-
Notifications
You must be signed in to change notification settings - Fork 37
Open
Labels
bugSomething isn't workingSomething isn't working
Description
branch: master (d6cb314)
Terraform: 12.x
Ansible: 1.9.4
aws-cli: 1.17.9
Relates to this issue: #144
Deployment of infrastructure interrupts with the error. What I noticed from AWS dashboard: script doesn't create a code deployment group and EC2 instance at least.
The full log is attached:
MacBook-Pro-Viktor-2:blockscout-terraform viktor$ ansible-playbook deploy_infra.yml
PLAY [Prepare infrastructure] **************************************************************
TASK [Gathering Facts] *********************************************************************
ok: [test]
TASK [check : Check if terraform is installed] *********************************************
ok: [test]
TASK [check : Check if python is installed] ************************************************
ok: [test]
TASK [check : Check if all required modules is installed] **********************************
ok: [test] => (item=boto)
ok: [test] => (item=boto3)
ok: [test] => (item=botocore)
TASK [s3 : Create S3 bucket] ***************************************************************
changed: [test]
TASK [s3 : Apply tags and versioning to create S3 bucket] **********************************
changed: [test]
TASK [s3 : Add lifecycle management policy to created S3 bucket] ***************************
changed: [test]
TASK [dynamodb : Create DynamoDB table] ****************************************************
changed: [test]
TASK [main_infra : Ansible delete file glob] ***********************************************
ok: [test]
TASK [main_infra : Copy files] *************************************************************
changed: [test]
TASK [main_infra : Local or remote backend selector (remote)] ******************************
changed: [test]
TASK [main_infra : Generating variables file] **********************************************
changed: [test]
TASK [main_infra : Generating backend file] ************************************************
changed: [test]
TASK [main_infra : Remove Terraform state] *************************************************
changed: [test] => (item=/tmp/files-tes1s/.terraform/)
ok: [test] => (item=/tmp/files-tes1s/terraform.tfstate)
changed: [test] => (item=/tmp/files-tes1s/terraform.tfstate.backup)
changed: [test] => (item=/tmp/files-tes1s/terraform.tfplan)
TASK [main_infra : Terraform plan construct] ***********************************************
changed: [test] => (item=init -backend-config=backend.tfvars)
changed: [test] => (item=plan -out terraform.tfplan)
changed: [test] => (item=show -no-color terraform.tfplan)
TASK [main_infra : Show Terraform plan] ****************************************************
ok: [test] => {
"tf_plan.results[2].stdout_lines": [
"",
"An execution plan has been generated and is shown below.",
"Resource actions are indicated with the following symbols:",
" + create",
" <= read (data resources)",
"",
"Terraform will perform the following actions:",
"",
" # data.aws_iam_policy_document.codedeploy-policy will be read during apply",
" # (config refers to values not yet known)",
" <= data \"aws_iam_policy_document\" \"codedeploy-policy\" {",
" + id = (known after apply)",
" + json = (known after apply)",
"",
" + statement {",
" + actions = [",
" + \"autoscaling:*\",",
" + \"codedeploy:*\",",
" + \"ec2:DescribeInstanceStatus\",",
" + \"ec2:DescribeInstances\",",
" + \"sns:Publish\",",
" + \"tag:*\",",
" ]",
" + effect = \"Allow\"",
" + resources = [",
" + \"*\",",
" ]",
" }",
" + statement {",
" + actions = [",
" + \"s3:Get*\",",
" + \"s3:List*\",",
" ]",
" + effect = \"Allow\"",
" + resources = [",
" + \"arn:aws:s3:::aws-codedeploy-ap-northeast-1/*\",",
" + \"arn:aws:s3:::aws-codedeploy-ap-northeast-2/*\",",
" + \"arn:aws:s3:::aws-codedeploy-ap-south-1/*\",",
" + \"arn:aws:s3:::aws-codedeploy-ap-southeast-1/*\",",
" + \"arn:aws:s3:::aws-codedeploy-ap-southeast-2/*\",",
" + \"arn:aws:s3:::aws-codedeploy-eu-central-1/*\",",
" + \"arn:aws:s3:::aws-codedeploy-eu-west-1/*\",",
" + \"arn:aws:s3:::aws-codedeploy-sa-east-1/*\",",
" + \"arn:aws:s3:::aws-codedeploy-us-east-1/*\",",
" + \"arn:aws:s3:::aws-codedeploy-us-east-2/*\",",
" + \"arn:aws:s3:::aws-codedeploy-us-west-1/*\",",
" + \"arn:aws:s3:::aws-codedeploy-us-west-2/*\",",
" + (known after apply),",
" + (known after apply),",
" ]",
" }",
" }",
"",
" # aws_alb_listener.alb_listener[0] will be created",
" + resource \"aws_alb_listener\" \"alb_listener\" {",
" + arn = (known after apply)",
" + id = (known after apply)",
" + load_balancer_arn = (known after apply)",
" + port = 80",
" + protocol = \"HTTP\"",
" + ssl_policy = (known after apply)",
"",
" + default_action {",
" + order = (known after apply)",
" + target_group_arn = (known after apply)",
" + type = \"forward\"",
" }",
" }",
"",
" # aws_autoscaling_group.explorer[0] will be created",
" + resource \"aws_autoscaling_group\" \"explorer\" {",
" + arn = (known after apply)",
" + availability_zones = (known after apply)",
" + default_cooldown = (known after apply)",
" + desired_capacity = 1",
" + enabled_metrics = [",
" + \"GroupDesiredCapacity\",",
" + \"GroupInServiceInstances\",",
" + \"GroupMaxSize\",",
" + \"GroupMinSize\",",
" + \"GroupTotalInstances\",",
" ]",
" + force_delete = false",
" + health_check_grace_period = 300",
" + health_check_type = \"EC2\"",
" + id = (known after apply)",
" + launch_configuration = (known after apply)",
" + load_balancers = (known after apply)",
" + max_size = 4",
" + metrics_granularity = \"1Minute\"",
" + min_size = 1",
" + name = \"tes1s-test-asg\"",
" + placement_group = \"tes1s-test-explorer-pg\"",
" + protect_from_scale_in = false",
" + service_linked_role_arn = (known after apply)",
" + target_group_arns = (known after apply)",
" + vpc_zone_identifier = (known after apply)",
" + wait_for_capacity_timeout = \"10m\"",
"",
" + tag {",
" + key = \"Name\"",
" + propagate_at_launch = true",
" + value = \"test Application\"",
" }",
" + tag {",
" + key = \"chain\"",
" + propagate_at_launch = true",
" + value = \"test\"",
" }",
" + tag {",
" + key = \"prefix\"",
" + propagate_at_launch = true",
" + value = \"tes1s\"",
" }",
" }",
"",
" # aws_autoscaling_policy.explorer-down[0] will be created",
" + resource \"aws_autoscaling_policy\" \"explorer-down\" {",
" + adjustment_type = \"ChangeInCapacity\"",
" + arn = (known after apply)",
" + autoscaling_group_name = \"tes1s-test-asg\"",
" + cooldown = 300",
" + id = (known after apply)",
" + metric_aggregation_type = (known after apply)",
" + name = \"tes1s-test-explorer-autoscaling-policy-down\"",
" + policy_type = \"SimpleScaling\"",
" + scaling_adjustment = -1",
" }",
"",
" # aws_autoscaling_policy.explorer-up[0] will be created",
" + resource \"aws_autoscaling_policy\" \"explorer-up\" {",
" + adjustment_type = \"ChangeInCapacity\"",
" + arn = (known after apply)",
" + autoscaling_group_name = \"tes1s-test-asg\"",
" + cooldown = 300",
" + id = (known after apply)",
" + metric_aggregation_type = (known after apply)",
" + name = \"tes1s-test-explorer-autoscaling-policy-up\"",
" + policy_type = \"SimpleScaling\"",
" + scaling_adjustment = 1",
" }",
"",
" # aws_codedeploy_app.explorer will be created",
" + resource \"aws_codedeploy_app\" \"explorer\" {",
" + compute_platform = \"Server\"",
" + id = (known after apply)",
" + name = \"tes1s-explorer\"",
" + unique_id = (known after apply)",
" }",
"",
" # aws_codedeploy_deployment_group.explorer[0] will be created",
" + resource \"aws_codedeploy_deployment_group\" \"explorer\" {",
" + app_name = \"tes1s-explorer\"",
" + autoscaling_groups = [",
" + \"tes1s-test-asg\",",
" ]",
" + deployment_config_name = \"CodeDeployDefault.OneAtATime\"",
" + deployment_group_name = \"tes1s-explorer-dg0\"",
" + id = (known after apply)",
" + service_role_arn = (known after apply)",
"",
" + blue_green_deployment_config {",
" + deployment_ready_option {",
" + action_on_timeout = \"STOP_DEPLOYMENT\"",
" + wait_time_in_minutes = 30",
" }",
"",
" + green_fleet_provisioning_option {",
" + action = \"COPY_AUTO_SCALING_GROUP\"",
" }",
"",
" + terminate_blue_instances_on_deployment_success {",
" + action = \"TERMINATE\"",
" + termination_wait_time_in_minutes = 15",
" }",
" }",
"",
" + deployment_style {",
" + deployment_option = \"WITH_TRAFFIC_CONTROL\"",
" + deployment_type = \"BLUE_GREEN\"",
" }",
"",
" + load_balancer_info {",
"",
" + target_group_info {",
" + name = \"tes1s-explorer-test-alb-target\"",
" }",
" }",
" }",
"",
" # aws_db_instance.default[0] will be created",
" + resource \"aws_db_instance\" \"default\" {",
" + address = (known after apply)",
" + allocated_storage = 10",
" + apply_immediately = true",
" + arn = (known after apply)",
" + auto_minor_version_upgrade = true",
" + availability_zone = (known after apply)",
" + backup_retention_period = (known after apply)",
" + backup_window = (known after apply)",
" + ca_cert_identifier = (known after apply)",
" + character_set_name = (known after apply)",
" + copy_tags_to_snapshot = true",
" + db_subnet_group_name = (known after apply)",
" + endpoint = (known after apply)",
" + engine = \"postgres\"",
" + engine_version = \"10.6\"",
" + hosted_zone_id = (known after apply)",
" + id = (known after apply)",
" + identifier = \"tes1s-tes1s-poa\"",
" + identifier_prefix = (known after apply)",
" + instance_class = \"db.t3.small\"",
" + iops = 0",
" + kms_key_id = (known after apply)",
" + license_model = (known after apply)",
" + maintenance_window = (known after apply)",
" + monitoring_interval = 0",
" + monitoring_role_arn = (known after apply)",
" + multi_az = (known after apply)",
" + name = \"test\"",
" + option_group_name = (known after apply)",
" + parameter_group_name = (known after apply)",
" + password = (sensitive value)",
" + performance_insights_enabled = false",
" + performance_insights_kms_key_id = (known after apply)",
" + performance_insights_retention_period = (known after apply)",
" + port = (known after apply)",
" + publicly_accessible = false",
" + replicas = (known after apply)",
" + resource_id = (known after apply)",
" + skip_final_snapshot = true",
" + status = (known after apply)",
" + storage_type = \"gp2\"",
" + tags = {",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + timezone = (known after apply)",
" + username = \"poa\"",
" + vpc_security_group_ids = (known after apply)",
" }",
"",
" # aws_db_subnet_group.database will be created",
" + resource \"aws_db_subnet_group\" \"database\" {",
" + arn = (known after apply)",
" + description = \"The group of database subnets\"",
" + id = (known after apply)",
" + name = \"tes1s-database\"",
" + name_prefix = (known after apply)",
" + subnet_ids = (known after apply)",
" + tags = {",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" }",
"",
" # aws_iam_instance_profile.explorer will be created",
" + resource \"aws_iam_instance_profile\" \"explorer\" {",
" + arn = (known after apply)",
" + create_date = (known after apply)",
" + id = (known after apply)",
" + name = \"tes1s-explorer-profile\"",
" + path = \"/tes1s/\"",
" + role = \"tes1s-explorer-role\"",
" + roles = (known after apply)",
" + unique_id = (known after apply)",
" }",
"",
" # aws_iam_role.deployer will be created",
" + resource \"aws_iam_role\" \"deployer\" {",
" + arn = (known after apply)",
" + assume_role_policy = jsonencode(",
" {",
" + Statement = [",
" + {",
" + Action = \"sts:AssumeRole\"",
" + Effect = \"Allow\"",
" + Principal = {",
" + Service = \"codedeploy.amazonaws.com\"",
" }",
" + Sid = \"\"",
" },",
" ]",
" + Version = \"2012-10-17\"",
" }",
" )",
" + create_date = (known after apply)",
" + description = \"The IAM role given to the CodeDeploy service\"",
" + force_detach_policies = false",
" + id = (known after apply)",
" + max_session_duration = 3600",
" + name = \"tes1s-deployer-role\"",
" + path = \"/\"",
" + unique_id = (known after apply)",
" }",
"",
" # aws_iam_role.role will be created",
" + resource \"aws_iam_role\" \"role\" {",
" + arn = (known after apply)",
" + assume_role_policy = jsonencode(",
" {",
" + Statement = [",
" + {",
" + Action = \"sts:AssumeRole\"",
" + Effect = \"Allow\"",
" + Principal = {",
" + Service = \"ec2.amazonaws.com\"",
" }",
" + Sid = \"\"",
" },",
" ]",
" + Version = \"2012-10-17\"",
" }",
" )",
" + create_date = (known after apply)",
" + description = \"The IAM role given to each Explorer instance\"",
" + force_detach_policies = false",
" + id = (known after apply)",
" + max_session_duration = 3600",
" + name = \"tes1s-explorer-role\"",
" + path = \"/tes1s/\"",
" + unique_id = (known after apply)",
" }",
"",
" # aws_iam_role_policy.config will be created",
" + resource \"aws_iam_role_policy\" \"config\" {",
" + id = (known after apply)",
" + name = \"tes1s-config-policy\"",
" + policy = jsonencode(",
" {",
" + Statement = [",
" + {",
" + Action = \"ec2:DescribeTags\"",
" + Effect = \"Allow\"",
" + Resource = \"*\"",
" + Sid = \"\"",
" },",
" + {",
" + Action = [",
" + \"ssm:GetParametersByPath\",",
" + \"ssm:GetParameters\",",
" + \"ssm:GetParameter\",",
" ]",
" + Effect = \"Allow\"",
" + Resource = [",
" + \"arn:aws:ssm:*:*:parameter/tes1s/*/*\",",
" + \"arn:aws:ssm:*:*:parameter/tes1s/*\",",
" ]",
" + Sid = \"\"",
" },",
" ]",
" + Version = \"2012-10-17\"",
" }",
" )",
" + role = (known after apply)",
" }",
"",
