testing vpc #2
Merged
testing vpc #2
Google Cloud Build / push-to-branch-keneobum881 (aksgkelearning)
succeeded
May 21, 2024 in 29s
Summary
Build Information
Trigger | push-to-branch-keneobum881 |
Build | 82a94a91-fdda-4d1c-9b37-f33336c5bdf1 |
Start | 2024-05-21T05:51:28-07:00 |
Duration | 27.379s |
Status | SUCCESS |
Steps
Step | Status | Duration |
---|---|---|
branch name | SUCCESS | 2.046s |
tf init | SUCCESS | 13.096s |
tf plan | SUCCESS | 8.858s |
tf apply | SUCCESS | 616ms |
Details
starting build "82a94a91-fdda-4d1c-9b37-f33336c5bdf1"
FETCHSOURCE
hint: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint:
hint: git config --global init.defaultBranch <name>
hint:
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint:
hint: git branch -m <name>
Initialized empty Git repository in /workspace/.git/
From https://github.com/keneobum881/ken-cloudbuild-gitops
* branch b99f5bb0ce634ba164708d6e21d9d4d06d6b389c -> FETCH_HEAD
HEAD is now at b99f5bb deploying a vpc
BUILD
Starting Step #0 - "branch name"
Step #0 - "branch name": Pulling image: alpine
Step #0 - "branch name": Using default tag: latest
Step #0 - "branch name": latest: Pulling from library/alpine
Step #0 - "branch name": Digest: sha256:c5b1261d6d3e43071626931fc004f70149baeba2c8ec672bd4f27761f8e1ad6b
Step #0 - "branch name": Status: Downloaded newer image for alpine:latest
Step #0 - "branch name": docker.io/library/alpine:latest
Step #0 - "branch name": ***********************
Step #0 - "branch name": feature
Step #0 - "branch name": ***********************
Finished Step #0 - "branch name"
Starting Step #1 - "tf init"
Step #1 - "tf init": Pulling image: hashicorp/terraform:1.0.0
Step #1 - "tf init": 1.0.0: Pulling from hashicorp/terraform
Step #1 - "tf init": 540db60ca938: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Pulling fs layer
Step #1 - "tf init": a82f6d5351c2: Pulling fs layer
Step #1 - "tf init": 540db60ca938: Download complete
Step #1 - "tf init": a84ab4c8a000: Verifying Checksum
Step #1 - "tf init": a84ab4c8a000: Download complete
Step #1 - "tf init": 540db60ca938: Pull complete
Step #1 - "tf init": a82f6d5351c2: Verifying Checksum
Step #1 - "tf init": a82f6d5351c2: Download complete
Step #1 - "tf init": a84ab4c8a000: Pull complete
Step #1 - "tf init": a82f6d5351c2: Pull complete
Step #1 - "tf init": Digest: sha256:6dafbe34b7c18d189ff18e3dfb7cd5fc4144a2714eb2bc7b6dd9352455e8848a
Step #1 - "tf init": Status: Downloaded newer image for hashicorp/terraform:1.0.0
Step #1 - "tf init": docker.io/hashicorp/terraform:1.0.0
Step #1 - "tf init":
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: dev ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc2...
Step #1 - "tf init": - vpc.vpc2 in .terraform/modules/vpc.vpc2
Step #1 - "tf init": - vpc.vpc2.firewall_rules in .terraform/modules/vpc.vpc2/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc2.routes in .terraform/modules/vpc.vpc2/modules/routes
Step #1 - "tf init": - vpc.vpc2.subnets in .terraform/modules/vpc.vpc2/modules/subnets
Step #1 - "tf init": - vpc.vpc2.vpc in .terraform/modules/vpc.vpc2/modules/vpc
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init":
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init":
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init":
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc2...
