.schemaMap.validatePrimitive(0xc42037de30, 0x1e7e12b, 0xb, 0x1bf9600, 0xc420444160, 0xc4203d9e00, 0xc42044a060, 0x98, 0x0, 0xc42044c0c9, ...)
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/schema.go:1490 +0x510
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.schemaMap.validateType(0xc42037de30, 0x1e7e12b, 0xb, 0x1bf9600, 0xc420444160, 0xc4203d9e00, 0xc42044a060, 0xc42044c0c8, 0x0, 0x0, ...)
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/schema.go:1509 +0x5e5
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.schemaMap.validate(0xc42037de30, 0x1e7e12b, 0xb, 0xc4203d9e00, 0xc42044a060, 0x1, 0x0, 0x0, 0x0, 0x0, ...)
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/schema.go:1162 +0x20a
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.schemaMap.validateObject(0xc42037de30, 0x0, 0x0, 0xc42037de30, 0xc42044a060, 0xc4204441a0, 0x100dfa4, 0x1d7a5c0, 0x1cde4e0, 0xc4204441a0, ...)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/schema.go:1403 +0x1bf
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.schemaMap.Validate(0xc42037de30, 0xc42044a060, 0x1cde4e0, 0xc4204441a0, 0x1d7a5c0, 0xc42044a150, 0x1d7a5c0, 0x100ba5e)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/schema.go:542 +0x50
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.(*Resource).Validate(0xc4203b19e0, 0xc42044a060, 0xc42044c0b0, 0xc, 0xc4203f87e0, 0x1, 0x0, 0x0)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/resource.go:236 +0x50
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.(*Provider).ValidateResource(0xc4202eb260, 0xc42044c0b0, 0xc, 0xc42044a060, 0xc42035dae8, 0xc4202e2b28, 0x10104f7, 0xc42044a180, 0x30, 0x28)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/provider.go:216 +0x1d3
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/plugin.(*ResourceProviderServer).ValidateResource(0xc4202edc80, 0xc420446020, 0xc42044a0f0, 0x0, 0x0)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/plugin/resource_provider.go:463 +0x6e
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: reflect.Value.call(0xc42035daa0, 0xc42030c8d0, 0x13, 0x1e77150, 0x4, 0xc4202e2f20, 0x3, 0x3, 0xc4202f3ee8, 0xc4202bc4f8, ...)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: /usr/local/go/src/reflect/value.go:434 +0x905
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: reflect.Value.Call(0xc42035daa0, 0xc42030c8d0, 0x13, 0xc4202f3f20, 0x3, 0x3, 0xc400000001, 0x0, 0x0)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: /usr/local/go/src/reflect/value.go:302 +0xa4
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: net/rpc.(*service).call(0xc4202d5640, 0xc4203002d0, 0xc4202d67b0, 0xc420327000, 0xc420408240, 0x1bbac80, 0xc420446020, 0x16, 0x1bbacc0, 0xc42044a0f0, ...)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: /usr/local/go/src/net/rpc/server.go:381 +0x142
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: created by net/rpc.(*Server).ServeCodec
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: /usr/local/go/src/net/rpc/server.go:475 +0x36b
2018/03/13 16:37:10 [ERROR] root: eval: *terraform.EvalValidateResource, err: Warnings: []. Errors: [unexpected EOF]
2018/03/13 16:37:10 [ERROR] root: eval: *terraform.EvalSequence, err: Warnings: []. Errors: [unexpected EOF]
2018/03/13 16:37:10 [TRACE] [walkValidate] Exiting eval tree: alicloud_vpc.demo
2018/03/13 16:37:10 [TRACE] dag/walk: walking "provider.alicloud (close)"
2018/03/13 16:37:10 [TRACE] vertex 'root.provider.alicloud (close)': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)"
2018/03/13 16:37:10 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking
2018/03/13 16:37:10 [TRACE] vertex 'root.provider.alicloud (close)': evaluating
2018/03/13 16:37:10 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating
2018/03/13 16:37:10 [TRACE] [walkValidate] Entering eval tree: meta.count-boundary (count boundary fixup)
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2018/03/13 16:37:10 [TRACE] [walkValidate] Entering eval tree: provider.alicloud (close)
2018/03/13 16:37:10 [TRACE] [walkValidate] Exiting eval tree: meta.count-boundary (count boundary fixup)
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalCloseProvider
2018/03/13 16:37:10 [TRACE] [walkValidate] Exiting eval tree: provider.alicloud (close)
2018/03/13 16:37:10 [TRACE] dag/walk: walking "root"
2018/03/13 16:37:10 [TRACE] vertex 'root.root': walking
2018/03/13 16:37:10 [DEBUG] plugin: waiting for all plugin processes to complete...
2018-03-13T16:37:10.157+0800 [WARN ] plugin: error closing client during Kill: err="connection is shut down"
2018-03-13T16:37:10.157+0800 [DEBUG] plugin: plugin process exited: path=/Users/hanyouqing/Work/github.com/icmdb/applications/demo/tpl/.terraform/plugins/darwin_amd64/terraform-provider-alicloud_v1.8.1_x4
resource "alicloud_instance" -> resource "alicloud_security_group"
when alicloud_security_group has been successful created๏ผbut alicloud_instance return error, can terraform autmatically rollback and delete alicloud_security_group?
Hello,
We are experiencing an issue when attempting to create a new cs_application. The terraform apply returns with an error but the cs_application does deploy successfully. The issue seems to be that the provider is passing the application name instead of the cluster name when attempting to monitor application creation status, hence returning a Instance.Notfound error
Terraform v0.11.10
Error: Error applying plan:
1 error(s) occurred:
* module.module_name.alicloud_cs_application.main: 1 error(s) occurred:
* alicloud_cs_application.main: Waitting for container application "running" got an error: &alicloud.ProviderError{errorCode:"Instance.Notfound", message:"The specified Container Cluster my_test_cs_app is not found."}
Notice that the error say's my_test_cs_app when expected result would be a my_test_cs_cluster.
I believe the issue is due to a change a change from version 1.19.0 to 1.20.0. Specifically changes for - Support provider thread safety [GH-432] which modified line 74 of file alicloud/service_alicloud_cs.go
changing clusterName
to appName
Hi,
The OSS lifecycle rule is missing the ability to transition files between different storage classes, which is supported by the API.
https://www.terraform.io/docs/providers/alicloud/r/oss_bucket.html#block-lifecycle_rule
This issue was originally opened by @nobjohns as hashicorp/terraform#18289. It was migrated here as a result of the provider split. The original body of the issue is below.
Terraform v0.11.7
Not Applicable
[root@localhost]# docker run -i -t -v $(pwd):/app/ -w /app/ ' hashicorp/terraform:light plan
Refreshing Terraform state in-memory prior to plan...
The refreshed state will be used to calculate this plan, but will not be
persisted to local or remote state storage.
