Created
February 2, 2023 15:50
-
-
Save shanehughes1990/d0d1861722bc62066238bf91ef2c911d to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2023-02-02T10:38:09.390-0500 [INFO] Terraform version: 1.3.6 | |
2023-02-02T10:38:09.390-0500 [DEBUG] using github.com/hashicorp/go-tfe v1.9.0 | |
2023-02-02T10:38:09.391-0500 [DEBUG] using github.com/hashicorp/hcl/v2 v2.15.0 | |
2023-02-02T10:38:09.391-0500 [DEBUG] using github.com/hashicorp/terraform-config-inspect v0.0.0-20210209133302-4fd17a0faac2 | |
2023-02-02T10:38:09.391-0500 [DEBUG] using github.com/hashicorp/terraform-svchost v0.0.0-20200729002733-f050f53b9734 | |
2023-02-02T10:38:09.392-0500 [DEBUG] using github.com/zclconf/go-cty v1.12.1 | |
2023-02-02T10:38:09.392-0500 [INFO] Go runtime version: go1.19.3 | |
2023-02-02T10:38:09.392-0500 [INFO] CLI args: []string{"C:\\ProgramData\\chocolatey\\lib\\terraform\\tools\\terraform.exe", "plan"} | |
2023-02-02T10:38:09.393-0500 [TRACE] Stdout is a terminal of width 244 | |
2023-02-02T10:38:09.393-0500 [TRACE] Stderr is a terminal of width 244 | |
2023-02-02T10:38:09.393-0500 [TRACE] Stdin is a terminal | |
2023-02-02T10:38:09.397-0500 [DEBUG] Attempting to open CLI config file: C:\Users\shane\AppData\Roaming\terraform.rc | |
2023-02-02T10:38:09.398-0500 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2023-02-02T10:38:09.399-0500 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins | |
2023-02-02T10:38:09.399-0500 [DEBUG] ignoring non-existing provider search directory C:\Users\shane\AppData\Roaming\terraform.d\plugins | |
2023-02-02T10:38:09.400-0500 [DEBUG] ignoring non-existing provider search directory C:\Users\shane\AppData\Roaming\HashiCorp\Terraform\plugins | |
2023-02-02T10:38:09.401-0500 [INFO] CLI command args: []string{"plan"} | |
2023-02-02T10:38:09.416-0500 [TRACE] Meta.Backend: built configuration for "remote" backend with hash value 2044742903 | |
2023-02-02T10:38:09.417-0500 [TRACE] Preserving existing state lineage "***************************" | |
2023-02-02T10:38:09.417-0500 [TRACE] Preserving existing state lineage "***************************" | |
2023-02-02T10:38:09.418-0500 [TRACE] Meta.Backend: working directory was previously initialized for "remote" backend | |
2023-02-02T10:38:09.418-0500 [TRACE] Meta.Backend: using already-initialized, unchanged "remote" backend configuration | |
2023-02-02T10:38:09.418-0500 [DEBUG] Service discovery for app.terraform.io at https://app.terraform.io/.well-known/terraform.json | |
2023-02-02T10:38:09.419-0500 [TRACE] HTTP client GET request to https://app.terraform.io/.well-known/terraform.json | |
2023-02-02T10:38:09.562-0500 [DEBUG] Retrieve version constraints for service tfe.v2.1 and product terraform | |
2023-02-02T10:38:09.562-0500 [TRACE] HTTP client GET request to https://checkpoint-api.hashicorp.com/v1/versions/tfe.v2.1?product=terraform | |
2023-02-02T10:38:10.033-0500 [TRACE] Meta.Backend: instantiated backend of type *remote.Remote | |
2023-02-02T10:38:10.035-0500 [TRACE] providercache.fillMetaCache: scanning directory .terraform\providers | |
2023-02-02T10:38:10.036-0500 [TRACE] getproviders.SearchLocalDirectory: found registry.terraform.io/cloudflare/cloudflare v3.32.0 for windows_amd64 at .terraform\providers\registry.terraform.io\cloudflare\cloudflare\3.32.0\windows_amd64 | |
2023-02-02T10:38:10.037-0500 [TRACE] getproviders.SearchLocalDirectory: found registry.terraform.io/hashicorp/google v4.31.0 for linux_amd64 at .terraform\providers\registry.terraform.io\hashicorp\google\4.31.0\linux_amd64 | |
2023-02-02T10:38:10.037-0500 [TRACE] getproviders.SearchLocalDirectory: found registry.terraform.io/hashicorp/google v4.31.0 for windows_amd64 at .terraform\providers\registry.terraform.io\hashicorp\google\4.31.0\windows_amd64 | |
2023-02-02T10:38:10.038-0500 [TRACE] getproviders.SearchLocalDirectory: found registry.terraform.io/hashicorp/kubernetes v2.12.1 for linux_amd64 at .terraform\providers\registry.terraform.io\hashicorp\kubernetes\2.12.1\linux_amd64 | |
2023-02-02T10:38:10.039-0500 [TRACE] getproviders.SearchLocalDirectory: found registry.terraform.io/hashicorp/kubernetes v2.12.1 for windows_amd64 at .terraform\providers\registry.terraform.io\hashicorp\kubernetes\2.12.1\windows_amd64 | |
2023-02-02T10:38:10.039-0500 [TRACE] providercache.fillMetaCache: including .terraform\providers\registry.terraform.io\cloudflare\cloudflare\3.32.0\windows_amd64 as a candidate package for registry.terraform.io/cloudflare/cloudflare 3.32.0 | |
2023-02-02T10:38:10.039-0500 [TRACE] providercache.fillMetaCache: ignoring .terraform\providers\registry.terraform.io\hashicorp\google\4.31.0\linux_amd64 because it is for linux_amd64, not windows_amd64 | |