Step #1 - "tf init": - vpc.vpc2 in .terraform/modules/vpc.vpc2
Step #1 - "tf init": - vpc.vpc2.firewall_rules in .terraform/modules/vpc.vpc2/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc2.routes in .terraform/modules/vpc.vpc2/modules/routes
Step #1 - "tf init": - vpc.vpc2.subnets in .terraform/modules/vpc.vpc2/modules/subnets
Step #1 - "tf init": - vpc.vpc2.vpc in .terraform/modules/vpc.vpc2/modules/vpc
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init":
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init":
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Finished Step #1 - "tf init"
Starting Step #2 - "tf plan"
Step #2 - "tf plan": Already have image (with digest): hashicorp/terraform:1.0.0
starting build "82a94a91-fdda-4d1c-9b37-f33336c5bdf1"
FETCHSOURCE
hint: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint:
hint: git config --global init.defaultBranch <name>
hint:
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint:
hint: git branch -m <name>
Initialized empty Git repository in /workspace/.git/
From https://github.com/keneobum881/ken-cloudbuild-gitops
* branch b99f5bb0ce634ba164708d6e21d9d4d06d6b389c -> FETCH_HEAD
HEAD is now at b99f5bb deploying a vpc
BUILD
Starting Step #0 - "branch name"
Step #0 - "branch name": Pulling image: alpine
Step #0 - "branch name": Using default tag: latest
Step #0 - "branch name": latest: Pulling from library/alpine
Step #0 - "branch name": Digest: sha256:c5b1261d6d3e43071626931fc004f70149baeba2c8ec672bd4f27761f8e1ad6b
Step #0 - "branch name": Status: Downloaded newer image for alpine:latest
Step #0 - "branch name": docker.io/library/alpine:latest
Step #0 - "branch name": ***********************
Step #0 - "branch name": feature
Step #0 - "branch name": ***********************
Finished Step #0 - "branch name"
Starting Step #1 - "tf init"
Step #1 - "tf init": Pulling image: hashicorp/terraform:1.0.0
Step #1 - "tf init": 1.0.0: Pulling from hashicorp/terraform
Step #1 - "tf init": 540db60ca938: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Pulling fs layer
Step #1 - "tf init": a82f6d5351c2: Pulling fs layer
Step #1 - "tf init": 540db60ca938: Download complete
Step #1 - "tf init": a84ab4c8a000: Verifying Checksum
Step #1 - "tf init": a84ab4c8a000: Download complete
Step #1 - "tf init": 540db60ca938: Pull complete
Step #1 - "tf init": a82f6d5351c2: Verifying Checksum
Step #1 - "tf init": a82f6d5351c2: Download complete
Step #1 - "tf init": a84ab4c8a000: Pull complete
Step #1 - "tf init": a82f6d5351c2: Pull complete
Step #1 - "tf init": Digest: sha256:6dafbe34b7c18d189ff18e3dfb7cd5fc4144a2714eb2bc7b6dd9352455e8848a
Step #1 - "tf init": Status: Downloaded newer image for hashicorp/terraform:1.0.0
Step #1 - "tf init": docker.io/hashicorp/terraform:1.0.0
Step #1 - "tf init":
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: dev ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc2...
Step #1 - "tf init": - vpc.vpc2 in .terraform/modules/vpc.vpc2
Step #1 - "tf init": - vpc.vpc2.firewall_rules in .terraform/modules/vpc.vpc2/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc2.routes in .terraform/modules/vpc.vpc2/modules/routes
Step #1 - "tf init": - vpc.vpc2.subnets in .terraform/modules/vpc.vpc2/modules/subnets
Step #1 - "tf init": - vpc.vpc2.vpc in .terraform/modules/vpc.vpc2/modules/vpc
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init":
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init":
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init":
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc2...