Error: Error refreshing state: 1 error(s) occurred:
* provider.alicloud: unexpected EOF
panic: open /usr/local/go/lib/time/zoneinfo.zip: no such file or directory
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4:
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: goroutine 40 [running]:
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/utils.GetTimeInFormatISO8601(0x1543300, 0xc42018fb60)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/utils/utils.go:57 +0x142
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/auth.completeRpcSignParams(0x2f0a660, 0xc42041aba0, 0x2ef6980, 0xc42000cb48, 0x1867be8, 0xa, 0x0, 0x0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/auth/rpc_signature_composer.go:47 +0x1e1
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/auth.signRpcRequest(0x2f0a660, 0xc42041aba0, 0x2ef6980, 0xc42000cb48, 0x1867be8, 0xa, 0xc4202b31d8, 0x7)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/auth/rpc_signature_composer.go:26 +0x73
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/auth.Sign(0x2f0a660, 0xc42041aba0, 0x2ef6980, 0xc42000cb48, 0x1867be8, 0xa, 0x134d0bb, 0x8)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/auth/signer.go:87 +0x2a1
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk.buildHttpRequest(0x2f0a660, 0xc42041aba0, 0x2ef6980, 0xc42000cb48, 0x1867be8, 0xa, 0x200202b3260, 0x8, 0x8)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/client.go:282 +0x84
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk.(*Client).DoActionWithSigner(0xc420060640, 0x2f0a660, 0xc42041aba0, 0x2ef6b60, 0xc42000cb60, 0x0, 0x0, 0x1, 0xc42014fac0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/client.go:236 +0x3bd
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk.(*Client).DoAction(0xc420060640, 0x2f0a660, 0xc42041aba0, 0x2ef6b60, 0xc42000cb60, 0xb10000000170b600, 0xb1aa64e6adba15ff)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/client.go:151 +0x65
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk.(*Client).ProcessCommonRequest(0xc420060640, 0xc42041aba0, 0x0, 0xc4200666c0, 0xc42018fb70)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/client.go:388 +0xa7
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk.(*Client).ProcessCommonRequest-fm(0xc42041aba0, 0xc42018fb60, 0x1861699, 0x4)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/client.go:170 +0x34
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/endpoints.(*LocationResolver).TryResolve(0x2f935c0, 0xc42041ab40, 0x0, 0x0, 0xc42017f500, 0x0, 0x0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/endpoints/location_resolver.go:70 +0x5a5
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/endpoints.Resolve(0xc42041ab40, 0xc4203d88f0, 0x7, 0x12, 0xc420066408)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/endpoints/resolver.go:40 +0x8a
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk.(*Client).DoActionWithSigner(0xc420060640, 0x2f180a0, 0xc420072cb0, 0x2efb360, 0xc42018fb00, 0x0, 0x0, 0xa6387b68bb3fc701, 0xc42014fa80)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/client.go:217 +0x2f4
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk.(*Client).DoAction(0xc420060640, 0x2f180a0, 0xc420072cb0, 0x2efb360, 0xc42018fb00, 0x0, 0xc420066360)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/client.go:151 +0x65
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/services/ecs.(*Client).DescribeRegions(0xc420060640, 0xc420072cb0, 0x186f7f2, 0x11, 0xc4200663f8)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/services/ecs/describe_regions.go:27 +0x9b
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/alicloud.(*Config).ecsConn(0xc4202b3a38, 0x0, 0x0, 0xc42041f0e0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/alicloud/config.go:178 +0x50f
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/alicloud.(*Config).Client(0xc420403a38, 0x186f48f, 0x11, 0x149f2c0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/alicloud/config.go:71 +0x67
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/alicloud.providerConfigure(0xc420072c40, 0xc420072c40, 0xc420107f80, 0xc420218660, 0x0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/alicloud/provider.go:167 +0x2e6
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.(*Provider).Configure(0xc42021bb90, 0xc420107f80, 0xc420218620, 0xc420218640)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/provider.go:240 +0xdf
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/plugin.(*ResourceProviderServer).Configure(0xc420219600, 0xc420107f80, 0xc42000c8b0, 0x0, 0x0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/plugin/resource_provider.go:478 +0x42
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: reflect.Value.call(0xc4202fd3e0, 0xc42000c018, 0x13, 0x18614d5, 0x4, 0xc4203a2f20, 0x3, 0x3, 0xc4203bfee8, 0xc42030a098, ...)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /usr/local/go/src/reflect/value.go:434 +0x905
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: reflect.Value.Call(0xc4202fd3e0, 0xc42000c018, 0x13, 0xc4203bff20, 0x3, 0x3, 0xc400000003, 0x0, 0x0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /usr/local/go/src/reflect/value.go:302 +0xa4
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: net/rpc.(*service).call(0xc42014e100, 0xc420060050, 0xc42046a050, 0xc42006a080, 0xc4202180a0, 0x16b75c0, 0xc420107f80, 0x16, 0x143ffa0, 0xc42000c8b0, ...)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /usr/local/go/src/net/rpc/server.go:381 +0x142
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: created by net/rpc.(*Server).ServeCodec
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: /usr/local/go/src/net/rpc/server.go:475 +0x36b
2018-06-20T05:14:30.859Z [DEBUG] plugin: plugin process exited: path=/app/.terraform/plugins/linux_amd64/terraform-provider-alicloud_v1.9.4_x4
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!
Terraform crashed! This is always indicative of a bug within Terraform.
A crash log has been placed at "crash.log" relative to your current
working directory. It would be immensely helpful if you could please
report the crash with Terraform[1] so that we can fix this.
When reporting bugs, please include your terraform version. That
information is available on the first line of crash.log. You can also
get it by running 'terraform --version' on the command line.
[1]: https://github.com/hashicorp/terraform/issues
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!
[root@localhost]#
terraform plan
should complete successfully.
terraform plan
getting crashed.
docker run -i -t -v $(pwd):/app/ -w /app/ ' hashicorp/terraform:light plan
I saw the terraform docs https://www.terraform.io/docs/providers/alicloud/index.html, but I cannot find out the way for creating MongoDB and Redis.
Is that feature still in backlog? If yes, any ETA on making them live?
Thanks!
Hi there,
Thank you for opening an issue. Please note that we try to keep the Terraform issue tracker reserved for bug reports and feature requests. For general usage questions, please see: https://www.terraform.io/community.html.
Terraform v0.11.1
I check the documents here:
http://47.95.33.19:4567/docs/providers/alicloud/d/instance_types.html
###issue
Error: alicloud_key_pairs.prod_ops: Provider doesn't support resource: alicloud_key_pairs
Hi, Could you add support for starter packages which is similar to AWS Lightsail.
https://www.alibabacloud.com/starter-packages/general
Thank you
Terraform v0.11.11
I have read the document but found nothing related.
The back to resource feature is not enabled by default.
Hi,
When you create an instance from Aliyun console, you can select Random availability and you are kinda of sure that the zone will have room for your new instance.
If there is a chance we could have this feature too? So we don't have to fill an availability zone and it just select one available when creating an instance?
Thanks.
Hello,
Please add support for https
connection in provider configuration. Currently, all requests to AliCloud API are sent via HTTP protocol which is not secure and contains sensitive data like access key.
Example:
provider "alicloud" {
access_key = "..."
secret_key = "..."
region = "...region..."
https = true
}
This issue is very urgent from a security perspective.
Thanks,
Terraform is able to create zero node swarm clusters, as these clusters are in the Inactive state when created and terraform expects running state it fails:
* alicloud_cs_swarm.main: Waitting for container Cluster "running" got an error: &common.Error{ErrorResponse:common.ErrorResponse{Response:common.Response{RequestId:""}, HostId:"", Code:"AliyunGoClientFailure", Message:"Timeout"}, StatusCode:-1}
Hi, when pushing updated image to instances, the SSH key is not updated.
Which means I need to terraform apply twice, once to "update the images", and second to "update the SSH keys", which is very inefficient and can lead to issues /long downtime when deploying.