2023-02-02T10:38:10.039-0500 [TRACE] providercache.fillMetaCache: including .terraform\providers\registry.terraform.io\hashicorp\google\4.31.0\windows_amd64 as a candidate package for registry.terraform.io/hashicorp/google 4.31.0 | |
2023-02-02T10:38:10.039-0500 [TRACE] providercache.fillMetaCache: ignoring .terraform\providers\registry.terraform.io\hashicorp\kubernetes\2.12.1\linux_amd64 because it is for linux_amd64, not windows_amd64 | |
2023-02-02T10:38:10.040-0500 [TRACE] providercache.fillMetaCache: including .terraform\providers\registry.terraform.io\hashicorp\kubernetes\2.12.1\windows_amd64 as a candidate package for registry.terraform.io/hashicorp/kubernetes 2.12.1 | |
2023-02-02T10:38:10.105-0500 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform\providers | |
2023-02-02T10:38:10.330-0500 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform\providers | |
2023-02-02T10:38:10.470-0500 [DEBUG] checking for provisioner in "." | |
2023-02-02T10:38:10.470-0500 [DEBUG] checking for provisioner in "C:\\ProgramData\\chocolatey\\lib\\terraform\\tools" | |
2023-02-02T10:38:10.471-0500 [TRACE] Meta.Backend: backend *remote.Remote supports operations | |
2023-02-02T10:38:10.585-0500 [INFO] backend/remote: starting Plan operation | |
Running plan in the remote backend. Output will stream here. Pressing Ctrl-C | |
will stop streaming the logs, but will not stop the plan running remotely. | |
Preparing the remote plan... | |
The remote workspace is configured to work with configuration at | |
sandbox relative to the target repository. | |
Terraform will upload the contents of the following directory, | |
excluding files or directories as defined by a .terraformignore file | |
at D:\workspace\terraform\environments\*********************\**************************/.terraformignore (if it is present), | |
in order to capture the filesystem context the remote workspace expects: | |
D:\workspace\terraform\environments\***********************\************************** | |
To view this run in a browser, visit: | |
https://app.terraform.io/app/****************/**************************/runs/run-JBZPVNH6QE9BdDpA | |
Waiting for the plan to start... | |
Terraform v1.3.3 | |
on linux_amd64 | |
Initializing plugins and modules... | |
data.terraform_remote_state.shared: Reading... | |
data.cloudflare_zone.production_zone: Reading... | |
data.cloudflare_zone.onl_zone: Reading... | |
data.cloudflare_zone.app_zone: Reading... | |
data.terraform_remote_state.shared: Read complete after 0s | |
data.google_client_config.default: Reading... | |
data.google_container_cluster.cluster: Reading... | |
data.google_client_config.default: Read complete after 0s [id=******************************************] | |
data.cloudflare_zone.onl_zone: Read complete after 0s [id=**************************] | |
data.cloudflare_zone.app_zone: Read complete after 1s [id=**************************] | |
data.google_container_cluster.cluster: Read complete after 1s [id=******************************************] | |
data.kubernetes_service.nginx: Reading... | |
kubernetes_namespace.environment_namespace: Refreshing state... [id=sandbox] | |
data.kubernetes_service.nginx: Read complete after 0s [id=ingress/web-ingress-nginx-controller] | |
cloudflare_record.app: Refreshing state... [id=**************************] | |
module.telephony_api.kubernetes_secret_v1.app[0]: Refreshing state... [id=sandbox/telephony] | |
cloudflare_record.timecard_service: Refreshing state... [id=**************************] | |
module.telephony_api.kubernetes_service_v1.app[0]: Refreshing state... [id=sandbox/telephony] | |
module.redis.kubernetes_service_v1.app[0]: Refreshing state... [id=sandbox/redis] | |
module.redis.kubernetes_deployment_v1.app[0]: Refreshing state... [id=sandbox/redis] | |
data.cloudflare_zone.production_zone: Read complete after 1s [id=**************************]] | |
module.telephony_api.kubernetes_deployment_v1.app[0]: Refreshing state... [id=sandbox/telephony] | |
module.graphql_timecard.kubernetes_secret_v1.app[0]: Refreshing state... [id=sandbox/timecard] | |
module.app.kubernetes_secret_v1.app: Refreshing state... [id=sandbox/app] | |
module.graphql_timecard.kubernetes_service_v1.app[0]: Refreshing state... [id=sandbox/timecard] | |
module.graphql_timecard.kubernetes_deployment_v1.app[0]: Refreshing state... [id=sandbox/timecard] | |
module.graphql_timecard.kubernetes_ingress_v1.app["app-port"]: Refreshing state... [id=sandbox/timecard-app-port] | |
╷ | |
│ Error: Authentication error (10000) | |
│ | |
│ with cloudflare_record.app, | |
│ on main.tf line 1, in resource "cloudflare_record" "app": | |
│ 1: resource "cloudflare_record" "app" { | |
│ | |
╵ | |
Operation failed: failed running terraform plan (exit 1) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment