Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature #4

Merged
merged 4 commits into from
May 21, 2024

recent changes

fa3141d
Select commit
Loading
Failed to load commit list.
Merged

Feature #4

recent changes
fa3141d
Select commit
Loading
Failed to load commit list.
Google Cloud Build / push-to-branch-keneobum881 (aksgkelearning) succeeded May 21, 2024 in 34s

Summary

Build Information

Trigger push-to-branch-keneobum881
Build fe4ed1e8-1a84-4998-a2ed-1e0d52c98f1e
Start 2024-05-21T09:30:15-07:00
Duration 29.984s
Status SUCCESS

Steps

Step Status Duration
branch name SUCCESS 3.191s
tf init SUCCESS 13.696s
tf plan SUCCESS 8.269s
tf apply SUCCESS 748ms

Details


starting build "fe4ed1e8-1a84-4998-a2ed-1e0d52c98f1e"

FETCHSOURCE
hint: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint: 
hint: 	git config --global init.defaultBranch <name>
hint: 
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint: 
hint: 	git branch -m <name>
Initialized empty Git repository in /workspace/.git/
From https://github.com/keneobum881/ken-cloudbuild-gitops
 * branch            fa3141d8f9abc29584b43042155f37350f9cd067 -> FETCH_HEAD
HEAD is now at fa3141d recent changes
BUILD
Step #0 - "branch name": Using default tag: latest
Step #0 - "branch name": latest: Pulling from library/alpine
Step #0 - "branch name": Digest: sha256:c5b1261d6d3e43071626931fc004f70149baeba2c8ec672bd4f27761f8e1ad6b
Step #0 - "branch name": Status: Downloaded newer image for alpine:latest
Step #0 - "branch name": docker.io/library/alpine:latest
Step #1 - "tf init": 1.0.0: Pulling from hashicorp/terraform
Step #1 - "tf init": 540db60ca938: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Pulling fs layer
Step #1 - "tf init": a82f6d5351c2: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Verifying Checksum
Step #1 - "tf init": a84ab4c8a000: Download complete
Step #1 - "tf init": 540db60ca938: Verifying Checksum
Step #1 - "tf init": 540db60ca938: Download complete
Step #1 - "tf init": a82f6d5351c2: Verifying Checksum
Step #1 - "tf init": a82f6d5351c2: Download complete
Step #1 - "tf init": 540db60ca938: Pull complete
Step #1 - "tf init": a84ab4c8a000: Pull complete
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: dev ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #2 - "tf plan": 
Step #2 - "tf plan": *************** TERRAFORM PLAN ******************
Step #2 - "tf plan": ******* At environment: dev ********
Step #2 - "tf plan": *************************************************

starting build "fe4ed1e8-1a84-4998-a2ed-1e0d52c98f1e"

FETCHSOURCE
hint: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint: 
hint: 	git config --global init.defaultBranch <name>
hint: 
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint: 
hint: 	git branch -m <name>
Initialized empty Git repository in /workspace/.git/
From https://github.com/keneobum881/ken-cloudbuild-gitops
 * branch            fa3141d8f9abc29584b43042155f37350f9cd067 -> FETCH_HEAD
HEAD is now at fa3141d recent changes
BUILD
Step #0 - "branch name": Using default tag: latest
Step #0 - "branch name": latest: Pulling from library/alpine
Step #0 - "branch name": Digest: sha256:c5b1261d6d3e43071626931fc004f70149baeba2c8ec672bd4f27761f8e1ad6b
Step #0 - "branch name": Status: Downloaded newer image for alpine:latest
Step #0 - "branch name": docker.io/library/alpine:latest
Step #1 - "tf init": 1.0.0: Pulling from hashicorp/terraform
Step #1 - "tf init": 540db60ca938: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Pulling fs layer
Step #1 - "tf init": a82f6d5351c2: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Verifying Checksum
Step #1 - "tf init": a84ab4c8a000: Download complete
Step #1 - "tf init": 540db60ca938: Verifying Checksum
Step #1 - "tf init": 540db60ca938: Download complete
Step #1 - "tf init": a82f6d5351c2: Verifying Checksum
Step #1 - "tf init": a82f6d5351c2: Download complete
Step #1 - "tf init": 540db60ca938: Pull complete
Step #1 - "tf init": a84ab4c8a000: Pull complete
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: dev ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #2 - "tf plan": 
Step #2 - "tf plan": *************** TERRAFORM PLAN ******************
Step #2 - "tf plan": ******* At environment: dev ********
Step #2 - "tf plan": *************************************************

starting build "fe4ed1e8-1a84-4998-a2ed-1e0d52c98f1e"