Terraform will perform the following actions:
~ alicloud_instance.ecs_instance[0]
image_id: "m-gw8g2nxu7rpl1i6hlqqv" => "m-gw8g2nxu7rpl3baibjxk"
~ alicloud_instance.ecs_instance[1]
image_id: "m-gw8g2nxu7rpl1i6hlqqv" => "m-gw8g2nxu7rpl3baibjxk"
~ alicloud_instance.ecs_instance[2]
image_id: "m-gw8g2nxu7rpl1i6hlqqv" => "m-gw8g2nxu7rpl3baibjxk"
~ alicloud_instance.ecs_instance[3]
image_id: "m-gw8g2nxu7rpl1i6hlqqv" => "m-gw8g2nxu7rpl3baibjxk"
Any clue how to solve this ?
Thanks !
$ terraform -v
Terraform v0.11.8
+ provider.alicloud v1.26.0
provider "alicloud" {
region = "cn-hangzhou"
}
provider "alicloud" {
region = "cn-hangzhou"
}
data "alicloud_instance_types" "default" {
cpu_core_count = "1"
memory_size = "2"
}
data.alicloud_instance_types.default: Refreshing state...
Error: Error refreshing state: 1 error(s) occurred:
* data.alicloud_instance_types.default: 1 error(s) occurred:
* data.alicloud_instance_types.default: data.alicloud_instance_types.default: Error DescribeAvailableResource: &errors.ClientError{errorCode:"SDK.CanNotResolveEndpoint", message:"Can not resolve endpoint(param = {\"Domain\":\"\",\"Product\":\"Ecs\",\"RegionId\":\"cn-hangzhou\",\"LocationProduct\":\"ecs\",\"LocationEndpointType\":\"openAPI\"}), please check the user guide\n ", originError:(*errors.ServerError)(0xc4205467e0)}
I knew this problem can be fixed by two ways:
ALICLOUD_ACCESS_KEY, ALICLOUD_SECRET_KEY, ALICLOUD_REGION
$ export ALICLOUD_ACCESS_KEY="anaccesskey"
$ export ALICLOUD_SECRET_KEY="asecretkey"
$ export ALICLOUD_REGION="cn-hangzhou"
$ terraform plan
provider "alicloud" {
access_key = "${var.access_key}"
secret_key = "${var.secret_key}"
region = "${var.region}"
}
But my expectation is,
~/.aliyun/config.json
as well, since aliyun-cli
sets and use it as default.Check below codes, seems it only supports first two way currently
get access keys from ~/.aliyun/config.json
as well
Alibaba Cloud API supports SQL Server 2016 Deployment. However current provider supports up to SQL Server 2012.
Here is the list of supported DB's https://www.alibabacloud.com/help/doc-detail/26228.htm.
This issue was originally opened by @bhordupur as hashicorp/terraform#16857. It was migrated here as a result of the provider split. The original body of the issue is below.
Terraform v0.11.1
###Skipped the rest
variable "private_key_file" {
default = "alicloud_ssh_key.pem"
}
variable "key_name" {
default = "key-pair-from-terraform"
}
resource "alicloud_key_pair" "key_pair" {
key_name = "${var.key_name}"
key_file = "${var.private_key_file}"
}
resource "alicloud_instance" "instance" {
instance_name = "${var.short_name}-${var.role}-${format(var.count_format, count.index+1)}"
host_name = "${var.short_name}-${var.role}-${format(var.count_format, count.index+1)}"
image_id = "${var.image_id}"
instance_type = "${data.alicloud_instance_types.instance_type.instance_types.0.id}"
count = "${var.count}"
availability_zone = "${var.availability_zones}"
security_groups = ["${alicloud_security_group.group.*.id}"]
internet_charge_type = "${var.internet_charge_type}"
internet_max_bandwidth_out = "${var.internet_max_bandwidth_out}"
io_optimized = "optimized"
password = "${var.ecs_password}"
key_name = "${alicloud_key_pair.key_pair.id}"
allocate_public_ip = "${var.allocate_public_ip}"
instance_charge_type = "PostPaid"
system_disk_category = "${var.disk_category}"
vswitch_id = "${alicloud_vswitch.main.id}"
tags {
role = "${var.role}"
dc = "${var.datacenter}"
}
}
Affected Resource(s)
Error: alicloud_instance.instance[0]: : invalid or unknown key: key_name
Error: alicloud_instance.instance[1]: : invalid or unknown key: key_name
Error: alicloud_key_pair.key_pair: Provider doesn't support resource: alicloud_key_pair
terraform plan
Hi there,
I have read the latest document and related PR #605 , I found some HTTPS configuration for resource alicloud_cdn_domain
are still missing.
IMHO, some configures are important, including
Thanks
since provider version 1.23, we have a problem, when accessing our SLBs with terraform.
The provider always tries to set the parameter "tls_cipher_policy" although we use a shared SLB and the parameter is only available for small and bigger load-balancers (as documented in the terraform docu).
In our scripts we do not use this parameter at all.
Maybe the problems are caused by creating the SLB with an earlier version of the provider and now changing its configuration with the new version?
Error outputs:
module.frontend_slb.alicloud_slb_listener.https: Modifying... (ID: lb-ge138me9ghojk0obfjhzn:443)
tls_cipher_policy: "tls_cipher_policy_1_0" => ""
2018/11/28 01:00:58 [ERROR] root.frontend_slb: eval: *terraform.EvalApplyPost, err: 1 error(s) occurred:
alicloud_slb_listener.https: SetLoadBalancerHTTPSListenerAttribute got an error: &errors.ServerError{httpStatus:400, requestId:"C16D8538-7771-4244-847E-30A7E4D7014A", hostId:"slb.eu-central-1.aliyuncs.com", errorCode:"InvalidParameter.SpecNotSupport", recommend:"", message:"The loadBalancer of shared spec doesn't support the parameter: TlsCipherPolicy.", comment:""}
2018/11/28 01:00:58 [ERROR] root.frontend_slb: eval: *terraform.EvalSequence, err: 1 error(s) occurred:
alicloud_slb_listener.https: SetLoadBalancerHTTPSListenerAttribute got an error: &errors.ServerError{httpStatus:400, requestId:"C16D8538-7771-4244-847E-30A7E4D7014A", hostId:"slb.eu-central-1.aliyuncs.com", errorCode:"InvalidParameter.SpecNotSupport", recommend:"", message:"The loadBalancer of shared spec doesn't support the parameter: TlsCipherPolicy.", comment:""}
2018/11/28 01:00:58 [DEBUG] Uploading remote state to S3: {
Body: buffer(0xc000338d20),
Bucket: "w2b-int-terraform-state",
ContentLength: 18333,
ContentType: "application/json",
Key: "eu-central-1/frontend-slb.tfstate"
}
I have a mongo DB instance on alicloud which has 2 nodes in replica mode. When I try to load this info via alicloud_mongo_instances
it loads data about the mongo instance but the list of nodes under mongos
is empty. In my state file I see the following, which is incorrect:
"instances.0.mongos.#": "0",
Without being able to load any info about the replica nodes I can't construct a mongo URL for my services to use.
Terraform v0.11.11
provider.alicloud v1.26.0
Please list the resources as a list, for example:
data "alicloud_mongo_instances" "example" {
name_regex = "test"
}
The provider allows you to create log projects, log stores and machine groups, but is currently missing the ability to create a logtail configuration assigned to a log store, and to map it to a machine group.