Step #1 - "tf init": - vpc.vpc2 in .terraform/modules/vpc.vpc2
Step #1 - "tf init": - vpc.vpc2.firewall_rules in .terraform/modules/vpc.vpc2/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc2.routes in .terraform/modules/vpc.vpc2/modules/routes
Step #1 - "tf init": - vpc.vpc2.subnets in .terraform/modules/vpc.vpc2/modules/subnets
Step #1 - "tf init": - vpc.vpc2.vpc in .terraform/modules/vpc.vpc2/modules/vpc
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init":
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init":
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Finished Step #1 - "tf init"
Starting Step #2 - "tf plan"
Step #2 - "tf plan": Already have image (with digest): hashicorp/terraform:1.0.0
starting build "82a94a91-fdda-4d1c-9b37-f33336c5bdf1"
FETCHSOURCE
hint: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint:
hint: git config --global init.defaultBranch <name>
hint:
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint:
hint: git branch -m <name>
Initialized empty Git repository in /workspace/.git/
From https://github.com/keneobum881/ken-cloudbuild-gitops
* branch b99f5bb0ce634ba164708d6e21d9d4d06d6b389c -> FETCH_HEAD
HEAD is now at b99f5bb deploying a vpc
BUILD
Starting Step #0 - "branch name"
Step #0 - "branch name": Pulling image: alpine
Step #0 - "branch name": Using default tag: latest
Step #0 - "branch name": latest: Pulling from library/alpine
Step #0 - "branch name": Digest: sha256:c5b1261d6d3e43071626931fc004f70149baeba2c8ec672bd4f27761f8e1ad6b
Step #0 - "branch name": Status: Downloaded newer image for alpine:latest
Step #0 - "branch name": docker.io/library/alpine:latest
Step #0 - "branch name": ***********************
Step #0 - "branch name": feature
Step #0 - "branch name": ***********************
Finished Step #0 - "branch name"
Starting Step #1 - "tf init"
Step #1 - "tf init": Pulling image: hashicorp/terraform:1.0.0
Step #1 - "tf init": 1.0.0: Pulling from hashicorp/terraform
Step #1 - "tf init": 540db60ca938: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Pulling fs layer
Step #1 - "tf init": a82f6d5351c2: Pulling fs layer
Step #1 - "tf init": 540db60ca938: Download complete
Step #1 - "tf init": a84ab4c8a000: Verifying Checksum
Step #1 - "tf init": a84ab4c8a000: Download complete
Step #1 - "tf init": 540db60ca938: Pull complete
Step #1 - "tf init": a82f6d5351c2: Verifying Checksum
Step #1 - "tf init": a82f6d5351c2: Download complete
Step #1 - "tf init": a84ab4c8a000: Pull complete
Step #1 - "tf init": a82f6d5351c2: Pull complete
Step #1 - "tf init": Digest: sha256:6dafbe34b7c18d189ff18e3dfb7cd5fc4144a2714eb2bc7b6dd9352455e8848a
Step #1 - "tf init": Status: Downloaded newer image for hashicorp/terraform:1.0.0
Step #1 - "tf init": docker.io/hashicorp/terraform:1.0.0
Step #1 - "tf init":
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: dev ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc2...
Step #1 - "tf init": - vpc.vpc2 in .terraform/modules/vpc.vpc2
Step #1 - "tf init": - vpc.vpc2.firewall_rules in .terraform/modules/vpc.vpc2/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc2.routes in .terraform/modules/vpc.vpc2/modules/routes
Step #1 - "tf init": - vpc.vpc2.subnets in .terraform/modules/vpc.vpc2/modules/subnets
Step #1 - "tf init": - vpc.vpc2.vpc in .terraform/modules/vpc.vpc2/modules/vpc
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init":
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init":
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init":
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc2...
Step #1 - "tf init": - vpc.vpc2 in .terraform/modules/vpc.vpc2
Step #1 - "tf init": - vpc.vpc2.firewall_rules in .terraform/modules/vpc.vpc2/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc2.routes in .terraform/modules/vpc.vpc2/modules/routes
Step #1 - "tf init": - vpc.vpc2.subnets in .terraform/modules/vpc.vpc2/modules/subnets
Step #1 - "tf init": - vpc.vpc2.vpc in .terraform/modules/vpc.vpc2/modules/vpc
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init":
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init":
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Finished Step #1 - "tf init"
