Skip to content

Instantly share code, notes, and snippets.

@fholzer
Created August 5, 2025 10:08
Show Gist options
  • Select an option

  • Save fholzer/f49296bce9f1afbb1234a9e24ad18fed to your computer and use it in GitHub Desktop.

Select an option

Save fholzer/f49296bce9f1afbb1234a9e24ad18fed to your computer and use it in GitHub Desktop.
cf-dns-soa-issue-minimal-poc
11:57:12.098 INFO terraform: TF_LOG: Terraform version: 1.12.2
11:57:12.098 INFO terraform: TF_LOG: Go runtime version: go1.24.2
11:57:12.098 INFO terraform: TF_LOG: CLI args: []string{"../../../../../../../../.tfenv/versions/1.12.2/terraform", "plan", "-out", "tfplan"}
11:57:12.098 INFO terraform: TF_LOG: CLI command args: []string{"plan", "-out", "tfplan"}
11:57:12.099 INFO terraform: TF_LOG: backend-s3.aws-base: Retrieved credentials: tf_backend.operation=Configure tf_backend.req_id=2ca282df-d337-fd99-b476-53b0b755e047 tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate tf_aws.credentials_source=EnvConfigCredentials
11:57:12.100 STDERR terraform: http.request.body=
11:57:12.100 STDERR terraform: | Action=GetCallerIdentity&Version=2011-06-15
11:57:12.100 STDERR terraform: http.user_agent="APN/1.0 HashiCorp/1.0 Terraform/1.12.2 (+https://www.terraform.io) aws-sdk-go-v2/1.36.0 ua/2.1 os/linux lang/go#1.24.2 md/GOOS#linux md/GOARCH#amd64 api/sts#1.33.12" http.request_content_length=43 http.request.header.content_type=application/x-www-form-urlencoded http.request.header.amz_sdk_invocation_id=03865012-a2e6-49d4-b955-c93ec3779a7a http.request.header.amz_sdk_request="attempt=1; max=5"
11:57:12.365 STDERR terraform: http.response.body=
11:57:12.365 STDERR terraform: | <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/">
11:57:12.365 STDERR terraform: | <GetCallerIdentityResult>
11:57:12.365 STDERR terraform: | <Arn>arn:aws:sts::1234567890:assumed-role/aws-role-name/[email protected]</Arn>
11:57:12.365 STDERR terraform: | <UserId>AROA*************EPNX:[email protected]</UserId>
11:57:12.365 STDERR terraform: | <Account>1234567890</Account>
11:57:12.365 STDERR terraform: | </GetCallerIdentityResult>
11:57:12.365 STDERR terraform: | <ResponseMetadata>
11:57:12.365 STDERR terraform: | <RequestId>89cc5c45-36a5-44b3-b9ba-fbb9e15f68d5</RequestId>
11:57:12.366 STDERR terraform: | </ResponseMetadata>
11:57:12.366 STDERR terraform: | </GetCallerIdentityResponse>
11:57:12.366 STDERR terraform:
11:57:12.365 INFO terraform: TF_LOG: backend-s3.aws-base: Retrieved caller identity from STS: tf_backend.operation=Configure tf_backend.req_id=2ca282df-d337-fd99-b476-53b0b755e047 tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate
11:57:12.366 STDERR terraform: http.request.body=
11:57:12.366 STDERR terraform: | Action=GetCallerIdentity&Version=2011-06-15
11:57:12.366 STDERR terraform: http.user_agent="APN/1.0 HashiCorp/1.0 Terraform/1.12.2 (+https://www.terraform.io) aws-sdk-go-v2/1.36.0 ua/2.1 os/linux lang/go#1.24.2 md/GOOS#linux md/GOARCH#amd64 api/sts#1.33.12" http.request_content_length=43 http.request.header.x_amz_security_token="*****"
11:57:12.420 STDERR terraform: http.response.body=
11:57:12.420 STDERR terraform: | <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/">
11:57:12.420 STDERR terraform: | <GetCallerIdentityResult>
11:57:12.420 STDERR terraform: | <Arn>arn:aws:sts::1234567890:assumed-role/aws-role-name/[email protected]</Arn>
11:57:12.420 STDERR terraform: | <UserId>AROA*************EPNX:[email protected]</UserId>