Hi
Could I request that support to create manage and destroy NAS and services such as NAS sync are supported by the provider, please?
I have a problem updating or even accesing an exiting SLB with version 1.26
With the same scripts with 1.25 everything works.
The error is as follows:
Error: Error refreshing state: 1 error(s) occurred:
module.frontend_slb.alicloud_slb_listener.https: 1 error(s) occurred:
module.frontend_slb.alicloud_slb_listener.https: alicloud_slb_listener.https: DescribeLoadBalancerHTTPSListenerAttribute got an error: &errors.ServerError{httpStatus:404, requestId:"643DB6D0-3942-4ED9-BC4B-E368BC12056F", hostId:"slb.aliyuncs.com", errorCode:"InvalidLoadBalancerId.NotFound", recommend:"", message:"The specified LoadBalancerId does not exist.", comment:""}
A manual call of DescribeLoadBalancerHTTPSListenerAttribute is also working without any issues.
The problem exists for all my SLBs.
Minimal Skript:
terraform {
required_version = "~> 0.11"
}
provider "alicloud" {
region = "eu-central-1"
version = "1.26"
}
resource "alicloud_slb" "milestone" {
name = "w2b-dev-milestone-slb"
internet = true
internet_charge_type = "PayByTraffic"
}
resource "alicloud_slb_listener" "https" {
bandwidth = -1
load_balancer_id = "${alicloud_slb.milestone.id}"
scheduler = "wlc"
backend_port = "80"
frontend_port = "8888"
protocol = "https"
}
Hi there,
I am not sure if this is an intended fix/change or just a side effect of moving to RunInstances (#514). The error shows up for > 1.25.0 but is fine for < 1.24.0.
0.11.11
Please list the resources as a list, for example:
main.tf
provider "alicloud" {}
resource "alicloud_instance" "test" {
count = 2
image_id = "${var.image_id}"
instance_type = "${var.instance_type}"
security_groups = ["${alicloud_security_group.default.id}"]
tags = "${var.tag}"
}
resource "alicloud_security_group" "default" {
name = "default"
description = "default"
}
variables.tf
variable "tag" {
type = "map"
default = {
"consul" = "server.test"
}
}
variable "instance_type" {
default = "ecs.n4.small"
}
variable "image_id" {
default = "centos_7_04_64_20G_alibase_201701015.vhd"
}
An instance should be created.
Error: Error applying plan:
2 error(s) occurred:
* alicloud_instance.test[0]: 1 error(s) occurred:
* alicloud_instance.test.0: Error creating Aliyun ecs instance: &errors.ServerError{httpStatus:400, requestId:"F5CDE3A6-C2E9-418F-A8D8-EA70D68839F9", hostId:"ecs-cn-hangzhou.aliyuncs.com", errorCode:"InvalidParameter.VSwitchId", recommend:"", message:"VSwitch id is required.", comment:""}
* alicloud_instance.test[1]: 1 error(s) occurred:
* alicloud_instance.test.1: Error creating Aliyun ecs instance: &errors.ServerError{httpStatus:400, requestId:"452C1FF6-2637-4A29-8D6E-757FA6B74D08", hostId:"ecs-cn-hangzhou.aliyuncs.com", errorCode:"InvalidParameter.VSwitchId", recommend:"", message:"VSwitch id is required.", comment:""}
terraform apply
This example code does not work.
A much simpler version of this code with just the VPC, vswitch, instance and security group also fails.
An even simpler version relying on a pre-existing default VPC also fails.
This problem was experienced with:
Terraform v0.11.10
Error: Error applying plan:
3 error(s) occurred:
alicloud_instance.instance[2]: 1 error(s) occurred:
alicloud_instance.instance.2: Error creating Aliyun ecs instance: &errors.ServerError{httpStatus:404, requestId:"D7BEACCB-B4E6-4CB5-8CCA-A8154B412714", hostId:"ecs-cn-hangzhou.aliyuncs.com", errorCode:"InvalidSecurityGroupId", recommend:"", message:"The specified SecurityGroupId is invalid or does not exist.", comment:""}
alicloud_instance.instance[0]: 1 error(s) occurred:
alicloud_instance.instance.0: Error creating Aliyun ecs instance: &errors.ServerError{httpStatus:404, requestId:"9218F860-ACE9-4D38-B338-6332E9D02809", hostId:"ecs-cn-hangzhou.aliyuncs.com", errorCode:"InvalidSecurityGroupId", recommend:"", message:"The specified SecurityGroupId is invalid or does not exist.", comment:""}
alicloud_instance.instance[1]: 1 error(s) occurred:
alicloud_instance.instance.1: Error creating Aliyun ecs instance: &errors.ServerError{httpStatus:404, requestId:"A35CE05A-79E7-4666-8247-52945EEA0D2D", hostId:"ecs-cn-hangzhou.aliyuncs.com", errorCode:"InvalidSecurityGroupId", recommend:"", message:"The specified SecurityGroupId is invalid or does not exist.", comment:""}
$ terraform -v
Terraform v0.11.11
alicloud provider: 1.28.0
Please list the resources as a list, for example:
alicloud_kv_store
N/A
Warning: provider.alicloud: "fc": [DEPRECATED] Field 'fc' has been deprecated from provider version 1.28.0. New field 'fc' which in nested endpoints instead.
Warning: provider.alicloud: "log_endpoint": [DEPRECATED] Field 'log_endpoint' has been deprecated from provider version 1.28.0. New field 'log' which in nested endpoints instead.
Warning: provider.alicloud: "mns_endpoint": [DEPRECATED] Field 'mns_endpoint' has been deprecated from provider version 1.28.0. New field 'mns' which in nested endpoints instead.
N/A
should not have warning
below terraform
resource
provider "alicloud" {
access_key = "xxxx"
secret_key = "xxxxxx"
region = "cn-shenzhen"
}
resource "alicloud_kvstore_instance" "default" {
instance_class = "redis.master.small.default"
instance_name = "myredis"
password = "Passw0rd"
vswitch_id = "vsw-<>"
}
terraform init
terraform apply
N/A
N/A
Hi,
Can "local_subnet" argument for "alicloud_ssl_vpn_server" resource be a list so multiple subnets can be added?
Thanks
$ terraform -v
Terraform v0.11.8
+ provider.alicloud v1.26.0
Please list the resources as a list, for example:
I used the example examples/kubernetes
in this repo
Error: Error refreshing state: 1 error(s) occurred:
* alicloud_cs_kubernetes.k8s: 1 error(s) occurred:
* alicloud_cs_kubernetes.k8s: alicloud_cs_kubernetes.k8s: [ERROR] There is no any nodes in kubernetes cluster cd719983d556945009e0b173599832e6f.
command terraform destroy
is failed
I have to login console, manually delete the cs kubernetes service, and re-run terraform destroy
, it is successful
Hi you guys,
The latest version of AliCloud provider is 0.1. And this version doesn't support few configurations such as alicloud_key_pair_attachment
and alicloud_oss_bucket
.
But on the master branch, I can see the codes for these configurations and I found a documentation sharing these new changes. And all examples from this repository has updated with these configurations.
So, when you guys release the new version for AliCloud provider?