Starting Step #2 - "tf plan"
Step #2 - "tf plan": Already have image (with digest): hashicorp/terraform:1.0.0
Step #2 - "tf plan":
Step #2 - "tf plan": *************** TERRAFORM PLAN ******************
Step #2 - "tf plan": ******* At environment: dev ********
Step #2 - "tf plan": *************************************************
Step #2 - "tf plan": �[0m�[1mmodule.firewall.google_compute_firewall.allow-http: Refreshing state... [id=projects/aksgkelearning/global/firewalls/dev-allow-http]�[0m
Step #2 - "tf plan": �[0m�[1mmodule.http_server.google_compute_instance.http_server: Refreshing state... [id=projects/aksgkelearning/zones/us-west1-a/instances/dev-apache2-instance]�[0m
Step #2 - "tf plan": �[0m
Step #2 - "tf plan": �[1m�[36mNote:�[0m�[1m Objects have changed outside of Terraform�[0m
Step #2 - "tf plan":
Step #2 - "tf plan": �[0mTerraform detected the following changes made outside of Terraform since the
Step #2 - "tf plan": last "terraform apply":
Step #2 - "tf plan":
Step #2 - "tf plan": �[1m # module.firewall.google_compute_firewall.allow-http�[0m has been changed�[0m�[0m
Step #2 - "tf plan": �[0m �[33m~�[0m�[0m resource "google_compute_firewall" "allow-http" {
Step #2 - "tf plan": �[1m�[0mid�[0m�[0m = "projects/aksgkelearning/global/firewalls/dev-allow-http"
Step #2 - "tf plan": �[1m�[0mname�[0m�[0m = "dev-allow-http"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0msource_service_accounts�[0m�[0m = []
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0msource_tags�[0m�[0m = []
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mtarget_service_accounts�[0m�[0m = []
Step #2 - "tf plan": �[90m# (10 unchanged attributes hidden)�[0m�[0m
Step #2 - "tf plan":
Step #2 - "tf plan": �[90m# (1 unchanged block hidden)�[0m�[0m
Step #2 - "tf plan": }
Step #2 - "tf plan": �[1m # module.http_server.google_compute_instance.http_server�[0m has been changed�[0m�[0m
Step #2 - "tf plan": �[0m �[33m~�[0m�[0m resource "google_compute_instance" "http_server" {
Step #2 - "tf plan": �[1m�[0mid�[0m�[0m = "projects/aksgkelearning/zones/us-west1-a/instances/dev-apache2-instance"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mlabels�[0m�[0m = {}
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mmetadata�[0m�[0m = {}
Step #2 - "tf plan": �[1m�[0mname�[0m�[0m = "dev-apache2-instance"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mresource_policies�[0m�[0m = []
Step #2 - "tf plan": �[1m�[0mtags�[0m�[0m = [
Step #2 - "tf plan": "http-server",
Step #2 - "tf plan": ]
Step #2 - "tf plan": �[90m# (15 unchanged attributes hidden)�[0m�[0m
Step #2 - "tf plan":
Step #2 - "tf plan":
Step #2 - "tf plan":
Step #2 - "tf plan":
Step #2 - "tf plan": �[90m# (4 unchanged blocks hidden)�[0m�[0m
Step #2 - "tf plan": }
Step #2 - "tf plan":
Step #2 - "tf plan": Unless you have made equivalent changes to your configuration, or ignored the
Step #2 - "tf plan": relevant attributes using ignore_changes, the following plan may include
Step #2 - "tf plan": actions to undo or respond to these changes.
Step #2 - "tf plan": �[90m
Step #2 - "tf plan": ───────────────
...
[Logs truncated due to log size limitations. For full logs, see https://console.cloud.google.com/logs/viewer?advancedFilter=resource.type%3D%22build%22+AND+resource.labels.build_id%3D%2282a94a91-fdda-4d1c-9b37-f33336c5bdf1%22+AND+resource.labels.build_trigger_id%3D%229c83ae6b-aaeb-488d-b178-8582f08c6683%22&project=aksgkelearning.]
...
s/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc2...
Step #1 - "tf init": - vpc.vpc2 in .terraform/modules/vpc.vpc2
Step #1 - "tf init": - vpc.vpc2.firewall_rules in .terraform/modules/vpc.vpc2/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc2.routes in .terraform/modules/vpc.vpc2/modules/routes
Step #1 - "tf init": - vpc.vpc2.subnets in .terraform/modules/vpc.vpc2/modules/subnets
Step #1 - "tf init": - vpc.vpc2.vpc in .terraform/modules/vpc.vpc2/modules/vpc
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init":
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init":
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init":
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc2...