" # aws_iam_role_policy.deployer will be created",
" + resource \"aws_iam_role_policy\" \"deployer\" {",
" + id = (known after apply)",
" + name = \"tes1s-codedeploy-policy\"",
" + policy = (known after apply)",
" + role = (known after apply)",
" }",
"",
" # aws_iam_role_policy_attachment.codedeploy-policy-attachment will be created",
" + resource \"aws_iam_role_policy_attachment\" \"codedeploy-policy-attachment\" {",
" + id = (known after apply)",
" + policy_arn = \"arn:aws:iam::aws:policy/service-role/AWSCodeDeployRole\"",
" + role = \"tes1s-deployer-role\"",
" }",
"",
" # aws_iam_role_policy_attachment.ec2-codedeploy-policy-attachment will be created",
" + resource \"aws_iam_role_policy_attachment\" \"ec2-codedeploy-policy-attachment\" {",
" + id = (known after apply)",
" + policy_arn = \"arn:aws:iam::aws:policy/service-role/AmazonEC2RoleforAWSCodeDeploy\"",
" + role = \"tes1s-explorer-role\"",
" }",
"",
" # aws_iam_role_policy_attachment.ec2-ssm-policy-attachment will be created",
" + resource \"aws_iam_role_policy_attachment\" \"ec2-ssm-policy-attachment\" {",
" + id = (known after apply)",
" + policy_arn = \"arn:aws:iam::aws:policy/service-role/AmazonEC2RoleforSSM\"",
" + role = \"tes1s-explorer-role\"",
" }",
"",
" # aws_internet_gateway.default will be created",
" + resource \"aws_internet_gateway\" \"default\" {",
" + id = (known after apply)",
" + owner_id = (known after apply)",
" + tags = {",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + vpc_id = (known after apply)",
" }",
"",
" # aws_launch_configuration.explorer will be created",
" + resource \"aws_launch_configuration\" \"explorer\" {",
" + arn = (known after apply)",
" + associate_public_ip_address = false",
" + ebs_optimized = (known after apply)",
" + enable_monitoring = true",
" + iam_instance_profile = (known after apply)",
" + id = (known after apply)",
" + image_id = \"ami-062f7200baf2fa504\"",
" + instance_type = \"t3.small\"",
" + key_name = \"sok2p-test\"",
" + name = (known after apply)",
" + name_prefix = \"tes1s-explorer-launchconfig\"",
" + security_groups = (known after apply)",
" + user_data = \"0ff72f6f66193ee0ea017b8bcaf8ea5f03b9a60d\"",
"",
" + ebs_block_device {",
" + delete_on_termination = (known after apply)",
" + device_name = (known after apply)",
" + encrypted = (known after apply)",
" + iops = (known after apply)",
" + no_device = (known after apply)",
" + snapshot_id = (known after apply)",
" + volume_size = (known after apply)",
" + volume_type = (known after apply)",
" }",
"",
" + root_block_device {",
" + delete_on_termination = true",
" + encrypted = (known after apply)",
" + iops = (known after apply)",
" + volume_size = 50",
" + volume_type = (known after apply)",
" }",
" }",
"",
" # aws_lb.explorer[0] will be created",
" + resource \"aws_lb\" \"explorer\" {",
" + arn = (known after apply)",
" + arn_suffix = (known after apply)",
" + dns_name = (known after apply)",
" + enable_deletion_protection = false",
" + enable_http2 = true",
" + id = (known after apply)",
" + idle_timeout = 60",
" + internal = false",
" + ip_address_type = (known after apply)",
" + load_balancer_type = \"application\"",
" + name = \"tes1s-explorer-test-alb\"",
" + security_groups = (known after apply)",
" + subnets = (known after apply)",
" + tags = {",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + vpc_id = (known after apply)",
" + zone_id = (known after apply)",
"",
" + subnet_mapping {",
" + allocation_id = (known after apply)",
" + subnet_id = (known after apply)",
" }",
" }",
"",
" # aws_lb_target_group.explorer[0] will be created",
" + resource \"aws_lb_target_group\" \"explorer\" {",
" + arn = (known after apply)",
" + arn_suffix = (known after apply)",
" + deregistration_delay = 300",
" + id = (known after apply)",
" + lambda_multi_value_headers_enabled = false",
" + name = \"tes1s-explorer-test-alb-target\"",
" + port = 4000",
" + protocol = \"HTTP\"",
" + proxy_protocol_v2 = false",
" + slow_start = 0",
" + tags = {",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + target_type = \"instance\"",
" + vpc_id = (known after apply)",
"",
" + health_check {",
" + enabled = true",
" + healthy_threshold = 2",
" + interval = 30",
" + matcher = (known after apply)",
" + path = \"/blocks\"",
" + port = \"4000\"",
" + protocol = \"HTTP\"",
" + timeout = 15",
" + unhealthy_threshold = 2",
" }",
"",
" + stickiness {",
" + cookie_duration = 600",
" + enabled = true",
" + type = \"lb_cookie\"",
" }",
" }",
"",
" # aws_placement_group.explorer[0] will be created",
" + resource \"aws_placement_group\" \"explorer\" {",
" + id = (known after apply)",
" + name = \"tes1s-test-explorer-pg\"",
" + placement_group_id = (known after apply)",
" + strategy = \"cluster\"",
" }",
"",
" # aws_route.internet_access will be created",
" + resource \"aws_route\" \"internet_access\" {",
" + destination_cidr_block = \"0.0.0.0/0\"",
" + destination_prefix_list_id = (known after apply)",
" + egress_only_gateway_id = (known after apply)",
" + gateway_id = (known after apply)",
" + id = (known after apply)",
" + instance_id = (known after apply)",
" + instance_owner_id = (known after apply)",
" + nat_gateway_id = (known after apply)",
" + network_interface_id = (known after apply)",
" + origin = (known after apply)",
" + route_table_id = (known after apply)",
" + state = (known after apply)",
" }",
"",
" # aws_route53_record.db[0] will be created",
" + resource \"aws_route53_record\" \"db\" {",
" + allow_overwrite = (known after apply)",
" + fqdn = (known after apply)",
" + id = (known after apply)",
" + name = \"db0\"",
" + type = \"A\"",
" + zone_id = (known after apply)",
"",
" + alias {",
" + evaluate_target_health = false",
" + name = (known after apply)",
" + zone_id = (known after apply)",
" }",
" }",
"",
" # aws_route53_zone.main will be created",
" + resource \"aws_route53_zone\" \"main\" {",
" + comment = \"Managed by Terraform\"",
" + force_destroy = false",
" + id = (known after apply)",
" + name = \"tes1s.poa.internal\"",
" + name_servers = (known after apply)",
" + tags = {",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + vpc_id = (known after apply)",
" + vpc_region = (known after apply)",
" + zone_id = (known after apply)",
"",
" + vpc {",
" + vpc_id = (known after apply)",
" + vpc_region = (known after apply)",
" }",
" }",
"",
" # aws_s3_bucket.explorer_releases will be created",
" + resource \"aws_s3_bucket\" \"explorer_releases\" {",
" + acceleration_status = (known after apply)",
" + acl = \"private\"",
" + arn = (known after apply)",
" + bucket = \"tes1s-explorer-codedeploy-releases\"",
" + bucket_domain_name = (known after apply)",
" + bucket_regional_domain_name = (known after apply)",