Thanks,
Hi all,
I am creating a set of Alicloud services (vpc, security group, eip ad instance). In my instance, I use a local-exec provisioner (ansible) so it needs the eip ip_address. However, I keep getting the following error:
Error: Error applying plan:
1 error(s) occurred:
* alicloud_instance.nodejs: 1 error(s) occurred:
* Resource 'alicloud_eip.eip' does not have attribute 'ip_address' for variable 'alicloud_eip.eip.ip_address'
Terraform version
Terraform v0.11.1
+ provider.alicloud v0.1.0
Terraform sample:
{
"variable": {
"ali_access_key": {
"default": "**********"
},
"ali_secret_key": {
"default": "*********"
},
"ali_region": {
"default": "cn-hongkong"
},
"ali_image_id": {
"default": "ubuntu_16_0402_64_20G_alibase_20170818.vhd"
},
"ali_io_optimized": {
"default": "optimized"
},
"ali_security_groups": {
"default": ["sg-j6c6v180xrx5me908r6c"]
},
"ali_instance_type": {
"default": "ecs.n1.tiny"
},
"name": {
"default": "node-test"
},
"user_data": {
"default": "cloud-init-ubuntu.yaml"
}
},
"data": {
"alicloud_images": {
"multi_image": {
"owners": "system",
"name_regex": "^ubuntu_16_0402_64"
}
}
},
"provider": {
"alicloud": {
"access_key": "${var.ali_access_key}",
"secret_key": "${var.ali_secret_key}",
"region": "${var.ali_region}"
}
},
"resource": {
"alicloud_vpc": {
"vpc": {
"cidr_block": "10.1.0.0/24",
"name": "oneclick_vpc"
}
}
},
"resource": {
"alicloud_security_group": {
"sg": {
"vpc_id": "${alicloud_vpc.vpc.id}",
"name": "settler_sg"
}
}
},
"resource": {
"alicloud_security_group_rule": {
"allow_ssh": {
"type": "ingress",
"ip_protocol": "tcp",
"nic_type": "intranet",
"policy": "accept",
"port_range": "22/22",
"security_group_id": "${alicloud_security_group.sg.id}",
"cidr_ip": "0.0.0.0/0"
}
}
},
"resource": {
"alicloud_security_group_rule": {
"open_outbound": {
"type": "egress",
"ip_protocol": "tcp",
"nic_type": "intranet",
"policy": "accept",
"port_range": "1/65535",
"security_group_id": "${alicloud_security_group.sg.id}",
"cidr_ip": "0.0.0.0/0"
}
}
},
"resource": {
"alicloud_vswitch": {
"vsw": {
"vpc_id": "${alicloud_vpc.vpc.id}",
"cidr_block": "10.1.0.0/24",
"availability_zone": "cn-hongkong-b"
}
}
},
"resource": {
"alicloud_eip": {
"eip": {
"internet_charge_type": "PayByTraffic"
}
}
},
"resource": {
"alicloud_eip_association": {
"eip_asso": {
"allocation_id": "${alicloud_eip.eip.id}",
"instance_id": "${alicloud_instance.nodejs.id}"
}
}
},
"resource": {
"alicloud_instance": {
"nodejs": {
"instance_type": "${var.ali_instance_type}",
"io_optimized": "${var.ali_io_optimized}",
"image_id": "${var.ali_image_id}",
"instance_name": "${var.name}",
"security_groups": ["${alicloud_security_group.sg.id}"],
"user_data": "${file(\"${var.user_data}\")}",
"vswitch_id": "${alicloud_vswitch.vsw.id}",
"system_disk_category": "cloud_efficiency",
"internet_max_bandwidth_out": 5,
"allocate_public_ip": true,
"provisioner": {
"local-exec": {
"command": "ansible-playbook /v6.yml -i ${alicloud_eip.eip.ip_address}, -u test_user --private-key=id_rsa -e 'ansible_python_interpreter=/usr/bin/python3'"
}
}
}
}
}
}
Steps to reproduce
Expected result
Ansible to run on the eip ip address
As part of the preparation for Terraform v0.12, we would like to migrate all providers to use Go Modules. We plan to continue checking dependencies into vendor/ to remain compatible with existing tooling/CI for a period of time, however go modules will be used for management. Go Modules is the official solution for the go programming language, we understand some providers might not want this change yet, however we encourage providers to begin looking towards the switch as this is how we will be managing all Go projects in the future. Would maintainers please react with ๐ for support, or ๐ if you wish to have this provider omitted from the first wave of pull requests. If your provider is in support, we would ask that you avoid merging any pull requests that mutate the dependencies while the Go Modules PR is open (in fact a total codefreeze would be even more helpful), otherwise we will need to close that PR and re-run go mod init
. Once merged, dependencies can be added or updated as follows:
$ GO111MODULE=on go get github.com/some/module@master
$ GO111MODULE=on go mod tidy
$ GO111MODULE=on go mod vendor
GO111MODULE=on might be unnecessary depending on your environment, this example will fetch a module @ master and record it in your project's go.mod and go.sum files. It's a good idea to tidy up afterward and then copy the dependencies into vendor/. To remove dependencies from your project, simply remove all usage from your codebase and run:
$ GO111MODULE=on go mod tidy
$ GO111MODULE=on go mod vendor
Thank you sincerely for all your time, contributions, and cooperation!
Hi there,
terraform -v
Terraform v0.11.7
alicloud_cs_kubernetes.main: Creating Kubernetes Cluster got an error: &common.Error{ErrorResponse:common.ErrorResponse{Response:common.Response{RequestId:"1E769B2D-2D07-4587-A35B-16170EF46C1A"}, HostId:"", Code:"400", Message:"Aliyun API Error: RequestId: A1CE363D-1E64-471F-A07B-B0537A9EE1E3 Status Code: 404 Code: EntityNotExist.Role Message: The role not exists: acs:ram::5148984587763792:role/aliyuncsdefaultrole."}, StatusCode:400}
We had issues recently when deleting VPCs.
After creating a new VPC with terraform, we added a router interface manually using the aliyun webui.
When trying to delete the VPC on the webui, we get an error message telling us that a resource is using this VPC. Unfortunately, when trying to delete the VPC using terraform, the deletion step last few minutes and timeout without any specific error message.
PS: the router interface was using monthly billing.
Hi,
I created alicloud_dns_record with ttl=300 (which is less than minimum) successfully.
Once I ran "terraform apply" again on scripts with no changes, terraform recognized a change and print:
Terraform will perform the following actions:
~ alicloud_dns_record.dns-jumpbox
ttl: "600" => "300"
If I choose to apply the change, an exception is thrown
alicloud_dns_record.dns-jumpbox: UpdateDomainRecord got an error: &common.Error{ErrorResponse:common.ErrorResponse{Response:common.Response{RequestId:"3F219C8A-5C08-498D-9F4D-11EBC267728C"}, HostId:"alidns.aliyuncs.com", Code:"QuotaExceeded.TTL", Message:"The TTL value is less than the minimum value allowed."}, StatusCode:400}
Example for alicloud_dns_record:
resource "alicloud_dns_record" "dns-jumpbox" {
count = 1
name = ""
host_record = "****"
type = "A"
value = ""
ttl = 300
}
Pls. advise!
๏ผ ~/code/demo_cen/tf ๎ฐ terraform apply ๎ฒ ๏ ๎ฒ 1156 ๎ฒ 12:17:18
data.alicloud_images.default: Refreshing state...
data.alicloud_instance_types.default: Refreshing state...