Step #1 - "tf init": - vpc.vpc2 in .terraform/modules/vpc.vpc2
Step #1 - "tf init": - vpc.vpc2.firewall_rules in .terraform/modules/vpc.vpc2/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc2.routes in .terraform/modules/vpc.vpc2/modules/routes
Step #1 - "tf init": - vpc.vpc2.subnets in .terraform/modules/vpc.vpc2/modules/subnets
Step #1 - "tf init": - vpc.vpc2.vpc in .terraform/modules/vpc.vpc2/modules/vpc
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init":
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init":
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init":
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Finished Step #1 - "tf init"
Starting Step #2 - "tf plan"
Step #2 - "tf plan": Already have image (with digest): hashicorp/terraform:1.0.0
Step #2 - "tf plan":
Step #2 - "tf plan": *************** TERRAFORM PLAN ******************
Step #2 - "tf plan": ******* At environment: dev ********
Step #2 - "tf plan": *************************************************
Step #2 - "tf plan": �[0m�[1mmodule.vpc.module.vpc.module.vpc.google_compute_network.network: Refreshing state... [id=projects/aksgkelearning/global/networks/dev]�[0m
Step #2 - "tf plan": �[0m�[1mmodule.vpc.module.vpc.module.subnets.google_compute_subnetwork.subnetwork["us-west1/dev-subnet-01"]: Refreshing state... [id=projects/aksgkelearning/regions/us-west1/subnetworks/dev-subnet-01]�[0m
Step #2 - "tf plan": �[0m�[1mmodule.firewall.google_compute_firewall.allow-http: Refreshing state... [id=projects/aksgkelearning/global/firewalls/dev-allow-http]�[0m
Step #2 - "tf plan": �[0m�[1mmodule.http_server.google_compute_instance.http_server: Refreshing state... [id=projects/aksgkelearning/zones/us-west1-a/instances/dev-apache2-instance]�[0m
Step #2 - "tf plan": �[0m
Step #2 - "tf plan": �[1m�[36mNote:�[0m�[1m Objects have changed outside of Terraform�[0m
Step #2 - "tf plan":
Step #2 - "tf plan": �[0mTerraform detected the following changes made outside of Terraform since the
Step #2 - "tf plan": last "terraform apply":
Step #2 - "tf plan":
Step #2 - "tf plan": �[1m # module.firewall.google_compute_firewall.allow-http�[0m has been changed�[0m�[0m
Step #2 - "tf plan": �[0m �[33m~�[0m�[0m resource "google_compute_firewall" "allow-http" {
Step #2 - "tf plan": �[1m�[0mid�[0m�[0m = "projects/aksgkelearning/global/firewalls/dev-allow-http"
Step #2 - "tf plan": �[1m�[0mname�[0m�[0m = "dev-allow-http"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0msource_service_accounts�[0m�[0m = []
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0msource_tags�[0m�[0m = []
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mtarget_service_accounts�[0m�[0m = []
Step #2 - "tf plan": �[90m# (10 unchanged attributes hidden)�[0m�[0m
Step #2 - "tf plan":
Step #2 - "tf plan": �[90m# (1 unchanged block hidden)�[0m�[0m
Step #2 - "tf plan": }
Step #2 - "tf plan": �[1m # module.http_server.google_compute_instance.http_server�[0m has been changed�[0m�[0m
Step #2 - "tf plan": �[0m �[33m~�[0m�[0m resource "google_compute_instance" "http_server" {
Step #2 - "tf plan": �[1m�[0mid�[0m�[0m = "projects/aksgkelearning/zones/us-west1-a/instances/dev-apache2-instance"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mlabels�[0m�[0m = {}
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mmetadata�[0m�[0m = {}
Step #2 - "tf plan": �[1m�[0mname�[0m�[0m = "dev-apache2-instance"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mresource_policies�[0m�[0m = []
Step #2 - "tf plan": �[1m�[0mtags�[0m�[0m = [
Step #2 - "tf plan": "http-server",
Step #2 - "tf plan": ]
Step #2 - "tf plan": �[90m# (15 unchanged attributes hidden)�[0m�[0m
Step #2 - "tf plan":
Step #2 - "tf plan":
Step #2 - "tf plan":
Step #2 - "tf plan":
Step #2 - "tf plan": �[90m# (4 unchanged blocks hidden)�[0m�[0m
Step #2 - "tf plan": }
Step #2 - "tf plan":
Step #2 - "tf plan": Unless you have made equivalent changes to your configuration, or ignored the
Step #2 - "tf plan": relevant attributes using ignore_changes, the following plan may include
Step #2 - "tf plan": actions to undo or respond to these changes.