11:57:12.420 STDERR terraform: | <Account>1234567890</Account>
11:57:12.420 STDERR terraform: | </GetCallerIdentityResult>
11:57:12.420 STDERR terraform: | <ResponseMetadata>
11:57:12.420 STDERR terraform: | <RequestId>90edfdc6-0e5d-4986-bc31-141d788c32d1</RequestId>
11:57:12.420 STDERR terraform: | </ResponseMetadata>
11:57:12.421 STDERR terraform: | </GetCallerIdentityResponse>
11:57:12.421 STDERR terraform: http.duration=53 http.status_code=200 http.response_content_length=520 http.response.header.date="Tue, 05 Aug 2025 09:57:12 GMT" http.response.header.x_amzn_requestid=90edfdc6-0e5d-4986-bc31-141d788c32d1 http.response.header.content_type=text/xml
11:57:12.420 INFO terraform: TF_LOG: backend-s3.aws-base: Retrieved caller identity from STS: tf_backend.operation=Configure tf_backend.req_id=2ca282df-d337-fd99-b476-53b0b755e047 tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate
11:57:14.414 INFO terraform: TF_LOG: backend/local: starting Plan operation
11:57:14.620 STDERR terraform: http.response.body=
11:57:14.620 STDERR terraform: | <?xml version="1.0" encoding="UTF-8"?>
11:57:14.620 STDERR terraform: | <ListBucketResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/">REDACTED</ListBucketResult>
11:57:14.630 STDERR terraform: | [truncated...]
11:57:14.630 STDERR terraform: http.response.header.server=AmazonS3 http.response.header.x_amz_request_id=2W9K59V0QCCKPDED http.response.header.date="Tue, 05 Aug 2025 09:57:15 GMT" http.response.header.x_amz_bucket_region=eu-west-1 http.response.header.content_type=application/xml http.duration=204 http.status_code=200
11:57:14.621 INFO terraform: TF_LOG: backend-s3: Attempting to lock remote state (DynamoDB only)...: tf_backend.lock.id=082f0e40-8e77-e356-45e9-dd613e72bb0f tf_backend.lock.info="" tf_backend.lock.operation=OperationTypePlan tf_backend.lock.path=tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate tf_backend.lock.version=1.12.2 tf_backend.lock.who=myuser@mymachine tf_backend.operation=Lock tf_backend.req_id=0769f826-ef25-821e-7719-82cf4e9d810a tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate
11:57:14.630 STDERR terraform: http.request.body=
11:57:14.630 STDERR terraform: | {"ConditionExpression":"attribute_not_exists(LockID)","Item":{"LockID":{"S":"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate"},"Info":{"S":"{\"ID\":\"082f0e40-8e77-e356-45e9-dd613e72bb0f\",\"Operation\":\"OperationTypePlan\",\"Info\":\"\",\"Who\":\"myuser@mymachine\",\"Version\":\"1.12.2\",\"Created\":\"2025-08-05T09:57:14.62124728Z\",\"Path\":\"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate\"}"}},"TableName":"tfstate-1234567890"}
11:57:14.631 STDERR terraform: http.url=https://dynamodb.eu-west-1.amazonaws.com/ http.user_agent="APN/1.0 HashiCorp/1.0 Terraform/1.12.2 (+https://www.terraform.io) aws-sdk-go-v2/1.36.0 ua/2.1 os/linux lang/go#1.24.2 md/GOOS#linux md/GOARCH#amd64 api/dynamodb#1.39.8" http.request.header.authorization="AWS4-HMAC-SHA256 Credential=ASIA************4C7T/20250805/eu-west-1/dynamodb/aws4_request, SignedHeaders=accept-encoding;amz-sdk-invocation-id;amz-sdk-request;content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=*****" http.request.header.x_amz_security_token="*****" http.request.header.content_type=application/x-amz-json-1.0 http.request.header.x_amz_target=DynamoDB_20120810.PutItem http.request.header.amz_sdk_invocation_id=922663d0-4c3b-4345-91d6-8cb459e55e3c http.request.header.accept_encoding=identity http.method=POST net.peer.name=dynamodb.eu-west-1.amazonaws.com http.request_content_length=535 http.request.header.x_amz_date=20250805T095714Z http.request.header.amz_sdk_request="attempt=1; max=5"