An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
Terraform will perform the following actions:
alicloud_instance.instance
id:
availability_zone:
description: "js-cen-poc-usw-ecs"
host_name:
image_id: "ubuntu_14_0405_64_20G_alibase_20170824.vhd"
instance_charge_type: "PostPaid"
instance_name: "js-cen-poc-usw-ecs"
instance_type: "ecs.n2.small"
internet_max_bandwidth_out: "0"
key_name:
password:
private_ip:
public_ip:
security_groups.#:
spot_strategy: "NoSpot"
status:
subnet_id:
system_disk_category: "cloud_efficiency"
system_disk_size: "40"
tags.%: "7"
tags.client: "poc for cen "
tags.cpu: "1"
tags.ecs: "ecs.n2.small"
tags.os: "ubuntu_14_0405_64_20G_alibase_20170824.vhd"
tags.ram: "4"
tags.region: "usw"
tags.tf_creater: "jianhua.shao at alibaba-inc.com"
alicloud_security_group.group
id:
description: "js-cen-poc-usw-sg"
inner_access: "true"
name: "js-cen-poc-usw-sg"
Plan: 2 to add, 0 to change, 0 to destroy.
Do you want to perform these actions?
Terraform will perform the actions described above.
Only 'yes' will be accepted to approve.
Enter a value: yes
alicloud_security_group.group: Creating...
description: "" => "js-cen-poc-usw-sg"
inner_access: "" => "true"
name: "" => "js-cen-poc-usw-sg"
alicloud_security_group.group: Creation complete after 3s (ID: sg-rj9dsyh39swug82q0aeb)
alicloud_instance.instance: Creating...
availability_zone: "" => ""
description: "" => "js-cen-poc-usw-ecs"
host_name: "" => ""
image_id: "" => "ubuntu_14_0405_64_20G_alibase_20170824.vhd"
instance_charge_type: "" => "PostPaid"
instance_name: "" => "js-cen-poc-usw-ecs"
instance_type: "" => "ecs.n2.small"
internet_max_bandwidth_out: "" => "0"
key_name: "" => ""
password: "" => ""
private_ip: "" => ""
public_ip: "" => ""
security_groups.#: "" => "1"
security_groups.2218672181: "" => "sg-rj9dsyh39swug82q0aeb"
spot_strategy: "" => "NoSpot"
status: "" => ""
subnet_id: "" => ""
system_disk_category: "" => "cloud_efficiency"
system_disk_size: "" => "40"
tags.%: "" => "7"
tags.client: "" => "poc for cen "
tags.cpu: "" => "1"
tags.ecs: "" => "ecs.n2.small"
tags.os: "" => "ubuntu_14_0405_64_20G_alibase_20170824.vhd"
tags.ram: "" => "4"
tags.region: "" => "usw"
tags.tf_creater: "" => "jianhua.shao at alibaba-inc.com"
alicloud_instance.instance: Still creating... (10s elapsed)
alicloud_instance.instance: Still creating... (20s elapsed)
alicloud_instance.instance: Still creating... (30s elapsed)
alicloud_instance.instance: Still creating... (40s elapsed)
alicloud_instance.instance: Still creating... (50s elapsed)
alicloud_instance.instance: Still creating... (1m0s elapsed)
Error: Error applying plan:
1 error(s) occurred:
alicloud_instance.instance: 1 error(s) occurred:
alicloud_instance.instance: unexpected EOF
Terraform does not automatically rollback in the face of errors.
Instead, your Terraform state file has been partially updated with
any resources that successfully completed. Please address the error
above and apply again to incrementally change your infrastructure.
panic: reflect: call of reflect.Value.Set on zero Value
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4:
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: goroutine 193 [running]:
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: reflect.flag.mustBeAssignable(0x0)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /usr/local/go/src/reflect/value.go:227 +0xc5
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: reflect.Value.Set(0x0, 0x0, 0x0, 0x21f5560, 0xc4202b1650, 0x98)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /usr/local/go/src/reflect/value.go:1367 +0x2f
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: github.com/alibaba/terraform-provider/alicloud.setTags(0xc42060a3c0, 0x2639ad8, 0x8, 0xc42028fdc0, 0x1391b19, 0x102d42a)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /Users/heguimin/Projects/go/src/github.com/alibaba/terraform-provider/alicloud/tags.go:64 +0xb17
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: github.com/alibaba/terraform-provider/alicloud.resourceAliyunInstanceUpdate(0xc42028fdc0, 0x26236a0, 0xc42060a3c0, 0x2638018, 0x7)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /Users/heguimin/Projects/go/src/github.com/alibaba/terraform-provider/alicloud/resource_alicloud_instance.go:430 +0xa6
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: github.com/alibaba/terraform-provider/alicloud.resourceAliyunInstanceCreate(0xc42028fdc0, 0x26236a0, 0xc42060a3c0, 0xc42028fdc0, 0x0)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /Users/heguimin/Projects/go/src/github.com/alibaba/terraform-provider/alicloud/resource_alicloud_instance.go:304 +0x724
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: github.com/alibaba/terraform-provider/vendor/github.com/hashicorp/terraform/helper/schema.(*Resource).Apply(0xc4205f9730, 0xc420355540, 0xc420578640, 0x26236a0, 0xc42060a3c0, 0xc4207e5d01, 0xc4202a4b88, 0x108aefc)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /Users/heguimin/Projects/go/src/github.com/alibaba/terraform-provider/vendor/github.com/hashicorp/terraform/helper/schema/resource.go:227 +0x35a
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: github.com/alibaba/terraform-provider/vendor/github.com/hashicorp/terraform/helper/schema.(*Provider).Apply(0xc420232af0, 0xc4203554f0, 0xc420355540, 0xc420578640, 0x23c3540, 0x3d, 0x3d)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /Users/heguimin/Projects/go/src/github.com/alibaba/terraform-provider/vendor/github.com/hashicorp/terraform/helper/schema/provider.go:283 +0xa4
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: github.com/alibaba/terraform-provider/vendor/github.com/hashicorp/terraform/plugin.(*ResourceProviderServer).Apply(0xc4205c0700, 0xc4205785e0, 0xc42066faa0, 0x0, 0x0)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /Users/heguimin/Projects/go/src/github.com/alibaba/terraform-provider/vendor/github.com/hashicorp/terraform/plugin/resource_provider.go:527 +0x57
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: reflect.Value.call(0xc4203fe8a0, 0xc42000e008, 0x13, 0x2634e54, 0x4, 0xc4202a4f18, 0x3, 0x3, 0xc420443300, 0x0, ...)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /usr/local/go/src/reflect/value.go:447 +0x969
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: reflect.Value.Call(0xc4203fe8a0, 0xc42000e008, 0x13, 0xc4203ef718, 0x3, 0x3, 0xc4206d1260, 0xc4205fde00, 0xc4205fdf80)
2018-07-28T12:21:03.300+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /usr/local/go/src/reflect/value.go:308 +0xa4
2018-07-28T12:21:03.300+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: net/rpc.(*service).call(0xc42057a000, 0xc420354410, 0xc42062e050, 0xc42062e080, 0xc4207e6100, 0xc42062c0e0, 0x219e2c0, 0xc4205785e0, 0x16, 0x219e300, ...)