" + force_destroy = true",
" + hosted_zone_id = (known after apply)",
" + id = (known after apply)",
" + region = (known after apply)",
" + request_payer = (known after apply)",
" + website_domain = (known after apply)",
" + website_endpoint = (known after apply)",
"",
" + versioning {",
" + enabled = true",
" + mfa_delete = false",
" }",
" }",
"",
" # aws_security_group.alb will be created",
" + resource \"aws_security_group\" \"alb\" {",
" + arn = (known after apply)",
" + description = \"A security group for the app server ALB, so it is accessible via the web\"",
" + egress = [",
" + {",
" + cidr_blocks = [",
" + \"0.0.0.0/0\",",
" ]",
" + description = \"\"",
" + from_port = 0",
" + ipv6_cidr_blocks = []",
" + prefix_list_ids = []",
" + protocol = \"-1\"",
" + security_groups = []",
" + self = false",
" + to_port = 0",
" },",
" ]",
" + id = (known after apply)",
" + ingress = [",
" + {",
" + cidr_blocks = [",
" + \"0.0.0.0/0\",",
" ]",
" + description = \"\"",
" + from_port = 4000",
" + ipv6_cidr_blocks = []",
" + prefix_list_ids = []",
" + protocol = \"tcp\"",
" + security_groups = []",
" + self = false",
" + to_port = 4000",
" },",
" + {",
" + cidr_blocks = [",
" + \"0.0.0.0/0\",",
" ]",
" + description = \"\"",
" + from_port = 443",
" + ipv6_cidr_blocks = []",
" + prefix_list_ids = []",
" + protocol = \"tcp\"",
" + security_groups = []",
" + self = false",
" + to_port = 443",
" },",
" + {",
" + cidr_blocks = [",
" + \"0.0.0.0/0\",",
" ]",
" + description = \"\"",
" + from_port = 80",
" + ipv6_cidr_blocks = []",
" + prefix_list_ids = []",
" + protocol = \"tcp\"",
" + security_groups = []",
" + self = false",
" + to_port = 80",
" },",
" ]",
" + name = \"tes1s-poa-alb\"",
" + owner_id = (known after apply)",
" + revoke_rules_on_delete = false",
" + tags = {",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + vpc_id = (known after apply)",
" }",
"",
" # aws_security_group.app will be created",
" + resource \"aws_security_group\" \"app\" {",
" + arn = (known after apply)",
" + description = \"A security group for the app server, allowing SSH and HTTP(S)\"",
" + egress = [",
" + {",
" + cidr_blocks = [",
" + \"0.0.0.0/0\",",
" ]",
" + description = \"\"",
" + from_port = 0",
" + ipv6_cidr_blocks = []",
" + prefix_list_ids = []",
" + protocol = \"-1\"",
" + security_groups = []",
" + self = false",
" + to_port = 0",
" },",
" ]",
" + id = (known after apply)",
" + ingress = [",
" + {",
" + cidr_blocks = [",
" + \"0.0.0.0/0\",",
" ]",
" + description = \"\"",
" + from_port = 22",
" + ipv6_cidr_blocks = []",
" + prefix_list_ids = []",
" + protocol = \"tcp\"",
" + security_groups = []",
" + self = false",
" + to_port = 22",
" },",
" + {",
" + cidr_blocks = [",
" + \"10.0.0.0/16\",",
" ]",
" + description = \"\"",
" + from_port = 4000",
" + ipv6_cidr_blocks = []",
" + prefix_list_ids = []",
" + protocol = \"tcp\"",
" + security_groups = []",
" + self = false",
" + to_port = 4000",
" },",
" + {",
" + cidr_blocks = [",
" + \"10.0.0.0/16\",",
" ]",
" + description = \"\"",
" + from_port = 443",
" + ipv6_cidr_blocks = []",
" + prefix_list_ids = []",
" + protocol = \"tcp\"",
" + security_groups = []",
" + self = false",
" + to_port = 443",
" },",
" + {",
" + cidr_blocks = [",
" + \"10.0.0.0/16\",",
" ]",
" + description = \"\"",
" + from_port = 80",
" + ipv6_cidr_blocks = []",
" + prefix_list_ids = []",
" + protocol = \"tcp\"",
" + security_groups = []",
" + self = false",
" + to_port = 80",
" },",
" ]",
" + name = \"tes1s-poa-app\"",
" + owner_id = (known after apply)",
" + revoke_rules_on_delete = false",
" + tags = {",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + vpc_id = (known after apply)",
" }",
"",
" # aws_security_group.database will be created",
" + resource \"aws_security_group\" \"database\" {",
" + arn = (known after apply)",
" + description = \"Allow any inbound traffic from public/private subnet\"",
" + egress = [",
" + {",
" + cidr_blocks = [",
" + \"0.0.0.0/0\",",
" ]",
" + description = \"\"",
" + from_port = 0",
" + ipv6_cidr_blocks = []",
" + prefix_list_ids = []",
" + protocol = \"-1\"",
" + security_groups = []",
" + self = false",
" + to_port = 0",
" },",
" ]",
" + id = (known after apply)",
" + ingress = [",
" + {",
" + cidr_blocks = [",
" + \"10.0.0.0/24\",",
" ]",
" + description = \"\"",
" + from_port = 0",
" + ipv6_cidr_blocks = []",
" + prefix_list_ids = []",
" + protocol = \"tcp\"",
" + security_groups = []",
" + self = false",
" + to_port = 65535",
" },",
" ]",
" + name = \"tes1s-poa-database\"",
" + owner_id = (known after apply)",
" + revoke_rules_on_delete = false",
" + tags = {",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + vpc_id = (known after apply)",
" }",
"",
" # aws_ssm_parameter.db_host[0] will be created",
" + resource \"aws_ssm_parameter\" \"db_host\" {",
" + arn = (known after apply)",
" + id = (known after apply)",
" + key_id = (known after apply)",
" + name = \"/tes1s/test/db_host\"",
" + tier = \"Standard\"",
" + type = \"String\"",
" + value = (sensitive value)",
" + version = (known after apply)",
" }",
"",
" # aws_ssm_parameter.db_name[0] will be created",
" + resource \"aws_ssm_parameter\" \"db_name\" {",
" + arn = (known after apply)",
" + id = (known after apply)",
" + key_id = (known after apply)",
" + name = \"/tes1s/test/db_name\"",
" + tier = \"Standard\"",
" + type = \"String\"",
" + value = (sensitive value)",
" + version = (known after apply)",
" }",
"",
" # aws_ssm_parameter.db_password[0] will be created",
" + resource \"aws_ssm_parameter\" \"db_password\" {",
" + arn = (known after apply)",
" + id = (known after apply)",
" + key_id = (known after apply)",
" + name = \"/tes1s/test/db_password\"",
" + tier = \"Standard\"",
" + type = \"String\"",
" + value = (sensitive value)",
" + version = (known after apply)",
" }",
"",
" # aws_ssm_parameter.db_port[0] will be created",
" + resource \"aws_ssm_parameter\" \"db_port\" {",
" + arn = (known after apply)",
" + id = (known after apply)",
" + key_id = (known after apply)",
" + name = \"/tes1s/test/db_port\"",
" + tier = \"Standard\"",
" + type = \"String\"",
" + value = (sensitive value)",
" + version = (known after apply)",
" }",
"",
" # aws_ssm_parameter.db_username[0] will be created",
" + resource \"aws_ssm_parameter\" \"db_username\" {",
" + arn = (known after apply)",
" + id = (known after apply)",
" + key_id = (known after apply)",
" + name = \"/tes1s/test/db_username\"",
" + tier = \"Standard\"",
" + type = \"String\"",
" + value = (sensitive value)",
" + version = (known after apply)",
" }",
"",
" # aws_subnet.alb will be created",
" + resource \"aws_subnet\" \"alb\" {",
" + arn = (known after apply)",