11:57:14.818 STDERR terraform: http.response.body=
11:57:14.818 STDERR terraform: | {}
11:57:14.818 STDERR terraform: http.duration=196
11:57:14.818 INFO terraform: TF_LOG: backend-s3: Locked remote state (DynamoDB only): tf_backend.lock.id=082f0e40-8e77-e356-45e9-dd613e72bb0f tf_backend.lock.info="" tf_backend.lock.operation=OperationTypePlan tf_backend.lock.path=tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate tf_backend.lock.version=1.12.2 tf_backend.lock.who=myuser@mymachine tf_backend.operation=Lock tf_backend.req_id=0769f826-ef25-821e-7719-82cf4e9d810a tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate
11:57:14.818 INFO terraform: TF_LOG: backend-s3: Downloading remote state: tf_backend.operation=Get tf_backend.req_id=8b85fc1a-6118-a31d-c467-eff81b7dab86 tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate
11:57:14.934 STDERR terraform: http.request.body=
11:57:14.934 STDERR terraform: | {"ConsistentRead":true,"Key":{"LockID":{"S":"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate-md5"}},"ProjectionExpression":"LockID, Digest","TableName":"tfstate-1234567890"}
11:57:14.934 STDERR terraform: http.method=POST http.url=https://dynamodb.eu-west-1.amazonaws.com/ http.request.header.content_type=application/x-amz-json-1.0 http.request.header.x_amz_target=DynamoDB_20120810.GetItem http.request.header.amz_sdk_request="attempt=1; max=5" http.request.header.accept_encoding=identity net.peer.name=dynamodb.eu-west-1.amazonaws.com http.user_agent="APN/1.0 HashiCorp/1.0 Terraform/1.12.2 (+https://www.terraform.io) aws-sdk-go-v2/1.36.0 ua/2.1 os/linux lang/go#1.24.2 md/GOOS#linux md/GOARCH#amd64 api/dynamodb#1.39.8"
11:57:14.978 STDERR terraform: http.response.body=
11:57:14.978 STDERR terraform: | {"Item":{"Digest":{"S":"f9f77a7534dc59ab9fd95d4a4895670e"},"LockID":{"S":"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate-md5"}}}
11:57:14.978 STDERR terraform: http.duration=43 http.response_content_length=174 http.response.header.connection=keep-alive http.response.header.x_amzn_requestid=6VC3V6D1FARM6L10FP5BRDJVI3VV4KQNSO5AEMVJF66Q9ASUAAJG http.response.header.x_amz_crc32=2773592823
11:57:14.979 INFO terraform: TF_LOG: provider: configuring client automatic mTLS
11:57:14.997 INFO terraform: TF_LOG: provider.terraform-provider-cloudflare_v5.8.2: configuring server automatic mTLS: timestamp="2025-08-05T11:57:14.997+0200"
11:57:15.114 INFO terraform: TF_LOG: provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.8.2/linux_amd64/terraform-provider-cloudflare_v5.8.2 id=76835
11:57:15.114 INFO terraform: TF_LOG: provider: configuring client automatic mTLS
11:57:15.245 INFO terraform: TF_LOG: provider.terraform-provider-aws_v5.100.0_x5: configuring server automatic mTLS: timestamp="2025-08-05T11:57:15.245+0200"
11:57:15.999 INFO terraform: TF_LOG: provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/aws/5.100.0/linux_amd64/terraform-provider-aws_v5.100.0_x5 id=76852
11:57:16.000 INFO terraform: TF_LOG: provider: configuring client automatic mTLS
11:57:16.013 INFO terraform: TF_LOG: provider.terraform-provider-cloudflare_v5.8.2: configuring server automatic mTLS: timestamp="2025-08-05T11:57:16.013+0200"