2018-07-28T12:21:03.300+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /usr/local/go/src/net/rpc/server.go:384 +0x14e
2018-07-28T12:21:03.300+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: created by net/rpc.(*Server).ServeCodec
2018-07-28T12:21:03.300+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /usr/local/go/src/net/rpc/server.go:480 +0x43a
2018-07-28T12:21:03.305+0100 [DEBUG] plugin: plugin process exited: path=/Users/jianhuashao/.terraform.d/plugins/darwin_amd64/terraform-provider-alicloud_v1.9.6_x4
2018/07/28 12:21:03 [TRACE] root: eval: *terraform.EvalWriteState
2018/07/28 12:21:03 [TRACE] root: eval: *terraform.EvalApplyProvisioners
2018/07/28 12:21:03 [TRACE] root: eval: *terraform.EvalIf
2018/07/28 12:21:03 [TRACE] root: eval: *terraform.EvalWriteState
2018/07/28 12:21:03 [TRACE] root: eval: *terraform.EvalWriteDiff
2018/07/28 12:21:03 [TRACE] root: eval: *terraform.EvalApplyPost
2018/07/28 12:21:03 [ERROR] root: eval: *terraform.EvalApplyPost, err: 1 error(s) occurred:
alicloud_instance.instance: unexpected EOF
2018/07/28 12:21:03 [ERROR] root: eval: *terraform.EvalSequence, err: 1 error(s) occurred:
alicloud_instance.instance: unexpected EOF
2018/07/28 12:21:03 [TRACE] [walkApply] Exiting eval tree: alicloud_instance.instance
2018/07/28 12:21:03 [TRACE] dag/walk: upstream errored, not walking "meta.count-boundary (count boundary fixup)"
2018/07/28 12:21:03 [TRACE] dag/walk: upstream errored, not walking "provider.alicloud (close)"
2018/07/28 12:21:03 [TRACE] dag/walk: upstream errored, not walking "root"
2018/07/28 12:21:03 [TRACE] Preserving existing state lineage "94b512ec-3fc2-6945-2b34-49b56b6e912b"
2018/07/28 12:21:03 [TRACE] Preserving existing state lineage "94b512ec-3fc2-6945-2b34-49b56b6e912b"
2018/07/28 12:21:03 [TRACE] Preserving existing state lineage "94b512ec-3fc2-6945-2b34-49b56b6e912b"
2018/07/28 12:21:03 [DEBUG] plugin: waiting for all plugin processes to complete...
2018-07-28T12:21:03.308+0100 [WARN ] plugin: error closing client during Kill: err="connection is shut down"
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!
Terraform crashed! This is always indicative of a bug within Terraform.
A crash log has been placed at "crash.log" relative to your current
working directory. It would be immensely helpful if you could please
report the crash with Terraform1 so that we can fix this.
When reporting bugs, please include your terraform version. That
information is available on the first line of crash.log. You can also
get it by running 'terraform --version' on the command line.
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!
๏ผ ~/code/demo_cen/tf ๎ฐ ๎ฒ 1 โต ๎ฒ 1157 ๎ฒ 12:21:03
๏ผ ~/code/demo_cen/tf ๎ฐ terraform refresh ๎ฒ 1 โต ๎ฒ 1157 ๎ฒ 12:22:18
alicloud_security_group.group: Refreshing state... (ID: sg-rj9dsyh39swug82q0aeb)
data.alicloud_instance_types.default: Refreshing state...
data.alicloud_images.default: Refreshing state...
๏ผ ~/code/demo_cen/tf ๎ฐ ๎ฒ ๏ ๎ฒ 1158 ๎ฒ 12:22:30
๏ผ ~/code/demo_cen/tf ๎ฐ terraform show ๎ฒ ๏ ๎ฒ 1158 ๎ฒ 12:22:32
alicloud_security_group.group:
id = sg-rj9dsyh39swug82q0aeb
description = js-cen-poc-usw-sg
inner_access = true
name = js-cen-poc-usw-sg
vpc_id = vpc-rj9od80zzslduvagac7c9
data.alicloud_images.default:
id = 3536887862
images.# = 1
images.0.architecture = x86_64
images.0.creation_time = 2017-08-28T03:27:44Z
images.0.description =
images.0.disk_device_mappings.# = 0
images.0.id = ubuntu_14_0405_64_20G_alibase_20170824.vhd
images.0.image_id = ubuntu_14_0405_64_20G_alibase_20170824.vhd
images.0.image_owner_alias = system
images.0.image_version =
images.0.is_copied = false
images.0.is_self_shared =
images.0.is_subscribed = false
images.0.is_support_io_optimized = true
images.0.name = ubuntu_14_0405_64_20G_alibase_20170824.vhd
images.0.os_name = Ubuntu 14.04 64ไฝ
images.0.os_type = linux
images.0.platform = Ubuntu
images.0.product_code =
images.0.progress = 100%
images.0.size = 20
images.0.state = Available
images.0.status = Available
images.0.tags.% = 0
images.0.usage = instance
most_recent = true
name_regex = ^ubuntu_14.*_64
output_file = ./output/alicloud_images_sh.txt
owners = system
data.alicloud_instance_types.default:
id = 1640570476
cpu_core_count = 1
instance_charge_type = PostPaid
instance_types.# = 2
instance_types.0.availability_zones.# = 1
instance_types.0.availability_zones.0 = us-west-1b
instance_types.0.burstable_instance.% = 2
instance_types.0.burstable_instance.baseline_credit = 0
instance_types.0.burstable_instance.initial_credit = 0
instance_types.0.cpu_core_count = 1
instance_types.0.eni_amount = 1
instance_types.0.family = ecs.n2
instance_types.0.gpu.% = 2
instance_types.0.gpu.amount = 0
instance_types.0.gpu.category =
instance_types.0.id = ecs.n2.small
instance_types.0.local_storage.% = 3
instance_types.0.local_storage.amount = 0
instance_types.0.local_storage.capacity = 0
instance_types.0.local_storage.category =
instance_types.0.memory_size = 4
instance_types.1.availability_zones.# = 2
instance_types.1.availability_zones.0 = us-west-1a
instance_types.1.availability_zones.1 = us-west-1b
instance_types.1.burstable_instance.% = 2
instance_types.1.burstable_instance.baseline_credit = 0
instance_types.1.burstable_instance.initial_credit = 0
instance_types.1.cpu_core_count = 1
instance_types.1.eni_amount = 1
instance_types.1.family = ecs.mn4
instance_types.1.gpu.% = 2
instance_types.1.gpu.amount = 0
instance_types.1.gpu.category =
instance_types.1.id = ecs.mn4.small
instance_types.1.local_storage.% = 3
instance_types.1.local_storage.amount = 0
instance_types.1.local_storage.capacity = 0
instance_types.1.local_storage.category =
instance_types.1.memory_size = 4
memory_size = 4
network_type = Vpc
output_file = ./output/alicloud_instance_types_sh.txt
spot_strategy = NoSpot
๏ผ ~/code/demo_cen/tf ๎ฐ terraform --version ๎ฒ ๏ ๎ฒ 1159 ๎ฒ 12:22:36
Terraform v0.11.7
๏ผ ~/code/demo_cen/tf ๎ฐ
AliCloud terraform provider doesn't handle "paginated" responses well.