" + assign_ipv6_address_on_creation = false",
" + availability_zone = \"us-east-1b\"",
" + availability_zone_id = (known after apply)",
" + cidr_block = \"10.0.8.0/21\"",
" + id = (known after apply)",
" + ipv6_cidr_block = (known after apply)",
" + ipv6_cidr_block_association_id = (known after apply)",
" + map_public_ip_on_launch = true",
" + owner_id = (known after apply)",
" + tags = {",
" + \"Name\" = \"tes1s-default-subnet\"",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + vpc_id = (known after apply)",
" }",
"",
" # aws_subnet.database[0] will be created",
" + resource \"aws_subnet\" \"database\" {",
" + arn = (known after apply)",
" + assign_ipv6_address_on_creation = false",
" + availability_zone = \"us-east-1a\"",
" + availability_zone_id = (known after apply)",
" + cidr_block = \"10.0.1.0/24\"",
" + id = (known after apply)",
" + ipv6_cidr_block = (known after apply)",
" + ipv6_cidr_block_association_id = (known after apply)",
" + map_public_ip_on_launch = false",
" + owner_id = (known after apply)",
" + tags = {",
" + \"Name\" = \"tes1s-database-subnet0\"",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + vpc_id = (known after apply)",
" }",
"",
" # aws_subnet.database[1] will be created",
" + resource \"aws_subnet\" \"database\" {",
" + arn = (known after apply)",
" + assign_ipv6_address_on_creation = false",
" + availability_zone = \"us-east-1b\"",
" + availability_zone_id = (known after apply)",
" + cidr_block = \"10.0.2.0/24\"",
" + id = (known after apply)",
" + ipv6_cidr_block = (known after apply)",
" + ipv6_cidr_block_association_id = (known after apply)",
" + map_public_ip_on_launch = false",
" + owner_id = (known after apply)",
" + tags = {",
" + \"Name\" = \"tes1s-database-subnet1\"",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + vpc_id = (known after apply)",
" }",
"",
" # aws_subnet.database[2] will be created",
" + resource \"aws_subnet\" \"database\" {",
" + arn = (known after apply)",
" + assign_ipv6_address_on_creation = false",
" + availability_zone = \"us-east-1c\"",
" + availability_zone_id = (known after apply)",
" + cidr_block = \"10.0.3.0/24\"",
" + id = (known after apply)",
" + ipv6_cidr_block = (known after apply)",
" + ipv6_cidr_block_association_id = (known after apply)",
" + map_public_ip_on_launch = false",
" + owner_id = (known after apply)",
" + tags = {",
" + \"Name\" = \"tes1s-database-subnet2\"",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + vpc_id = (known after apply)",
" }",
"",
" # aws_subnet.database[3] will be created",
" + resource \"aws_subnet\" \"database\" {",
" + arn = (known after apply)",
" + assign_ipv6_address_on_creation = false",
" + availability_zone = \"us-east-1d\"",
" + availability_zone_id = (known after apply)",
" + cidr_block = \"10.0.4.0/24\"",
" + id = (known after apply)",
" + ipv6_cidr_block = (known after apply)",
" + ipv6_cidr_block_association_id = (known after apply)",
" + map_public_ip_on_launch = false",
" + owner_id = (known after apply)",
" + tags = {",
" + \"Name\" = \"tes1s-database-subnet3\"",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + vpc_id = (known after apply)",
" }",
"",
" # aws_subnet.database[4] will be created",
" + resource \"aws_subnet\" \"database\" {",
" + arn = (known after apply)",
" + assign_ipv6_address_on_creation = false",
" + availability_zone = \"us-east-1e\"",
" + availability_zone_id = (known after apply)",
" + cidr_block = \"10.0.5.0/24\"",
" + id = (known after apply)",
" + ipv6_cidr_block = (known after apply)",
" + ipv6_cidr_block_association_id = (known after apply)",
" + map_public_ip_on_launch = false",
" + owner_id = (known after apply)",
" + tags = {",
" + \"Name\" = \"tes1s-database-subnet4\"",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + vpc_id = (known after apply)",
" }",
"",
" # aws_subnet.database[5] will be created",
" + resource \"aws_subnet\" \"database\" {",
" + arn = (known after apply)",
" + assign_ipv6_address_on_creation = false",
" + availability_zone = \"us-east-1f\"",
" + availability_zone_id = (known after apply)",
" + cidr_block = \"10.0.6.0/24\"",
" + id = (known after apply)",
" + ipv6_cidr_block = (known after apply)",
" + ipv6_cidr_block_association_id = (known after apply)",
" + map_public_ip_on_launch = false",
" + owner_id = (known after apply)",
" + tags = {",
" + \"Name\" = \"tes1s-database-subnet5\"",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + vpc_id = (known after apply)",
" }",
"",
" # aws_subnet.default will be created",
" + resource \"aws_subnet\" \"default\" {",
" + arn = (known after apply)",
" + assign_ipv6_address_on_creation = false",
" + availability_zone = \"us-east-1a\"",
" + availability_zone_id = (known after apply)",
" + cidr_block = \"10.0.0.0/24\"",
" + id = (known after apply)",
" + ipv6_cidr_block = (known after apply)",
" + ipv6_cidr_block_association_id = (known after apply)",
" + map_public_ip_on_launch = true",
" + owner_id = (known after apply)",
" + tags = {",
" + \"Name\" = \"tes1s-default-subnet\"",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" + vpc_id = (known after apply)",
" }",
"",
" # aws_vpc.vpc will be created",
" + resource \"aws_vpc\" \"vpc\" {",
" + arn = (known after apply)",
" + assign_generated_ipv6_cidr_block = false",
" + cidr_block = \"10.0.0.0/16\"",
" + default_network_acl_id = (known after apply)",
" + default_route_table_id = (known after apply)",
" + default_security_group_id = (known after apply)",
" + dhcp_options_id = (known after apply)",
" + enable_classiclink = (known after apply)",
" + enable_classiclink_dns_support = (known after apply)",
" + enable_dns_hostnames = true",
" + enable_dns_support = true",
" + id = (known after apply)",
" + instance_tenancy = \"default\"",
" + ipv6_association_id = (known after apply)",
" + ipv6_cidr_block = (known after apply)",
" + main_route_table_id = (known after apply)",
" + owner_id = (known after apply)",
" + tags = {",
" + \"Name\" = \"tes1s\"",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" }",
"",
" # aws_vpc_dhcp_options.poa_dhcp will be created",
" + resource \"aws_vpc_dhcp_options\" \"poa_dhcp\" {",
" + domain_name = \"poa.internal\"",
" + domain_name_servers = [",
" + \"AmazonProvidedDNS\",",
" ]",
" + id = (known after apply)",
" + owner_id = (known after apply)",
" + tags = {",
" + \"origin\" = \"terraform\"",
" + \"prefix\" = \"tes1s\"",
" }",
" }",
"",
" # aws_vpc_dhcp_options_association.poa_dhcp will be created",
" + resource \"aws_vpc_dhcp_options_association\" \"poa_dhcp\" {",
" + dhcp_options_id = (known after apply)",
" + id = (known after apply)",
" + vpc_id = (known after apply)",
" }",
"",
"Plan: 44 to add, 0 to change, 0 to destroy."