FETCHSOURCE
hint: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint: 
hint: 	git config --global init.defaultBranch <name>
hint: 
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint: 
hint: 	git branch -m <name>
Initialized empty Git repository in /workspace/.git/
From https://github.com/keneobum881/ken-cloudbuild-gitops
 * branch            fa3141d8f9abc29584b43042155f37350f9cd067 -> FETCH_HEAD
HEAD is now at fa3141d recent changes
BUILD
Step #0 - "branch name": Using default tag: latest
Step #0 - "branch name": latest: Pulling from library/alpine
Step #0 - "branch name": Digest: sha256:c5b1261d6d3e43071626931fc004f70149baeba2c8ec672bd4f27761f8e1ad6b
Step #0 - "branch name": Status: Downloaded newer image for alpine:latest
Step #0 - "branch name": docker.io/library/alpine:latest
Step #1 - "tf init": 1.0.0: Pulling from hashicorp/terraform
Step #1 - "tf init": 540db60ca938: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Pulling fs layer
Step #1 - "tf init": a82f6d5351c2: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Verifying Checksum
Step #1 - "tf init": a84ab4c8a000: Download complete
Step #1 - "tf init": 540db60ca938: Verifying Checksum
Step #1 - "tf init": 540db60ca938: Download complete
Step #1 - "tf init": a82f6d5351c2: Verifying Checksum
Step #1 - "tf init": a82f6d5351c2: Download complete
Step #1 - "tf init": 540db60ca938: Pull complete
Step #1 - "tf init": a84ab4c8a000: Pull complete
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: dev ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Starting Step #2 - "tf plan"
Step #2 - "tf plan": 
Step #2 - "tf plan": *************** TERRAFORM PLAN ******************
Step #2 - "tf plan": ******* At environment: dev ********
Step #2 - "tf plan": *************************************************

starting build "fe4ed1e8-1a84-4998-a2ed-1e0d52c98f1e"

FETCHSOURCE
hint: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint: 
hint: 	git config --global init.defaultBranch <name>
hint: 
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint: 
hint: 	git branch -m <name>
Initialized empty Git repository in /workspace/.git/
From https://github.com/keneobum881/ken-cloudbuild-gitops
 * branch            fa3141d8f9abc29584b43042155f37350f9cd067 -> FETCH_HEAD
HEAD is now at fa3141d recent changes
BUILD
Step #0 - "branch name": Using default tag: latest
Step #0 - "branch name": latest: Pulling from library/alpine
Step #0 - "branch name": Digest: sha256:c5b1261d6d3e43071626931fc004f70149baeba2c8ec672bd4f27761f8e1ad6b
Step #0 - "branch name": Status: Downloaded newer image for alpine:latest
Step #0 - "branch name": docker.io/library/alpine:latest
Step #1 - "tf init": 1.0.0: Pulling from hashicorp/terraform
Step #1 - "tf init": 540db60ca938: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Pulling fs layer
Step #1 - "tf init": a82f6d5351c2: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Verifying Checksum
Step #1 - "tf init": a84ab4c8a000: Download complete
Step #1 - "tf init": 540db60ca938: Verifying Checksum
Step #1 - "tf init": 540db60ca938: Download complete
Step #1 - "tf init": a82f6d5351c2: Verifying Checksum
Step #1 - "tf init": a82f6d5351c2: Download complete
Step #1 - "tf init": 540db60ca938: Pull complete
Step #1 - "tf init": a84ab4c8a000: Pull complete
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: dev ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Starting Step #2 - "tf plan"
Step #2 - "tf plan": 
Step #2 - "tf plan": *************** TERRAFORM PLAN ******************
Step #2 - "tf plan": ******* At environment: dev ********
Step #2 - "tf plan": *************************************************

starting build "fe4ed1e8-1a84-4998-a2ed-1e0d52c98f1e"

FETCHSOURCE
hint: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint: 
hint: 	git config --global init.defaultBranch <name>
hint: 
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint: 
hint: 	git branch -m <name>
Initialized empty Git repository in /workspace/.git/
From https://github.com/keneobum881/ken-cloudbuild-gitops
 * branch            fa3141d8f9abc29584b43042155f37350f9cd067 -> FETCH_HEAD
HEAD is now at fa3141d recent changes
BUILD
Step #0 - "branch name": Using default tag: latest
Step #0 - "branch name": latest: Pulling from library/alpine
Step #0 - "bra
...
[Logs truncated due to log size limitations. For full logs, see https://console.cloud.google.com/logs/viewer?advancedFilter=resource.type%3D%22build%22+AND+resource.labels.build_id%3D%22fe4ed1e8-1a84-4998-a2ed-1e0d52c98f1e%22+AND+resource.labels.build_trigger_id%3D%229c83ae6b-aaeb-488d-b178-8582f08c6683%22&project=aksgkelearning.]
...
nt: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint: 
hint: 	git config --global init.defaultBranch <name>
hint: 
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint: 
hint: 	git branch -m <name>
Initialized empty Git repository in /workspace/.git/
From https://github.com/keneobum881/ken-cloudbuild-gitops
 * branch            fa3141d8f9abc29584b43042155f37350f9cd067 -> FETCH_HEAD
HEAD is now at fa3141d recent changes
BUILD
Step #0 - "branch name": Using default tag: latest
Step #0 - "branch name": latest: Pulling from library/alpine
Step #0 - "branch name": Digest: sha256:c5b1261d6d3e43071626931fc004f70149baeba2c8ec672bd4f27761f8e1ad6b
Step #0 - "branch name": Status: Downloaded newer image for alpine:latest
Step #0 - "branch name": docker.io/library/alpine:latest
Step #1 - "tf init": 1.0.0: Pulling from hashicorp/terraform
Step #1 - "tf init": 540db60ca938: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Pulling fs layer
Step #1 - "tf init": a82f6d5351c2: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Verifying Checksum
Step #1 - "tf init": a84ab4c8a000: Download complete
Step #1 - "tf init": 540db60ca938: Verifying Checksum
Step #1 - "tf init": 540db60ca938: Download complete
Step #1 - "tf init": a82f6d5351c2: Verifying Checksum
Step #1 - "tf init": a82f6d5351c2: Download complete
Step #1 - "tf init": 540db60ca938: Pull complete
Step #1 - "tf init": a84ab4c8a000: Pull complete
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: dev ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Starting Step #2 - "tf plan"
Step #2 - "tf plan": 
Step #2 - "tf plan": *************** TERRAFORM PLAN ******************
Step #2 - "tf plan": ******* At environment: dev ********
Step #2 - "tf plan": *************************************************

starting build "fe4ed1e8-1a84-4998-a2ed-1e0d52c98f1e"