Test case:
data "alicloud_vswitches" "vswitches_ds" {
zone_id = "eu-central-1a"
}
Error:
Error refreshing state: 1 error(s) occurred:
Hi,
Terraform v0.11.10
provider "alicloud" {
version = "1.24.0"
Please list the resources as a list, for example:
resource "alicloud_router_interface" "init"
resource "alicloud_router_interface" "init" {
opposite_region = "eu-central-1"
router_type = "VRouter"
router_id = "${alicloud_vpc.main.router_id}"
role = "InitiatingSide"
specification = "Large.2"
name = "perf-initia"
description = "perf-initiating side"
instance_charge_type = "PrePaid"
period = "1"
depends_on = ["alicloud_vpc.main"]
}
resource "alicloud_router_interface" "accept" {
opposite_region = "eu-central-1"
router_type = "VRouter"
router_id = "vrt-gw8phqv0trv9zc8888l7e"
role = "AcceptingSide"
specification = "Negative"
name = "accepting-side"
description = "Accepting side router interface"
instance_charge_type = "PostPaid"
}
resource "alicloud_router_interface_connection" "init" {
interface_id = "${alicloud_router_interface.init.id}"
opposite_interface_id = "${alicloud_router_interface.accept.id}"
depends_on = ["alicloud_router_interface.init","alicloud_router_interface.accept","alicloud_router_interface_connection.accept"]
}
resource "alicloud_router_interface_connection" "accept" {
interface_id = "${alicloud_router_interface.accept.id}"
opposite_interface_id = "${alicloud_router_interface.init.id}"
depends_on = ["alicloud_router_interface.init"]
}
Error: Error applying plan:
1 error(s) occurred:
module.vpc.alicloud_router_interface.init: 1 error(s) occurred:
alicloud_router_interface.init: WaitForRouterInterface Idle got error: &alicloud.ProviderError{errorCode:"Instance.Notfound", message:"The specified Router Interface ri-gw8tofjdbfnnkv0tjlm2w is not found."}
created alicloud_router_interface initiating side
The specified Router Interface ri-gw8tofjdbfnnkv0tjlm2w is not found
terraform apply
Please look attached screenshot
Route interface was created without :
name = "perf-initia"
description = "perf-initiating side"
What is this Router Interface ri-gw8tofjdbfnnkv0tjlm2w ? ( which we see in error )
When run again "terraform apply" created new router interface successful
Issue happen 2-3 times on 10 attempts
Terraform v0.11.8
provider "alicloud" {
version = "~> 1.26"
region = "ap-southeast-1"
}
data "alicloud_zones" "kvstore" {
available_resource_creation = "KVStore"
}
resource "alicloud_vswitch" "redis" {
availability_zone = "${data.alicloud_zones.kvstore.zones.0.id}"
name = "${format("%s-%s", module.redis_label.id, lookup(data.alicloud_zones.kvstore.zones[0],"id"))}"
cidr_block = "${cidrsubnet(data.terraform_remote_state.main.vpc_cidr,8,2)}"
vpc_id = "${data.terraform_remote_state.main.vpc_id}"
}
resource "alicloud_kvstore_instance" "redis" {
instance_class = "redis.master.small.default"
instance_charge_type = "PostPaid"
instance_type = "Redis"
engine_version = "2.8"
instance_name = "myredis"
password = "Passw0rd"
security_ips = ["${data.terraform_remote_state.main.vpc_cidr}"]
}
* alicloud_kvstore_instance.redis: Error creating Alicloud db instance: &errors.ServerError{httpStatus:400, requestId:"5844FA44-ED47-475F-890E-364C27559E31", hostId:"r-kvstore.aliyuncs.com", errorCode:"COMMODITY.INVALID_COMPONENT", recommend:"", message:"Component choosed is not valid, please re choose it again.", comment:""}
Zone should be filtered down to ap-southeast-1b
as only zones b
and c
are available in the console for PayAsYouGo standard package, Master-Slave 2.8 redis clusters
Zone ap-southeast-1a
was used, causing this confusing, hardcoding ap-southeast-1b
fixed the isssue
terraform apply
Hello,
According to the terraform documentation for alicloud_route_entry the following types of next hop are supported:
The NAT gateway next hop type is missing here. The route can be created using portal UI, but such functionality is missing in terraform.
Thanks
Terraform v0.11.6
Current config to create a dns record example is:
resource "alicloud_dns_record" "record" {
name = "example.com"
host_record = "www"
type = "A"
value = "1.2.3.6"
}
How to bind 2 IPs to the same domain?
Hi there,
If specified the vswitch_id
, then error with Resource 'alicloud_vswitch.vswitch' not found for variable 'alicloud_vswitch.vswitch.id'
terraform -v
Terraform v0.11.7
Check the examples/ess-scaling/
terraform plan
Warning: alicloud_ess_scaling_group.scaling: "vswitch_id": [DEPRECATED] Field 'vswitch_id' has been deprecated from provider version 1.7.1, and new field 'vswitch_ids' can replace it.
Refreshing Terraform state in-memory prior to plan...
The refreshed state will be used to calculate this plan, but will not be
persisted to local or remote state storage.
data.alicloud_zones.default: Refreshing state...
data.alicloud_images.ecs_image: Refreshing state...
------------------------------------------------------------------------
Error: Error running plan: 2 error(s) occurred:
* alicloud_security_group.sg: 1 error(s) occurred:
* alicloud_security_group.sg: Resource 'alicloud_vpc.vpc' not found for variable 'alicloud_vpc.vpc.id'
* alicloud_ess_scaling_group.scaling: 1 error(s) occurred:
* alicloud_ess_scaling_group.scaling: Resource 'alicloud_vswitch.vswitch' not found for variable 'alicloud_vswitch.vswitch.id'
NONE.
The alicloud_vswitch.vswitch
should be created at lease once, then will be successfully used by resource 'alicloud_vswitch.vswitch' .
Not working, see "Debug Output"
Modify the vswitch_id = "xxxxx"
in file examples/ess-scaling/variables.tf
terraform init
terraform plan
Hi there,
Thank you for opening an issue. Please note that we try to keep the Terraform issue tracker reserved for bug reports and feature requests. For general usage questions, please see: https://www.terraform.io/community.html.
Terraform v0.11.8
alicloud_key_pair.ssh_key
The alicloud_key_pair.ssh_key should be imidiatly deleted and by terraform destroy.
Despite the fact that we get success result from the terraform destroy command, the alicloud_key_pair.ssh_key resource can't be recreated for a hour with error:
alicloud_key_pair.ssh_key: Error Import KeyPair: SDK.ServerError
ErrorCode: KeyPair.AlreadyExist
Please list the steps required to reproduce the issue, for example:
terraform destroy
terraform apply
Are there anything atypical about your accounts that we should know?
Running cloud foundry
Hi there,
Thank you for opening an issue. Please note that we try to keep the Terraform issue tracker reserved for bug reports and feature requests. For general usage questions, please see: https://www.terraform.io/community.html.
Terraform v0.11.11
{
"Statement": [
{
"Action": "rds:*",
"Effect": "Allow",
"Resource": "*",
"Condition": {
"StringEquals": {
"rds:ResourceTag/env": "staging"
}
}
},
{
"Action": "dms:LoginDatabase",
"Effect": "Allow",
"Resource": "*",
"Condition": {
"StringEquals": {
"rds:ResourceTag/env": "staging"
}
}
},
{
"Action": "rds:DescribeTag*",
"Effect": "Allow",
"Resource": "*"
}
],
"Version": "1"
}
Can not handle Condition
field in terraform.
With "alicloud_ess_scaling_configuration" you can configure the type of the system disk and all parameters for a data disk, but you are not able to set the size of the system disk (so always 40GB).
Please add such a parameter.
In the Alicloud console there are options to enable HTTPs for the CDN domain, but there don't seem to be any options for enabling and configuring HTTPs in the alicloud_cdn_domain
resource.
A declarative, efficient, and flexible JavaScript library for building user interfaces.
๐ Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. ๐๐๐
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google โค๏ธ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.