]
}
[main_infra : User prompt]
Are you absolutely sure you want to execute the deployment plan shown above? [False]:
^MFAILED - RETRYING: User prompt (10000 retries left).
[main_infra : User prompt]
Are you absolutely sure you want to execute the deployment plan shown above? [False]:
TASK [main_infra : User prompt] ************************************************************
ok: [test]
TASK [main_infra : Prepare variables for Parameter Store] **********************************
ok: [test] => (item={'key': 'BLOCKSCOUT_VERSION', 'value': 'v3.0.0-beta'})
TASK [main_infra : Insert variables in PS] *************************************************
changed: [test] => (item={'key': 'blockscout_version', 'value': 'v3.0.0-beta'})
FAILED - RETRYING: Terraform provisioning (1 retries left).
TASK [main_infra : Terraform provisioning] *************************************************
fatal: [test]: FAILED! => {"attempts": 1, "changed": true, "cmd": "echo yes | /usr/local/bin/terraform apply terraform.tfplan", "delta": "0:01:35.761547", "end": "2020-02-04 19:08:58.407803", "msg": "non-zero return code", "rc": 1, "start": "2020-02-04 19:07:22.646256", "stderr": "\u001b[31m\n\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1mApplicationAlreadyExistsException: tes1s-explorer already exists.\u001b[0m\n\n\u001b[0m on deploy.tf line 11, in resource \"aws_codedeploy_app\" \"explorer\":\n 11: resource \"aws_codedeploy_app\" \"explorer\" \u001b[4m{\u001b[0m\n\u001b[0m\n\u001b[0m\u001b[0m\n\u001b[31m\n\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1mInvalidPlacementGroup.Duplicate: The placement group 'tes1s-test-explorer-pg' already exists.\n\tstatus code: 400, request id: b7bbbbdc-9c0f-4e66-a8c6-e83476a529e0\u001b[0m\n\n\u001b[0m on hosts.tf line 38, in resource \"aws_placement_group\" \"explorer\":\n 38: resource \"aws_placement_group\" \"explorer\" \u001b[4m{\u001b[0m\n\u001b[0m\n\u001b[0m\u001b[0m\n\u001b[31m\n\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1merror creating SSM parameter: ParameterAlreadyExists: The parameter already exists. To overwrite this value, set the overwrite option in the request to true.\u001b[0m\n\n\u001b[0m on rds.tf line 15, in resource \"aws_ssm_parameter\" \"db_name\":\n 15: resource \"aws_ssm_parameter\" \"db_name\" \u001b[4m{\u001b[0m\n\u001b[0m\n\u001b[0m\u001b[0m\n\u001b[31m\n\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1merror creating SSM parameter: ParameterAlreadyExists: The parameter already exists. To overwrite this value, set the overwrite option in the request to true.\u001b[0m\n\n\u001b[0m on rds.tf line 22, in resource \"aws_ssm_parameter\" \"db_username\":\n 22: resource \"aws_ssm_parameter\" \"db_username\" \u001b[4m{\u001b[0m\n\u001b[0m\n\u001b[0m\u001b[0m\n\u001b[31m\n\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1merror creating SSM parameter: ParameterAlreadyExists: The parameter already exists. To overwrite this value, set the overwrite option in the request to true.\u001b[0m\n\n\u001b[0m on rds.tf line 29, in resource \"aws_ssm_parameter\" \"db_password\":\n 29: resource \"aws_ssm_parameter\" \"db_password\" \u001b[4m{\u001b[0m\n\u001b[0m\n\u001b[0m\u001b[0m\n\u001b[31m\n\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1mError creating application Load Balancer: DuplicateLoadBalancerName: A load balancer with the same name 'tes1s-explorer-test-alb' exists, but with different settings\n\tstatus code: 400, request id: edeee732-0ddf-464d-9825-6f7a27943f83\u001b[0m\n\n\u001b[0m on routing.tf line 19, in resource \"aws_lb\" \"explorer\":\n 19: resource \"aws_lb\" \"explorer\" \u001b[4m{\u001b[0m\n\u001b[0m\n\u001b[0m\u001b[0m\n\u001b[31m\n\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1mError creating LB Target Group: DuplicateTargetGroupName: A target group with the same name 'tes1s-explorer-test-alb-target' exists, but with different settings\n\tstatus code: 400, request id: a137c35b-7906-4940-b0d7-27e40481583f\u001b[0m\n\n\u001b[0m on routing.tf line 36, in resource \"aws_lb_target_group\" \"explorer\":\n 36: resource \"aws_lb_target_group\" \"explorer\" \u001b[4m{\u001b[0m\n\u001b[0m\n\u001b[0m\u001b[0m\n\u001b[31m\n\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1mError creating IAM Role tes1s-explorer-role: EntityAlreadyExists: Role with name tes1s-explorer-role already exists.\n\tstatus code: 409, request id: a2574ddc-5f92-4216-bbe1-88ddec5476a6\u001b[0m\n\n\u001b[0m on security.tf line 114, in resource \"aws_iam_role\" \"role\":\n 114: resource \"aws_iam_role\" \"role\" \u001b[4m{\u001b[0m\n\u001b[0m\n\u001b[0m\u001b[0m\n\u001b[31m\n\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1mError creating IAM Role tes1s-deployer-role: EntityAlreadyExists: Role with name tes1s-deployer-role already exists.\n\tstatus code: 409, request id: 614e7b16-589c-46be-8501-4d40c84416f9\u001b[0m\n\n\u001b[0m on security.tf line 136, in resource \"aws_iam_role\" \"deployer\":\n 136: resource \"aws_iam_role\" \"deployer\" \u001b[4m{\u001b[0m\n\u001b[0m\n\u001b[0m\u001b[0m\n\u001b[31m\n\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1mError creating DB Subnet Group: DBSubnetGroupAlreadyExists: The DB subnet group 'tes1s-database' already exists.\n\tstatus code: 400, request id: 6eebeb2c-df01-4460-aee1-5a9cc99dde19\u001b[0m\n\n\u001b[0m on subnets.tf line 46, in resource \"aws_db_subnet_group\" \"database\":\n 46: resource \"aws_db_subnet_group\" \"database\" \u001b[4m{\u001b[0m\n\u001b[0m\n\u001b[0m\u001b[0m", "stderr_lines": ["\u001b[31m", "\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1mApplicationAlreadyExistsException: tes1s-explorer already exists.\u001b[0m", "", "\u001b[0m on deploy.tf line 11, in resource \"aws_codedeploy_app\" \"explorer\":", " 11: resource \"aws_codedeploy_app\" \"explorer\" \u001b[4m{\u001b[0m", "\u001b[0m", "\u001b[0m\u001b[0m", "\u001b[31m", "\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1mInvalidPlacementGroup.Duplicate: The placement group 'tes1s-test-explorer-pg' already exists.", "\tstatus code: 400, request id: b7bbbbdc-9c0f-4e66-a8c6-e83476a529e0\u001b[0m", "", "\u001b[0m on hosts.tf line 38, in resource \"aws_placement_group\" \"explorer\":", " 38: resource \"aws_placement_group\" \"explorer\" \u001b[4m{\u001b[0m", "\u001b[0m", "\u001b[0m\u001b[0m", "\u001b[31m", "\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1merror creating SSM parameter: ParameterAlreadyExists: The parameter already exists. To overwrite this value, set the overwrite option in the request to true.\u001b[0m", "", "\u001b[0m on rds.tf line 15, in resource \"aws_ssm_parameter\" \"db_name\":", " 15: resource \"aws_ssm_parameter\" \"db_name\" \u001b[4m{\u001b[0m", "\u001b[0m", "\u001b[0m\u001b[0m", "\u001b[31m", "\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1merror creating SSM parameter: ParameterAlreadyExists: The parameter already exists. To overwrite this value, set the overwrite option in the request to true.\u001b[0m", "", "\u001b[0m on rds.tf line 22, in resource \"aws_ssm_parameter\" \"db_username\":", " 22: resource \"aws_ssm_parameter\" \"db_username\" \u001b[4m{\u001b[0m", "\u001b[0m", "\u001b[0m\u001b[0m", "\u001b[31m", "\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1merror creating SSM parameter: ParameterAlreadyExists: The parameter already exists. To overwrite this value, set the overwrite option in the request to true.