Step #2 - "tf plan": �[90m
Step #2 - "tf plan": ─────────────────────────────────────────────────────────────────────────────�[0m
Step #2 - "tf plan":
Step #2 - "tf plan": Terraform used the selected providers to generate the following execution
Step #2 - "tf plan": plan. Resource actions are indicated with the following symbols:
Step #2 - "tf plan": �[32m+�[0m create
Step #2 - "tf plan": �[0m
Step #2 - "tf plan": Terraform will perform the following actions:
Step #2 - "tf plan":
Step #2 - "tf plan": �[1m # module.vpc.module.vpc2.module.subnets.google_compute_subnetwork.subnetwork["us-west2/dev-subnet-ken"]�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m �[32m+�[0m�[0m resource "google_compute_subnetwork" "subnetwork" {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mcreation_timestamp�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mexternal_ipv6_prefix�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mfingerprint�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mgateway_address�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mip_cidr_range�[0m�[0m = "10.10.10.0/16"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mipv6_cidr_range�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m = "dev-subnet-ken"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mnetwork�[0m�[0m = "dev-ken"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mprivate_ip_google_access�[0m�[0m = false
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mprivate_ipv6_google_access�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m = "aksgkelearning"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mpurpose�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mregion�[0m�[0m = "us-west2"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0msecondary_ip_range�[0m�[0m = []
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mstack_type�[0m�[0m = (known after apply)
Step #2 - "tf plan": }
Step #2 - "tf plan":
Step #2 - "tf plan": �[1m # module.vpc.module.vpc2.module.vpc.google_compute_network.network�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m �[32m+�[0m�[0m resource "google_compute_network" "network" {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mauto_create_subnetworks�[0m�[0m = false
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mdelete_default_routes_on_create�[0m�[0m = false
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mgateway_ipv4�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mmtu�[0m�[0m = 0
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m = "dev-ken"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m = "aksgkelearning"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mrouting_mode�[0m�[0m = "GLOBAL"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m = (known after apply)
Step #2 - "tf plan": }
Step #2 - "tf plan":
Step #2 - "tf plan": �[0m�[1mPlan:�[0m 2 to add, 0 to change, 0 to destroy.
Step #2 - "tf plan": �[0m�[90m
Step #2 - "tf plan": ─────────────────────────────────────────────────────────────────────────────�[0m
Step #2 - "tf plan":
Step #2 - "tf plan": Note: You didn't use the -out option to save this plan, so Terraform can't
Step #2 - "tf plan": guarantee to take exactly these actions if you run "terraform apply" now.
Step #2 - "tf plan":
Step #2 - "tf plan": *************** TERRAFORM PLAN ******************
Step #2 - "tf plan": ******* At environment: prod ********
Step #2 - "tf plan": *************************************************
Step #2 - "tf plan":
Step #2 - "tf plan": Terraform used the selected providers to generate the following execution
Step #2 - "tf plan": plan. Resource actions are indicated with the following symbols:
Step #2 - "tf plan": �[32m+�[0m create
Step #2 - "tf plan": �[0m
Step #2 - "tf plan": Terraform will perform the following actions:
Step #2 - "tf plan":
Step #2 - "tf plan": �[1m # module.firewall.google_compute_firewall.allow-http�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m �[32m+�[0m�[0m resource "google_compute_firewall" "allow-http" {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mcreation_timestamp�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mdestination_ranges�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mdirection�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0menable_logging�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m = "prod-allow-http"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mnetwork�[0m�[0m = "prod"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mpriority�[0m�[0m = 1000
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m = "aksgkelearning"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0msource_ranges�[0m�[0m = [
Step #2 - "tf plan": �[32m+�[0m �[0m"0.0.0.0/0",
Step #2 - "tf plan": ]
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mtarget_tags�[0m�[0m = [
Step #2 - "tf plan": �[32m+�[0m �[0m"http-server",
Step #2 - "tf plan": ]
Step #2 - "tf plan":
Step #2 - "tf plan": �[32m+�[0m �[0mallow {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mports�[0m�[0m = [
Step #2 - "tf plan": �[32m+�[0m �[0m"80",
Step #2 - "tf plan": ]
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mprotocol�[0m�[0m = "tcp"
Step #2 - "tf plan": }
Step #2 - "tf plan": }
Step #2 - "tf plan":
Step #2 - "tf plan": �[1m # module.http_server.google_compute_instance.http_server�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m �[32m+�[0m�[0m resource "google_compute_instance" "http_server" {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mcan_ip_forward�[0m�[0m = false