11:57:16.038 INFO terraform: TF_LOG: provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.8.2/linux_amd64/terraform-provider-cloudflare_v5.8.2 id=76874
11:57:16.038 INFO terraform: TF_LOG: backend/local: plan calling Plan
11:57:16.040 INFO terraform: TF_LOG: provider: configuring client automatic mTLS
11:57:16.053 INFO terraform: TF_LOG: provider.terraform-provider-cloudflare_v5.8.2: configuring server automatic mTLS: timestamp="2025-08-05T11:57:16.053+0200"
11:57:16.078 STDOUT terraform: module.non_prod_zone["ourzone.example.com"].cloudflare_zone.cf_zone: Refreshing state... [id=our-zone-id]
11:57:16.081 STDERR terraform: 2025-08-05T11:57:16.081+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.8.2:
11:57:16.082 STDERR terraform: GET /client/v4/zones/our-zone-id HTTP/1.1
11:57:16.082 STDERR terraform: > user-agent: terraform-provider-cloudflare/5.8.2 terraform-plugin-framework/1.15.0 terraform/1.12.2
11:57:16.082 STDERR terraform: > x-stainless-runtime: terraform-plugin-framework
11:57:16.082 STDERR terraform: > x-stainless-arch: x64
11:57:16.082 STDERR terraform: > authorization: [redacted]
11:57:16.082 STDERR terraform: > accept: application/json
11:57:16.082 STDERR terraform: > x-stainless-retry-count: 0
11:57:16.082 STDERR terraform: > x-stainless-lang: Terraform
11:57:16.082 STDERR terraform: > x-stainless-runtime-version: 1.15.0
11:57:16.082 STDERR terraform: > x-stainless-os: Linux
11:57:16.082 STDERR terraform: > x-stainless-package-version: 5.8.2: @caller=github.com/cloudflare/terraform-provider-cloudflare/internal/logging/logging.go:64 tf_req_id=2ed1ee53-c912-d8cb-c038-e82b3b2ff86c tf_rpc=ReadResource @module=cloudflare tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_resource_type=cloudflare_zone timestamp="2025-08-05T11:57:16.081+0200"
11:57:16.844 STDERR terraform: 2025-08-05T11:57:16.844+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.8.2:
11:57:16.844 STDERR terraform: < HTTP/2.0 200 OK
11:57:16.844 STDERR terraform: < cf-cache-status: DYNAMIC
11:57:16.844 STDERR terraform: < cf-ray: 96a56de7ddbb5b8a-VIE
11:57:16.844 STDERR terraform: < cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
11:57:16.844 STDERR terraform: < vary: accept-encoding
11:57:16.844 STDERR terraform: < api-version: 2025-08-05
11:57:16.844 STDERR terraform: < cf-auditlog-id: 019879a9-ed01-7f52-a0ec-65620d31d381
11:57:16.844 STDERR terraform: < x-content-type-options: nosniff
11:57:16.845 STDERR terraform: < date: Tue, 05 Aug 2025 09:57:16 GMT
11:57:16.845 STDERR terraform: < content-type: application/json
11:57:16.845 STDERR terraform: < server: cloudflare
11:57:16.845 STDERR terraform: < pragma: no-cache
11:57:16.845 STDERR terraform: < x-frame-options: SAMEORIGIN
11:57:16.845 STDERR terraform: < expires: Sun, 25 Jan 1981 05:00:00 GMT
11:57:16.845 STDERR terraform: < set-cookie: __cflb=0H28vgHxwvgAQtjUGU4yFBDJQfw1pfzuEAaPmd4m74q; SameSite=Lax; path=/; expires=Tue, 05-Aug-25 12:27:17 GMT; HttpOnly
11:57:16.845 STDERR terraform: < set-cookie: __cf_bm=CFgjicHe3rkSvM4OTu5E73_FN_0BnrLyFy.ri9UTzqg-1754387836-1.0.1.1-29DiqYCeM3Lh8bMUg6fIqmyRBt2Em5R8FZUbJFwnFc.DuZ7Je9WkC0_aefqtM57U_TZaE9.Cp7cXGJx2214pBaEujwTBv4vXVk_fdnghC6Q; path=/; expires=Tue, 05-Aug-25 10:27:16 GMT; domain=.api.cloudflare.com; HttpOnly; Secure; SameSite=None