\u001b[0m", "", "\u001b[0m on rds.tf line 29, in resource \"aws_ssm_parameter\" \"db_password\":", " 29: resource \"aws_ssm_parameter\" \"db_password\" \u001b[4m{\u001b[0m", "\u001b[0m", "\u001b[0m\u001b[0m", "\u001b[31m", "\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1mError creating application Load Balancer: DuplicateLoadBalancerName: A load balancer with the same name 'tes1s-explorer-test-alb' exists, but with different settings", "\tstatus code: 400, request id: edeee732-0ddf-464d-9825-6f7a27943f83\u001b[0m", "", "\u001b[0m on routing.tf line 19, in resource \"aws_lb\" \"explorer\":", " 19: resource \"aws_lb\" \"explorer\" \u001b[4m{\u001b[0m", "\u001b[0m", "\u001b[0m\u001b[0m", "\u001b[31m", "\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1mError creating LB Target Group: DuplicateTargetGroupName: A target group with the same name 'tes1s-explorer-test-alb-target' exists, but with different settings", "\tstatus code: 400, request id: a137c35b-7906-4940-b0d7-27e40481583f\u001b[0m", "", "\u001b[0m on routing.tf line 36, in resource \"aws_lb_target_group\" \"explorer\":", " 36: resource \"aws_lb_target_group\" \"explorer\" \u001b[4m{\u001b[0m", "\u001b[0m", "\u001b[0m\u001b[0m", "\u001b[31m", "\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1mError creating IAM Role tes1s-explorer-role: EntityAlreadyExists: Role with name tes1s-explorer-role already exists.", "\tstatus code: 409, request id: a2574ddc-5f92-4216-bbe1-88ddec5476a6\u001b[0m", "", "\u001b[0m on security.tf line 114, in resource \"aws_iam_role\" \"role\":", " 114: resource \"aws_iam_role\" \"role\" \u001b[4m{\u001b[0m", "\u001b[0m", "\u001b[0m\u001b[0m", "\u001b[31m", "\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1mError creating IAM Role tes1s-deployer-role: EntityAlreadyExists: Role with name tes1s-deployer-role already exists.", "\tstatus code: 409, request id: 614e7b16-589c-46be-8501-4d40c84416f9\u001b[0m", "", "\u001b[0m on security.tf line 136, in resource \"aws_iam_role\" \"deployer\":", " 136: resource \"aws_iam_role\" \"deployer\" \u001b[4m{\u001b[0m", "\u001b[0m", "\u001b[0m\u001b[0m", "\u001b[31m", "\u001b[1m\u001b[31mError: \u001b[0m\u001b[0m\u001b[1mError creating DB Subnet Group: DBSubnetGroupAlreadyExists: The DB subnet group 'tes1s-database' already exists.", "\tstatus code: 400, request id: 6eebeb2c-df01-4460-aee1-5a9cc99dde19\u001b[0m", "", "\u001b[0m on subnets.tf line 46, in resource \"aws_db_subnet_group\" \"database\":", " 46: resource \"aws_db_subnet_group\" \"database\" \u001b[4m{\u001b[0m", "\u001b[0m", "\u001b[0m\u001b[0m"], "stdout": "Acquiring state lock. This may take a few moments...\n\u001b[0m\u001b[1maws_ssm_parameter.db_password[0]: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_iam_role.deployer: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_codedeploy_app.explorer: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_vpc_dhcp_options.poa_dhcp: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_placement_group.explorer[0]: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_ssm_parameter.db_username[0]: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_vpc.vpc: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_ssm_parameter.db_name[0]: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_iam_role.role: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_s3_bucket.explorer_releases: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_vpc_dhcp_options.poa_dhcp: Creation complete after 3s [id=dopt-0162fc1caa4cfc8a6]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_vpc.vpc: Creation complete after 9s [id=vpc-07a9fb27f617211ff]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_vpc_dhcp_options_association.poa_dhcp: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_route53_zone.main: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_subnet.database[3]: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_subnet.database[4]: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_subnet.database[1]: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_lb_target_group.explorer[0]: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_subnet.database[5]: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_subnet.database[0]: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_security_group.app: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_s3_bucket.explorer_releases: Creation complete after 10s [id=tes1s-explorer-codedeploy-releases]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_subnet.alb: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_vpc_dhcp_options_association.poa_dhcp: Creation complete after 1s [id=dopt-0162fc1caa4cfc8a6-vpc-07a9fb27f617211ff]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_subnet.default: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_internet_gateway.default: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_subnet.database[4]: Creation complete after 3s [id=subnet-01c6b8f2b4aa6a14e]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_security_group.database: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_subnet.database[0]: Creation complete after 3s [id=subnet-08f0f554f3a25b08c]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_subnet.database[5]: Creation complete after 3s [id=subnet-05af31f18d4528b04]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_subnet.database[2]: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_subnet.database[1]: Creation complete after 3s [id=subnet-0efed33debce18e10]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_security_group.alb: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1mdata.aws_iam_policy_document.codedeploy-policy: Refreshing state...\u001b[0m\n\u001b[0m\u001b[1maws_subnet.database[3]: Creation complete after 3s [id=subnet-07c7ca4e9f54f9962]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_subnet.alb: Creation complete after 3s [id=subnet-0772b622bcd21bfbf]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_subnet.default: Creation complete after 3s [id=subnet-020f3ed49c8c022e2]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_internet_gateway.default: Creation complete after 4s [id=igw-010f42422cccd7492]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_route.internet_access: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_subnet.database[2]: Creation complete after 3s [id=subnet-0a17083534493c957]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_db_subnet_group.database: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_route.internet_access: Creation complete after 1s [id=r-rtb-0dc024f01e61f18af1080289494]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_security_group.app: Creation complete after 6s [id=sg-030db13e18bd7cff0]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_security_group.database: Creation complete after 6s [id=sg-0ac5be06d78c4bddd]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_security_group.alb: Creation complete after 7s [id=sg-0f4e29a0a8220baed]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_lb.explorer[0]: Creating...