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mcpu_platform�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mcurrent_status�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mdeletion_protection�[0m�[0m = false
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mguest_accelerator�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0minstance_id�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mlabel_fingerprint�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mmachine_type�[0m�[0m = "f1-micro"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mmetadata_fingerprint�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mmetadata_startup_script�[0m�[0m = "sudo apt-get update && sudo apt-get install apache2 -y && echo '<html><body><h1>Environment: prod</h1></body></html>' | sudo tee /var/www/html/index.html"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mmin_cpu_platform�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m = "prod-apache2-instance"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m = "aksgkelearning"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mtags�[0m�[0m = [
Step #2 - "tf plan": �[32m+�[0m �[0m"http-server",
Step #2 - "tf plan": ]
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mtags_fingerprint�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mzone�[0m�[0m = "us-west1-a"
Step #2 - "tf plan":
Step #2 - "tf plan": �[32m+�[0m �[0mboot_disk {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mauto_delete�[0m�[0m = true
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mdevice_name�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mdisk_encryption_key_sha256�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mkms_key_self_link�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mmode�[0m�[0m = "READ_WRITE"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0msource�[0m�[0m = (known after apply)
Step #2 - "tf plan":
Step #2 - "tf plan": �[32m+�[0m �[0minitialize_params {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mimage�[0m�[0m = "debian-cloud/debian-11"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mlabels�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0msize�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mtype�[0m�[0m = (known after apply)
Step #2 - "tf plan": }
Step #2 - "tf plan": }
Step #2 - "tf plan":
Step #2 - "tf plan": �[32m+�[0m �[0mconfidential_instance_config {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0menable_confidential_compute�[0m�[0m = (known after apply)
Step #2 - "tf plan": }
Step #2 - "tf plan":
Step #2 - "tf plan": �[32m+�[0m �[0mnetwork_interface {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mipv6_access_type�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mnetwork�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mnetwork_ip�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mstack_type�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0msubnetwork�[0m�[0m = "prod-subnet-01"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0msubnetwork_project�[0m�[0m = (known after apply)
Step #2 - "tf plan":
Step #2 - "tf plan": �[32m+�[0m �[0maccess_config {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mnat_ip�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mnetwork_tier�[0m�[0m = (known after apply)
Step #2 - "tf plan": }
Step #2 - "tf plan": }
Step #2 - "tf plan":
Step #2 - "tf plan": �[32m+�[0m �[0mreservation_affinity {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mtype�[0m�[0m = (known after apply)
Step #2 - "tf plan":
Step #2 - "tf plan": �[32m+�[0m �[0mspecific_reservation {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mkey�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mvalues�[0m�[0m = (known after apply)
Step #2 - "tf plan": }
Step #2 - "tf plan": }
Step #2 - "tf plan":
Step #2 - "tf plan": �[32m+�[0m �[0mscheduling {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mautomatic_restart�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mmin_node_cpus�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mon_host_maintenance�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mpreemptible�[0m�[0m = (known after apply)
Step #2 - "tf plan":
Step #2 - "tf plan": �[32m+�[0m �[0mnode_affinities {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mkey�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0moperator�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mvalues�[0m�[0m = (known after apply)
Step #2 - "tf plan": }
Step #2 - "tf plan": }
Step #2 - "tf plan": }
Step #2 - "tf plan":
Step #2 - "tf plan": �[1m # module.vpc.module.vpc.module.subnets.google_compute_subnetwork.subnetwork["us-west1/prod-subnet-01"]�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m �[32m+�[0m�[0m resource "google_compute_subnetwork" "subnetwork" {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mcreation_timestamp�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mexternal_ipv6_prefix�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mfingerprint�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mgateway_address�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mip_cidr_range�[0m�[0m = "10.20.10.0/24"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mipv6_cidr_range�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m = "prod-subnet-01"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mnetwork�[0m�[0m = "prod"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mprivate_ip_google_access�[0m�[0m = false