FETCHSOURCE
hint: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint: 
hint: 	git config --global init.defaultBranch <name>
hint: 
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint: 
hint: 	git branch -m <name>
Initialized empty Git repository in /workspace/.git/
From https://github.com/keneobum881/ken-cloudbuild-gitops
 * branch            fa3141d8f9abc29584b43042155f37350f9cd067 -> FETCH_HEAD
HEAD is now at fa3141d recent changes
BUILD
Step #0 - "branch name": Using default tag: latest
Step #0 - "branch name": latest: Pulling from library/alpine
Step #0 - "branch name": Digest: sha256:c5b1261d6d3e43071626931fc004f70149baeba2c8ec672bd4f27761f8e1ad6b
Step #0 - "branch name": Status: Downloaded newer image for alpine:latest
Step #0 - "branch name": docker.io/library/alpine:latest
Step #1 - "tf init": 1.0.0: Pulling from hashicorp/terraform
Step #1 - "tf init": 540db60ca938: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Pulling fs layer
Step #1 - "tf init": a82f6d5351c2: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Verifying Checksum
Step #1 - "tf init": a84ab4c8a000: Download complete
Step #1 - "tf init": 540db60ca938: Verifying Checksum
Step #1 - "tf init": 540db60ca938: Download complete
Step #1 - "tf init": a82f6d5351c2: Verifying Checksum
Step #1 - "tf init": a82f6d5351c2: Download complete
Step #1 - "tf init": 540db60ca938: Pull complete
Step #1 - "tf init": a84ab4c8a000: Pull complete
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: dev ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Finished Step #1 - "tf init"
Starting Step #2 - "tf plan"
Step #2 - "tf plan": Already have image (with digest): hashicorp/terraform:1.0.0
Step #2 - "tf plan": 
Step #2 - "tf plan": *************** TERRAFORM PLAN ******************
Step #2 - "tf plan": ******* At environment: dev ********
Step #2 - "tf plan": *************************************************
Step #2 - "tf plan": �[0m�[1mmodule.vpc.module.vpc.module.vpc.google_compute_network.network: Refreshing state... [id=projects/aksgkelearning/global/networks/dev]�[0m
Step #2 - "tf plan": �[0m�[1mmodule.vpc.module.vpc.module.subnets.google_compute_subnetwork.subnetwork["us-west1/dev-subnet-01"]: Refreshing state... [id=projects/aksgkelearning/regions/us-west1/subnetworks/dev-subnet-01]�[0m
Step #2 - "tf plan": 
Step #2 - "tf plan": Terraform used the selected providers to generate the following execution
Step #2 - "tf plan": plan. Resource actions are indicated with the following symbols:
Step #2 - "tf plan":   �[32m+�[0m create
Step #2 - "tf plan": �[0m
Step #2 - "tf plan": Terraform will perform the following actions:
Step #2 - "tf plan": 
Step #2 - "tf plan": �[1m  # module.firewall.google_compute_firewall.allow-http�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m  �[32m+�[0m�[0m resource "google_compute_firewall" "allow-http" {
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mcreation_timestamp�[0m�[0m = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mdestination_ranges�[0m�[0m = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mdirection�[0m�[0m          = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0menable_logging�[0m�[0m     = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m                 = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m               = "prod-allow-http"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mnetwork�[0m�[0m            = "prod"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mpriority�[0m�[0m           = 1000
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m            = "aksgkelearning"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m          = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0msource_ranges�[0m�[0m      = [
Step #2 - "tf plan":           �[32m+�[0m �[0m"0.0.0.0/0",
Step #2 - "tf plan":         ]
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mtarget_tags�[0m�[0m        = [
Step #2 - "tf plan":           �[32m+�[0m �[0m"http-server",
Step #2 - "tf plan":         ]
Step #2 - "tf plan": 
Step #2 - "tf plan":       �[32m+�[0m �[0mallow {
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mports�[0m�[0m    = [
Step #2 - "tf plan":               �[32m+�[0m �[0m"80",
Step #2 - "tf plan":             ]
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mprotocol�[0m�[0m = "tcp"
Step #2 - "tf plan":         }
Step #2 - "tf plan":     }
Step #2 - "tf plan": 
Step #2 - "tf plan": �[1m  # module.http_server.google_compute_instance.http_server�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m  �[32m+�[0m�[0m resource "google_compute_instance" "http_server" {
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mcan_ip_forward�[0m�[0m          = false
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mcpu_platform�[0m�[0m            = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mcurrent_status�[0m�[0m          = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mdeletion_protection�[0m�[0m     = false
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mguest_accelerator�[0m�[0m       = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m                      = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0minstance_id�[0m�[0m             = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mlabel_fingerprint�[0m�[0m       = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mmachine_type�[0m�[0m            = "f1-micro"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mmetadata_fingerprint�[0m�[0m    = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mmetadata_startup_script�[0m�[0m = "sudo apt-get update && sudo apt-get install apache2 -y && echo '<html><body><h1>Environment: prod</h1></body></html>' | sudo tee /var/www/html/index.html"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mmin_cpu_platform�[0m�[0m        = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m                    = "prod-apache2-instance"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m                 = "aksgkelearning"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m               = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mtags�[0m�[0m                    = [