11:57:16.845 STDERR terraform: < set-cookie: _cfuvid=ubL1GKJqOv6TkUpVOjhzHIkPpmiRQh_MvSFPUFCFfp0-1754387836839-0.0.1.1-604800000; path=/; domain=.api.cloudflare.com; HttpOnly; Secure; SameSite=None
11:57:16.845 STDERR terraform: < strict-transport-security: max-age=31536000
11:57:16.845 STDERR terraform: <
11:57:16.845 STDERR terraform: {"result":{"id":"our-zone-id","name":"ourzone.example.com","status":"active","paused":false,"type":"full","development_mode":0,"name_servers":["liv.ns.cloudflare.com","max.ns.cloudflare.com"],"original_name_servers":["dns6.itsfogo.com","dns3.itsfogo.com","dns2.itsbogo.com","dns5.itsfogo.com","dns1.itsbogo.com","dns4.itsfogo.com","dns2.itsfogo.com","dns1.itsfogo.com"],"original_registrar":"nom iq ltd com laude (id: )","original_dnshost":null,"modified_on":"2025-08-05T09:44:20.978536Z","created_on":"2025-07-06T13:42:05.098482Z","activated_on":"2025-07-07T13:36:01.727377Z","vanity_name_servers":[],"vanity_name_servers_ips":null,"meta":{"step":4,"custom_certificate_quota":1,"page_rule_quota":100,"phishing_detected":false},"owner":{"id":"our-account-id","type":"organization","name":"our-account-name"},"account":{"id":"our-account-id","name":"our-account-name"},"tenant":{"id":null,"name":null},"tenant_unit":{"id":null},"permissions":["#waf:read","#waf:edit","#access:edit","#access:read","#zone:read","#zone_settings:read","#zone_settings:edit","#dns_records:read","#dns_records:edit","#page_shield:read","#ssl:read","#page_shield:edit","#zone:edit","#ssl:edit","#logs:edit","#logs:read"],"plan":{"id":"94f3b7b768b0458b56d2cac4fe5ec0f9","name":"Enterprise Website","price":0,"currency":"USD","frequency":"","is_subscribed":true,"can_subscribe":true,"legacy_id":"enterprise","legacy_discount":false,"externally_managed":true}},"success":true,"errors":[],"messages":[]}
11:57:16.846 STDERR terraform: : @module=cloudflare tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_resource_type=cloudflare_zone @caller=github.com/cloudflare/terraform-provider-cloudflare/internal/logging/logging.go:92 tf_req_id=2ed1ee53-c912-d8cb-c038-e82b3b2ff86c tf_rpc=ReadResource timestamp="2025-08-05T11:57:16.844+0200"
11:57:16.858 STDOUT terraform: module.non_prod_zone["ourzone.example.com"].cloudflare_zone_dns_settings.cf_dns_settings: Refreshing state...
11:57:16.860 STDERR terraform: 2025-08-05T11:57:16.860+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.8.2:
11:57:16.860 STDERR terraform: GET /client/v4/zones/our-zone-id/dns_settings HTTP/1.1
11:57:16.860 STDERR terraform: > x-stainless-arch: x64
11:57:16.860 STDERR terraform: > authorization: [redacted]
11:57:16.860 STDERR terraform: > x-stainless-retry-count: 0
11:57:16.860 STDERR terraform: > user-agent: terraform-provider-cloudflare/5.8.2 terraform-plugin-framework/1.15.0 terraform/1.12.2
11:57:16.860 STDERR terraform: > x-stainless-os: Linux
11:57:16.860 STDERR terraform: > x-stainless-lang: Terraform
11:57:16.860 STDERR terraform: > x-stainless-runtime: terraform-plugin-framework
11:57:16.860 STDERR terraform: > x-stainless-runtime-version: 1.15.0
11:57:16.861 STDERR terraform: > accept: application/json
11:57:16.861 STDERR terraform: > x-stainless-package-version: 5.8.2: tf_req_id=f1009e49-c084-b8c5-2504-0a977a9e8a60 tf_rpc=ReadResource tf_resource_type=cloudflare_zone_dns_settings @caller=github.com/cloudflare/terraform-provider-cloudflare/internal/logging/logging.go:64 @module=cloudflare tf_provider_addr=registry.terraform.io/cloudflare/cloudflare timestamp="2025-08-05T11:57:16.860+0200"