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mprivate_ipv6_google_access�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m = "aksgkelearning"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mpurpose�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mregion�[0m�[0m = "us-west1"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0msecondary_ip_range�[0m�[0m = []
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mstack_type�[0m�[0m = (known after apply)
Step #2 - "tf plan": }
Step #2 - "tf plan":
Step #2 - "tf plan": �[1m # module.vpc.module.vpc.module.vpc.google_compute_network.network�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m �[32m+�[0m�[0m resource "google_compute_network" "network" {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mauto_create_subnetworks�[0m�[0m = false
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mdelete_default_routes_on_create�[0m�[0m = false
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mgateway_ipv4�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mmtu�[0m�[0m = 0
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m = "prod"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m = "aksgkelearning"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mrouting_mode�[0m�[0m = "GLOBAL"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m = (known after apply)
Step #2 - "tf plan": }
Step #2 - "tf plan":
Step #2 - "tf plan": �[1m # module.vpc.module.vpc2.module.subnets.google_compute_subnetwork.subnetwork["us-west2/prod-subnet-ken"]�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m �[32m+�[0m�[0m resource "google_compute_subnetwork" "subnetwork" {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mcreation_timestamp�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mexternal_ipv6_prefix�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mfingerprint�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mgateway_address�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mip_cidr_range�[0m�[0m = "10.20.10.0/16"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mipv6_cidr_range�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m = "prod-subnet-ken"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mnetwork�[0m�[0m = "prod-ken"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mprivate_ip_google_access�[0m�[0m = false
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mprivate_ipv6_google_access�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m = "aksgkelearning"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mpurpose�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mregion�[0m�[0m = "us-west2"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0msecondary_ip_range�[0m�[0m = []
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mstack_type�[0m�[0m = (known after apply)
Step #2 - "tf plan": }
Step #2 - "tf plan":
Step #2 - "tf plan": �[1m # module.vpc.module.vpc2.module.vpc.google_compute_network.network�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m �[32m+�[0m�[0m resource "google_compute_network" "network" {
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mauto_create_subnetworks�[0m�[0m = false
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mdelete_default_routes_on_create�[0m�[0m = false
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mgateway_ipv4�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mmtu�[0m�[0m = 0
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m = "prod-ken"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m = "aksgkelearning"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mrouting_mode�[0m�[0m = "GLOBAL"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m = (known after apply)
Step #2 - "tf plan": }
Step #2 - "tf plan":
Step #2 - "tf plan": �[0m�[1mPlan:�[0m 6 to add, 0 to change, 0 to destroy.
Step #2 - "tf plan": �[0m�[0m
Step #2 - "tf plan": �[1mChanges to Outputs:�[0m�[0m
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mexternal_ip�[0m�[0m = (known after apply)
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mfirewall_rule�[0m�[0m = "prod-allow-http"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0minstance_name�[0m�[0m = "prod-apache2-instance"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0mnetwork�[0m�[0m = "prod"
Step #2 - "tf plan": �[32m+�[0m �[0m�[1m�[0msubnet�[0m�[0m = "prod-subnet-01"
Step #2 - "tf plan": �[90m
Step #2 - "tf plan": ─────────────────────────────────────────────────────────────────────────────�[0m
Step #2 - "tf plan":
Step #2 - "tf plan": Note: You didn't use the -out option to save this plan, so Terraform can't
Step #2 - "tf plan": guarantee to take exactly these actions if you run "terraform apply" now.
Finished Step #2 - "tf plan"
Starting Step #3 - "tf apply"
Step #3 - "tf apply": Already have image (with digest): hashicorp/terraform:1.0.0
Step #3 - "tf apply": ***************************** SKIPPING APPLYING *******************************
Step #3 - "tf apply": Branch 'feature' does not represent an official environment.
Step #3 - "tf apply": *******************************************************************************
Finished Step #3 - "tf apply"
PUSH
DONE
Loading