Step #2 - "tf plan":           �[32m+�[0m �[0m"http-server",
Step #2 - "tf plan":         ]
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mtags_fingerprint�[0m�[0m        = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mzone�[0m�[0m                    = "us-west1-a"
Step #2 - "tf plan": 
Step #2 - "tf plan":       �[32m+�[0m �[0mboot_disk {
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mauto_delete�[0m�[0m                = true
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mdevice_name�[0m�[0m                = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mdisk_encryption_key_sha256�[0m�[0m = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mkms_key_self_link�[0m�[0m          = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mmode�[0m�[0m                       = "READ_WRITE"
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0msource�[0m�[0m                     = (known after apply)
Step #2 - "tf plan": 
Step #2 - "tf plan":           �[32m+�[0m �[0minitialize_params {
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mimage�[0m�[0m  = "debian-cloud/debian-11"
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mlabels�[0m�[0m = (known after apply)
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0msize�[0m�[0m   = (known after apply)
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mtype�[0m�[0m   = (known after apply)
Step #2 - "tf plan":             }
Step #2 - "tf plan":         }
Step #2 - "tf plan": 
Step #2 - "tf plan":       �[32m+�[0m �[0mconfidential_instance_config {
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0menable_confidential_compute�[0m�[0m = (known after apply)
Step #2 - "tf plan":         }
Step #2 - "tf plan": 
Step #2 - "tf plan":       �[32m+�[0m �[0mnetwork_interface {
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mipv6_access_type�[0m�[0m   = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m               = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mnetwork�[0m�[0m            = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mnetwork_ip�[0m�[0m         = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mstack_type�[0m�[0m         = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0msubnetwork�[0m�[0m         = "prod-subnet-01"
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0msubnetwork_project�[0m�[0m = (known after apply)
Step #2 - "tf plan": 
Step #2 - "tf plan":           �[32m+�[0m �[0maccess_config {
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mnat_ip�[0m�[0m       = (known after apply)
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mnetwork_tier�[0m�[0m = (known after apply)
Step #2 - "tf plan":             }
Step #2 - "tf plan":         }
Step #2 - "tf plan": 
Step #2 - "tf plan":       �[32m+�[0m �[0mreservation_affinity {
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mtype�[0m�[0m = (known after apply)
Step #2 - "tf plan": 
Step #2 - "tf plan":           �[32m+�[0m �[0mspecific_reservation {
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mkey�[0m�[0m    = (known after apply)
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mvalues�[0m�[0m = (known after apply)
Step #2 - "tf plan":             }
Step #2 - "tf plan":         }
Step #2 - "tf plan": 
Step #2 - "tf plan":       �[32m+�[0m �[0mscheduling {
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mautomatic_restart�[0m�[0m   = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mmin_node_cpus�[0m�[0m       = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mon_host_maintenance�[0m�[0m = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mpreemptible�[0m�[0m         = (known after apply)
Step #2 - "tf plan": 
Step #2 - "tf plan":           �[32m+�[0m �[0mnode_affinities {
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mkey�[0m�[0m      = (known after apply)
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0moperator�[0m�[0m = (known after apply)
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mvalues�[0m�[0m   = (known after apply)
Step #2 - "tf plan":             }
Step #2 - "tf plan":         }
Step #2 - "tf plan":     }
Step #2 - "tf plan": 
Step #2 - "tf plan": �[1m  # module.vpc.module.vpc.module.subnets.google_compute_subnetwork.subnetwork["us-west1/prod-subnet-01"]�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m  �[32m+�[0m�[0m resource "google_compute_subnetwork" "subnetwork" {
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mcreation_timestamp�[0m�[0m         = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mexternal_ipv6_prefix�[0m�[0m       = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mfingerprint�[0m�[0m                = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mgateway_address�[0m�[0m            = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m                         = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mip_cidr_range�[0m�[0m              = "10.20.10.0/24"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mipv6_cidr_range�[0m�[0m            = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m                       = "prod-subnet-01"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mnetwork�[0m�[0m                    = "prod"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mprivate_ip_google_access�[0m�[0m   = false