11:57:17.585 STDERR terraform: 2025-08-05T11:57:17.585+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.8.2:
11:57:17.585 STDERR terraform: < HTTP/2.0 200 OK
11:57:17.585 STDERR terraform: < date: Tue, 05 Aug 2025 09:57:17 GMT
11:57:17.585 STDERR terraform: < cf-ray: 96a56dec69005b8a-VIE
11:57:17.585 STDERR terraform: < vary: Accept-Encoding
11:57:17.585 STDERR terraform: < set-cookie: __cflb=0H28vgHxwvgAQtjUGU4yFBDJQfw1pfzuEAaPmd4m74q; SameSite=Lax; path=/; expires=Tue, 05-Aug-25 12:27:18 GMT; HttpOnly
11:57:17.586 STDERR terraform: < set-cookie: __cf_bm=WhHfWSZ7iO0fVOB1EinljaH6eAOVeiJewt9lSD7XJiM-1754387837-1.0.1.1-gTt2TsjBwd_pwMNmcOjZIKK2pOy.JMEup2qz5IAnISrZ7oLY9g.8tAmwUahqV5SzIr7Z6szSg.O1Mug6fVBJeGu61LpEmFLcio5BewedKnY; path=/; expires=Tue, 05-Aug-25 10:27:17 GMT; domain=.api.cloudflare.com; HttpOnly; Secure; SameSite=None
11:57:17.586 STDERR terraform: < set-cookie: _cfuvid=Db7LTLAIH46quNDSbjpYM7kUQm.c4nKnJ7Amdx3wJrQ-1754387837581-0.0.1.1-604800000; path=/; domain=.api.cloudflare.com; HttpOnly; Secure; SameSite=None
11:57:17.586 STDERR terraform: < api-version: 2025-08-05
11:57:17.586 STDERR terraform: < cf-auditlog-id: 019879a9-efd2-77eb-8484-328c4115aa4b
11:57:17.586 STDERR terraform: < server: cloudflare
11:57:17.586 STDERR terraform: < content-type: application/json
11:57:17.586 STDERR terraform: < cf-cache-status: DYNAMIC
11:57:17.586 STDERR terraform: <
11:57:17.586 STDERR terraform: {"result":{"nameservers":{"type":"cloudflare.standard"},"foundation_dns":false,"multi_provider":false,"secondary_overrides":false,"soa":{"mname":null,"rname":"dns.cloudflare.com","refresh":10000,"retry":2400,"expire":604800,"min_ttl":60,"ttl":3600},"ns_ttl":86400,"zone_mode":"standard","internal_dns":{"reference_zone_id":null},"flatten_all_cnames":false},"success":true,"errors":[],"messages":[]}
11:57:17.586 STDERR terraform: : @module=cloudflare tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=f1009e49-c084-b8c5-2504-0a977a9e8a60 tf_rpc=ReadResource @caller=github.com/cloudflare/terraform-provider-cloudflare/internal/logging/logging.go:92 tf_resource_type=cloudflare_zone_dns_settings timestamp="2025-08-05T11:57:17.585+0200"
11:57:17.592 INFO terraform: TF_LOG: provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.8.2/linux_amd64/terraform-provider-cloudflare_v5.8.2 id=76885
11:57:17.595 INFO terraform: TF_LOG: backend/local: plan operation completed
11:57:17.595 INFO terraform: TF_LOG: backend/local: writing plan output to: tfplan
11:57:17.682 STDOUT terraform: Terraform used the selected providers to generate the following execution
11:57:17.682 STDOUT terraform: plan. Resource actions are indicated with the following symbols:
11:57:17.682 STDOUT terraform: ~ update in-place
11:57:17.682 STDOUT terraform: Terraform will perform the following actions:
11:57:17.682 STDOUT terraform: # module.non_prod_zone["ourzone.example.com"].cloudflare_zone_dns_settings.cf_dns_settings will be updated in-place
11:57:17.682 STDOUT terraform: ~ resource "cloudflare_zone_dns_settings" "cf_dns_settings" {
11:57:17.682 STDOUT terraform: ~ soa = {
11:57:17.682 STDOUT terraform: + mname = ""
11:57:17.682 STDOUT terraform: # (6 unchanged attributes hidden)
11:57:17.682 STDOUT terraform: }
11:57:17.682 STDOUT terraform: # (9 unchanged attributes hidden)
11:57:17.682 STDOUT terraform: }
11:57:17.682 STDOUT terraform: Plan: 0 to add, 1 to change, 0 to destroy.