\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_route53_zone.main: Still creating... [10s elapsed]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_route53_zone.main: Still creating... [20s elapsed]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_route53_zone.main: Still creating... [30s elapsed]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_route53_zone.main: Still creating... [40s elapsed]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_route53_zone.main: Still creating... [50s elapsed]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_route53_zone.main: Still creating... [1m0s elapsed]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_route53_zone.main: Still creating... [1m10s elapsed]\u001b[0m\u001b[0m\n\u001b[0m\u001b[1maws_route53_zone.main: Creation complete after 1m15s [id=Z1046383394CYC5XV9PGL]\u001b[0m\u001b[0m\nReleasing state lock. This may take a few moments...", "stdout_lines": ["Acquiring state lock. This may take a few moments...", "\u001b[0m\u001b[1maws_ssm_parameter.db_password[0]: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_iam_role.deployer: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_codedeploy_app.explorer: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_vpc_dhcp_options.poa_dhcp: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_placement_group.explorer[0]: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_ssm_parameter.db_username[0]: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_vpc.vpc: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_ssm_parameter.db_name[0]: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_iam_role.role: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_s3_bucket.explorer_releases: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_vpc_dhcp_options.poa_dhcp: Creation complete after 3s [id=dopt-0162fc1caa4cfc8a6]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_vpc.vpc: Creation complete after 9s [id=vpc-07a9fb27f617211ff]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_vpc_dhcp_options_association.poa_dhcp: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_route53_zone.main: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_subnet.database[3]: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_subnet.database[4]: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_subnet.database[1]: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_lb_target_group.explorer[0]: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_subnet.database[5]: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_subnet.database[0]: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_security_group.app: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_s3_bucket.explorer_releases: Creation complete after 10s [id=tes1s-explorer-codedeploy-releases]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_subnet.alb: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_vpc_dhcp_options_association.poa_dhcp: Creation complete after 1s [id=dopt-0162fc1caa4cfc8a6-vpc-07a9fb27f617211ff]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_subnet.default: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_internet_gateway.default: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_subnet.database[4]: Creation complete after 3s [id=subnet-01c6b8f2b4aa6a14e]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_security_group.database: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_subnet.database[0]: Creation complete after 3s [id=subnet-08f0f554f3a25b08c]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_subnet.database[5]: Creation complete after 3s [id=subnet-05af31f18d4528b04]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_subnet.database[2]: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_subnet.database[1]: Creation complete after 3s [id=subnet-0efed33debce18e10]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_security_group.alb: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1mdata.aws_iam_policy_document.codedeploy-policy: Refreshing state...\u001b[0m", "\u001b[0m\u001b[1maws_subnet.database[3]: Creation complete after 3s [id=subnet-07c7ca4e9f54f9962]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_subnet.alb: Creation complete after 3s [id=subnet-0772b622bcd21bfbf]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_subnet.default: Creation complete after 3s [id=subnet-020f3ed49c8c022e2]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_internet_gateway.default: Creation complete after 4s [id=igw-010f42422cccd7492]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_route.internet_access: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_subnet.database[2]: Creation complete after 3s [id=subnet-0a17083534493c957]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_db_subnet_group.database: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_route.internet_access: Creation complete after 1s [id=r-rtb-0dc024f01e61f18af1080289494]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_security_group.app: Creation complete after 6s [id=sg-030db13e18bd7cff0]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_security_group.database: Creation complete after 6s [id=sg-0ac5be06d78c4bddd]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_security_group.alb: Creation complete after 7s [id=sg-0f4e29a0a8220baed]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_lb.explorer[0]: Creating...\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_route53_zone.main: Still creating... [10s elapsed]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_route53_zone.main: Still creating... [20s elapsed]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_route53_zone.main: Still creating... [30s elapsed]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_route53_zone.main: Still creating... [40s elapsed]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_route53_zone.main: Still creating... [50s elapsed]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_route53_zone.main: Still creating... [1m0s elapsed]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_route53_zone.main: Still creating... [1m10s elapsed]\u001b[0m\u001b[0m", "\u001b[0m\u001b[1maws_route53_zone.main: Creation complete after 1m15s [id=Z1046383394CYC5XV9PGL]\u001b[0m\u001b[0m", "Releasing state lock. This may take a few moments..."]}
included: /Users/viktor/Documents/POANetwork/blockscout-terraform/roles/s3_config/tasks/config.yml for test
included: /Users/viktor/Documents/POANetwork/blockscout-terraform/roles/s3_config/tasks/config.yml for test
included: /Users/viktor/Documents/POANetwork/blockscout-terraform/roles/s3_config/tasks/config.yml for test
included: /Users/viktor/Documents/POANetwork/blockscout-terraform/roles/s3_config/tasks/config.yml for test
included: /Users/viktor/Documents/POANetwork/blockscout-terraform/roles/s3_config/tasks/config.yml for test
TASK [s3_config : Check if config file exists] *********************************************
ok: [test]
TASK [s3_config : Check if config file exists] *********************************************
ok: [test]
TASK [s3_config : Check if config file exists] *********************************************
ok: [test]
TASK [s3_config : Copy temporary file to be uploaded] **************************************
changed: [test]
TASK [s3_config : Remove insecure AWS variables] *******************************************
changed: [test]
TASK [s3_config : Upload config to S3 bucket] **********************************************
changed: [test]
TASK [s3_config : Remove temp file] ********************************************************
changed: [test]
TASK [s3_config : Check if config file exists] *********************************************
ok: [test]
TASK [s3_config : Copy temporary file to be uploaded] **************************************
changed: [test]
TASK [s3_config : Remove insecure AWS variables] *******************************************
ok: [test]
TASK [s3_config : Upload config to S3 bucket] **********************************************
changed: [test]
TASK [s3_config : Remove temp file] ********************************************************
changed: [test]
TASK [s3_config : Check if config file exists] *********************************************
ok: [test]
TASK [s3_debug : Check log file exists] ****************************************************
ok: [test]
TASK [s3_debug : Upload logs to s3] ********************************************************
changed: [test]
PLAY RECAP *********************************************************************************
test : ok=39 changed=19 unreachable=0 failed=1 skipped=17 rescued=0 ignored=0
MacBook-Pro-Viktor-2:blockscout-terraform viktor$
Metadata
Metadata
Assignees
Labels
bugSomething isn't workingSomething isn't working