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mprivate_ipv6_google_access�[0m�[0m = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m                    = "aksgkelearning"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mpurpose�[0m�[0m                    = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mregion�[0m�[0m                     = "us-west1"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0msecondary_ip_range�[0m�[0m         = []
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m                  = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mstack_type�[0m�[0m                 = (known after apply)
Step #2 - "tf plan":     }
Step #2 - "tf plan": 
Step #2 - "tf plan": �[1m  # module.vpc.module.vpc.module.subnets.google_compute_subnetwork.subnetwork["us-west1/prod-subnet-02"]�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m  �[32m+�[0m�[0m resource "google_compute_subnetwork" "subnetwork" {
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mcreation_timestamp�[0m�[0m         = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mexternal_ipv6_prefix�[0m�[0m       = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mfingerprint�[0m�[0m                = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mgateway_address�[0m�[0m            = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m                         = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mip_cidr_range�[0m�[0m              = "10.20.11.0/24"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mipv6_cidr_range�[0m�[0m            = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m                       = "prod-subnet-02"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mnetwork�[0m�[0m                    = "prod"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mprivate_ip_google_access�[0m�[0m   = false
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mprivate_ipv6_google_access�[0m�[0m = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m                    = "aksgkelearning"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mpurpose�[0m�[0m                    = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mregion�[0m�[0m                     = "us-west1"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0msecondary_ip_range�[0m�[0m         = []
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m                  = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mstack_type�[0m�[0m                 = (known after apply)
Step #2 - "tf plan":     }
Step #2 - "tf plan": 
Step #2 - "tf plan": �[1m  # module.vpc.module.vpc.module.vpc.google_compute_network.network�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m  �[32m+�[0m�[0m resource "google_compute_network" "network" {
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mauto_create_subnetworks�[0m�[0m         = false
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mdelete_default_routes_on_create�[0m�[0m = false
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mgateway_ipv4�[0m�[0m                    = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m                              = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mmtu�[0m�[0m                             = 0
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m                            = "prod"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m                         = "aksgkelearning"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mrouting_mode�[0m�[0m                    = "GLOBAL"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m                       = (known after apply)
Step #2 - "tf plan":     }
Step #2 - "tf plan": 
Step #2 - "tf plan": �[0m�[1mPlan:�[0m 5 to add, 0 to change, 0 to destroy.
Step #2 - "tf plan": �[0m�[0m
Step #2 - "tf plan": �[1mChanges to Outputs:�[0m�[0m
Step #2 - "tf plan":   �[32m+�[0m �[0m�[1m�[0mexternal_ip�[0m�[0m   = (known after apply)
Step #2 - "tf plan":   �[32m+�[0m �[0m�[1m�[0mfirewall_rule�[0m�[0m = "prod-allow-http"
Step #2 - "tf plan":   �[32m+�[0m �[0m�[1m�[0minstance_name�[0m�[0m = "prod-apache2-instance"
Step #2 - "tf plan":   �[32m+�[0m �[0m�[1m�[0mnetwork�[0m�[0m       = "prod"
Step #2 - "tf plan":   �[32m+�[0m �[0m�[1m�[0msubnet�[0m�[0m        = "prod-subnet-01"
Step #2 - "tf plan": �[90m
Step #2 - "tf plan": ─────────────────────────────────────────────────────────────────────────────�[0m
Step #2 - "tf plan": 
Step #2 - "tf plan": Note: You didn't use the -out option to save this plan, so Terraform can't
Step #2 - "tf plan": guarantee to take exactly these actions if you run "terraform apply" now.
Finished Step #2 - "tf plan"
Starting Step #3 - "tf apply"
Step #3 - "tf apply": Already have image (with digest): hashicorp/terraform:1.0.0
Step #3 - "tf apply": ***************************** SKIPPING APPLYING *******************************
Step #3 - "tf apply": Branch 'feature' does not represent an official environment.
Step #3 - "tf apply": *******************************************************************************
Finished Step #3 - "tf apply"
PUSH
DONE

Build Log: https://console.cloud.google.com/logs/viewer?advancedFilter=resource.type%3D%22build%22+AND+resource.labels.build_id%3D%22fe4ed1e8-1a84-4998-a2ed-1e0d52c98f1e%22+AND+resource.labels.build_trigger_id%3D%229c83ae6b-aaeb-488d-b178-8582f08c6683%22&project=aksgkelearning