11:57:17.682 STDOUT terraform:
11:57:17.682 STDOUT terraform:
11:57:17.682 STDOUT terraform: ─────────────────────────────────────────────────────────────────────────────
11:57:17.682 STDOUT terraform: Saved the plan to: tfplan
11:57:17.682 STDOUT terraform: To perform exactly these actions, run the following command to apply:
11:57:17.682 STDOUT terraform: terraform apply "tfplan"
11:57:17.682 INFO terraform: TF_LOG: backend-s3: Attempting to unlock remote state (DynamoDB only)...: tf_backend.lock.id=082f0e40-8e77-e356-45e9-dd613e72bb0f tf_backend.operation=Unlock tf_backend.req_id=943ae7b6-3995-0f82-3994-280a82397da3 tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate
11:57:17.682 STDERR terraform: http.request.body=
11:57:17.682 STDERR terraform: | {"ConsistentRead":true,"Key":{"LockID":{"S":"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate"}},"ProjectionExpression":"LockID, Info","TableName":"tfstate-1234567890"}
11:57:17.683 STDERR terraform: net.peer.name=dynamodb.eu-west-1.amazonaws.com http.request_content_length=220 http.request.header.authorization="AWS4-HMAC-SHA256 Credential=ASIA************4C7T/20250805/eu-west-1/dynamodb/aws4_request, SignedHeaders=accept-encoding;amz-sdk-invocation-id;amz-sdk-request;content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=*****" http.request.header.x_amz_security_token="*****"
11:57:17.731 STDERR terraform: http.response.body=
11:57:17.731 STDERR terraform: | {"Item":{"LockID":{"S":"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate"},"Info":{"S":"{\"ID\":\"082f0e40-8e77-e356-45e9-dd613e72bb0f\",\"Operation\":\"OperationTypePlan\",\"Info\":\"\",\"Who\":\"myuser@mymachine\",\"Version\":\"1.12.2\",\"Created\":\"2025-08-05T09:57:14.62124728Z\",\"Path\":\"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate\"}"}}}
11:57:17.732 STDERR terraform: http.response.header.content_type=application/x-amz-json-1.0 http.response.header.connection=keep-alive
11:57:17.732 STDERR terraform: http.request.body=
11:57:17.732 STDERR terraform: | {"Key":{"LockID":{"S":"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate"}},"TableName":"tfstate-1234567890"}
11:57:17.732 STDERR terraform: http.request.header.amz_sdk_invocation_id=70715afe-3583-4843-8642-abe4c2bb8f3e http.request.header.amz_sdk_request="attempt=1; max=5" http.request.header.x_amz_date=20250805T095717Z http.request.header.x_amz_target=DynamoDB_20120810.DeleteItem http.request.header.accept_encoding=identity http.request.header.content_type=application/x-amz-json-1.0
11:57:17.776 STDERR terraform: http.response.body=
11:57:17.777 STDERR terraform: | {}
11:57:17.777 STDERR terraform: http.duration=44 http.status_code=200 http.response.header.x_amz_crc32=2745614147 http.response.header.server=Server http.response.header.date="Tue, 05 Aug 2025 09:57:17 GMT" http.response_content_length=2 http.response.header.content_type=application/x-amz-json-1.0
11:57:17.776 INFO terraform: TF_LOG: backend-s3: Unlocked remote state (DynamoDB only): tf_backend.lock.id=082f0e40-8e77-e356-45e9-dd613e72bb0f tf_backend.operation=Unlock tf_backend.req_id=943ae7b6-3995-0f82-3994-280a82397da3 tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment