Created
August 5, 2025 10:08
-
-
Save fholzer/f49296bce9f1afbb1234a9e24ad18fed to your computer and use it in GitHub Desktop.
cf-dns-soa-issue-minimal-poc
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 11:57:12.098 INFO terraform: TF_LOG: Terraform version: 1.12.2 | |
| 11:57:12.098 INFO terraform: TF_LOG: Go runtime version: go1.24.2 | |
| 11:57:12.098 INFO terraform: TF_LOG: CLI args: []string{"../../../../../../../../.tfenv/versions/1.12.2/terraform", "plan", "-out", "tfplan"} | |
| 11:57:12.098 INFO terraform: TF_LOG: CLI command args: []string{"plan", "-out", "tfplan"} | |
| 11:57:12.099 INFO terraform: TF_LOG: backend-s3.aws-base: Retrieved credentials: tf_backend.operation=Configure tf_backend.req_id=2ca282df-d337-fd99-b476-53b0b755e047 tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate tf_aws.credentials_source=EnvConfigCredentials | |
| 11:57:12.100 STDERR terraform: http.request.body= | |
| 11:57:12.100 STDERR terraform: | Action=GetCallerIdentity&Version=2011-06-15 | |
| 11:57:12.100 STDERR terraform: http.user_agent="APN/1.0 HashiCorp/1.0 Terraform/1.12.2 (+https://www.terraform.io) aws-sdk-go-v2/1.36.0 ua/2.1 os/linux lang/go#1.24.2 md/GOOS#linux md/GOARCH#amd64 api/sts#1.33.12" http.request_content_length=43 http.request.header.content_type=application/x-www-form-urlencoded http.request.header.amz_sdk_invocation_id=03865012-a2e6-49d4-b955-c93ec3779a7a http.request.header.amz_sdk_request="attempt=1; max=5" | |
| 11:57:12.365 STDERR terraform: http.response.body= | |
| 11:57:12.365 STDERR terraform: | <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
| 11:57:12.365 STDERR terraform: | <GetCallerIdentityResult> | |
| 11:57:12.365 STDERR terraform: | <Arn>arn:aws:sts::1234567890:assumed-role/aws-role-name/[email protected]</Arn> | |
| 11:57:12.365 STDERR terraform: | <UserId>AROA*************EPNX:[email protected]</UserId> | |
| 11:57:12.365 STDERR terraform: | <Account>1234567890</Account> | |
| 11:57:12.365 STDERR terraform: | </GetCallerIdentityResult> | |
| 11:57:12.365 STDERR terraform: | <ResponseMetadata> | |
| 11:57:12.365 STDERR terraform: | <RequestId>89cc5c45-36a5-44b3-b9ba-fbb9e15f68d5</RequestId> | |
| 11:57:12.366 STDERR terraform: | </ResponseMetadata> | |
| 11:57:12.366 STDERR terraform: | </GetCallerIdentityResponse> | |
| 11:57:12.366 STDERR terraform: | |
| 11:57:12.365 INFO terraform: TF_LOG: backend-s3.aws-base: Retrieved caller identity from STS: tf_backend.operation=Configure tf_backend.req_id=2ca282df-d337-fd99-b476-53b0b755e047 tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate | |
| 11:57:12.366 STDERR terraform: http.request.body= | |
| 11:57:12.366 STDERR terraform: | Action=GetCallerIdentity&Version=2011-06-15 | |
| 11:57:12.366 STDERR terraform: http.user_agent="APN/1.0 HashiCorp/1.0 Terraform/1.12.2 (+https://www.terraform.io) aws-sdk-go-v2/1.36.0 ua/2.1 os/linux lang/go#1.24.2 md/GOOS#linux md/GOARCH#amd64 api/sts#1.33.12" http.request_content_length=43 http.request.header.x_amz_security_token="*****" | |
| 11:57:12.420 STDERR terraform: http.response.body= | |
| 11:57:12.420 STDERR terraform: | <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
| 11:57:12.420 STDERR terraform: | <GetCallerIdentityResult> | |
| 11:57:12.420 STDERR terraform: | <Arn>arn:aws:sts::1234567890:assumed-role/aws-role-name/[email protected]</Arn> | |
| 11:57:12.420 STDERR terraform: | <UserId>AROA*************EPNX:[email protected]</UserId> | |
| 11:57:12.420 STDERR terraform: | <Account>1234567890</Account> | |
| 11:57:12.420 STDERR terraform: | </GetCallerIdentityResult> | |
| 11:57:12.420 STDERR terraform: | <ResponseMetadata> | |
| 11:57:12.420 STDERR terraform: | <RequestId>90edfdc6-0e5d-4986-bc31-141d788c32d1</RequestId> | |
| 11:57:12.420 STDERR terraform: | </ResponseMetadata> | |
| 11:57:12.421 STDERR terraform: | </GetCallerIdentityResponse> | |
| 11:57:12.421 STDERR terraform: http.duration=53 http.status_code=200 http.response_content_length=520 http.response.header.date="Tue, 05 Aug 2025 09:57:12 GMT" http.response.header.x_amzn_requestid=90edfdc6-0e5d-4986-bc31-141d788c32d1 http.response.header.content_type=text/xml | |
| 11:57:12.420 INFO terraform: TF_LOG: backend-s3.aws-base: Retrieved caller identity from STS: tf_backend.operation=Configure tf_backend.req_id=2ca282df-d337-fd99-b476-53b0b755e047 tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate | |
| 11:57:14.414 INFO terraform: TF_LOG: backend/local: starting Plan operation | |
| 11:57:14.620 STDERR terraform: http.response.body= | |
| 11:57:14.620 STDERR terraform: | <?xml version="1.0" encoding="UTF-8"?> | |
| 11:57:14.620 STDERR terraform: | <ListBucketResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/">REDACTED</ListBucketResult> | |
| 11:57:14.630 STDERR terraform: | [truncated...] | |
| 11:57:14.630 STDERR terraform: http.response.header.server=AmazonS3 http.response.header.x_amz_request_id=2W9K59V0QCCKPDED http.response.header.date="Tue, 05 Aug 2025 09:57:15 GMT" http.response.header.x_amz_bucket_region=eu-west-1 http.response.header.content_type=application/xml http.duration=204 http.status_code=200 | |
| 11:57:14.621 INFO terraform: TF_LOG: backend-s3: Attempting to lock remote state (DynamoDB only)...: tf_backend.lock.id=082f0e40-8e77-e356-45e9-dd613e72bb0f tf_backend.lock.info="" tf_backend.lock.operation=OperationTypePlan tf_backend.lock.path=tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate tf_backend.lock.version=1.12.2 tf_backend.lock.who=myuser@mymachine tf_backend.operation=Lock tf_backend.req_id=0769f826-ef25-821e-7719-82cf4e9d810a tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate | |
| 11:57:14.630 STDERR terraform: http.request.body= | |
| 11:57:14.630 STDERR terraform: | {"ConditionExpression":"attribute_not_exists(LockID)","Item":{"LockID":{"S":"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate"},"Info":{"S":"{\"ID\":\"082f0e40-8e77-e356-45e9-dd613e72bb0f\",\"Operation\":\"OperationTypePlan\",\"Info\":\"\",\"Who\":\"myuser@mymachine\",\"Version\":\"1.12.2\",\"Created\":\"2025-08-05T09:57:14.62124728Z\",\"Path\":\"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate\"}"}},"TableName":"tfstate-1234567890"} | |
| 11:57:14.631 STDERR terraform: http.url=https://dynamodb.eu-west-1.amazonaws.com/ http.user_agent="APN/1.0 HashiCorp/1.0 Terraform/1.12.2 (+https://www.terraform.io) aws-sdk-go-v2/1.36.0 ua/2.1 os/linux lang/go#1.24.2 md/GOOS#linux md/GOARCH#amd64 api/dynamodb#1.39.8" http.request.header.authorization="AWS4-HMAC-SHA256 Credential=ASIA************4C7T/20250805/eu-west-1/dynamodb/aws4_request, SignedHeaders=accept-encoding;amz-sdk-invocation-id;amz-sdk-request;content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=*****" http.request.header.x_amz_security_token="*****" http.request.header.content_type=application/x-amz-json-1.0 http.request.header.x_amz_target=DynamoDB_20120810.PutItem http.request.header.amz_sdk_invocation_id=922663d0-4c3b-4345-91d6-8cb459e55e3c http.request.header.accept_encoding=identity http.method=POST net.peer.name=dynamodb.eu-west-1.amazonaws.com http.request_content_length=535 http.request.header.x_amz_date=20250805T095714Z http.request.header.amz_sdk_request="attempt=1; max=5" | |
| 11:57:14.818 STDERR terraform: http.response.body= | |
| 11:57:14.818 STDERR terraform: | {} | |
| 11:57:14.818 STDERR terraform: http.duration=196 | |
| 11:57:14.818 INFO terraform: TF_LOG: backend-s3: Locked remote state (DynamoDB only): tf_backend.lock.id=082f0e40-8e77-e356-45e9-dd613e72bb0f tf_backend.lock.info="" tf_backend.lock.operation=OperationTypePlan tf_backend.lock.path=tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate tf_backend.lock.version=1.12.2 tf_backend.lock.who=myuser@mymachine tf_backend.operation=Lock tf_backend.req_id=0769f826-ef25-821e-7719-82cf4e9d810a tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate | |
| 11:57:14.818 INFO terraform: TF_LOG: backend-s3: Downloading remote state: tf_backend.operation=Get tf_backend.req_id=8b85fc1a-6118-a31d-c467-eff81b7dab86 tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate | |
| 11:57:14.934 STDERR terraform: http.request.body= | |
| 11:57:14.934 STDERR terraform: | {"ConsistentRead":true,"Key":{"LockID":{"S":"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate-md5"}},"ProjectionExpression":"LockID, Digest","TableName":"tfstate-1234567890"} | |
| 11:57:14.934 STDERR terraform: http.method=POST http.url=https://dynamodb.eu-west-1.amazonaws.com/ http.request.header.content_type=application/x-amz-json-1.0 http.request.header.x_amz_target=DynamoDB_20120810.GetItem http.request.header.amz_sdk_request="attempt=1; max=5" http.request.header.accept_encoding=identity net.peer.name=dynamodb.eu-west-1.amazonaws.com http.user_agent="APN/1.0 HashiCorp/1.0 Terraform/1.12.2 (+https://www.terraform.io) aws-sdk-go-v2/1.36.0 ua/2.1 os/linux lang/go#1.24.2 md/GOOS#linux md/GOARCH#amd64 api/dynamodb#1.39.8" | |
| 11:57:14.978 STDERR terraform: http.response.body= | |
| 11:57:14.978 STDERR terraform: | {"Item":{"Digest":{"S":"f9f77a7534dc59ab9fd95d4a4895670e"},"LockID":{"S":"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate-md5"}}} | |
| 11:57:14.978 STDERR terraform: http.duration=43 http.response_content_length=174 http.response.header.connection=keep-alive http.response.header.x_amzn_requestid=6VC3V6D1FARM6L10FP5BRDJVI3VV4KQNSO5AEMVJF66Q9ASUAAJG http.response.header.x_amz_crc32=2773592823 | |
| 11:57:14.979 INFO terraform: TF_LOG: provider: configuring client automatic mTLS | |
| 11:57:14.997 INFO terraform: TF_LOG: provider.terraform-provider-cloudflare_v5.8.2: configuring server automatic mTLS: timestamp="2025-08-05T11:57:14.997+0200" | |
| 11:57:15.114 INFO terraform: TF_LOG: provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.8.2/linux_amd64/terraform-provider-cloudflare_v5.8.2 id=76835 | |
| 11:57:15.114 INFO terraform: TF_LOG: provider: configuring client automatic mTLS | |
| 11:57:15.245 INFO terraform: TF_LOG: provider.terraform-provider-aws_v5.100.0_x5: configuring server automatic mTLS: timestamp="2025-08-05T11:57:15.245+0200" | |
| 11:57:15.999 INFO terraform: TF_LOG: provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/aws/5.100.0/linux_amd64/terraform-provider-aws_v5.100.0_x5 id=76852 | |
| 11:57:16.000 INFO terraform: TF_LOG: provider: configuring client automatic mTLS | |
| 11:57:16.013 INFO terraform: TF_LOG: provider.terraform-provider-cloudflare_v5.8.2: configuring server automatic mTLS: timestamp="2025-08-05T11:57:16.013+0200" | |
| 11:57:16.038 INFO terraform: TF_LOG: provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.8.2/linux_amd64/terraform-provider-cloudflare_v5.8.2 id=76874 | |
| 11:57:16.038 INFO terraform: TF_LOG: backend/local: plan calling Plan | |
| 11:57:16.040 INFO terraform: TF_LOG: provider: configuring client automatic mTLS | |
| 11:57:16.053 INFO terraform: TF_LOG: provider.terraform-provider-cloudflare_v5.8.2: configuring server automatic mTLS: timestamp="2025-08-05T11:57:16.053+0200" | |
| 11:57:16.078 STDOUT terraform: module.non_prod_zone["ourzone.example.com"].cloudflare_zone.cf_zone: Refreshing state... [id=our-zone-id] | |
| 11:57:16.081 STDERR terraform: 2025-08-05T11:57:16.081+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.8.2: | |
| 11:57:16.082 STDERR terraform: GET /client/v4/zones/our-zone-id HTTP/1.1 | |
| 11:57:16.082 STDERR terraform: > user-agent: terraform-provider-cloudflare/5.8.2 terraform-plugin-framework/1.15.0 terraform/1.12.2 | |
| 11:57:16.082 STDERR terraform: > x-stainless-runtime: terraform-plugin-framework | |
| 11:57:16.082 STDERR terraform: > x-stainless-arch: x64 | |
| 11:57:16.082 STDERR terraform: > authorization: [redacted] | |
| 11:57:16.082 STDERR terraform: > accept: application/json | |
| 11:57:16.082 STDERR terraform: > x-stainless-retry-count: 0 | |
| 11:57:16.082 STDERR terraform: > x-stainless-lang: Terraform | |
| 11:57:16.082 STDERR terraform: > x-stainless-runtime-version: 1.15.0 | |
| 11:57:16.082 STDERR terraform: > x-stainless-os: Linux | |
| 11:57:16.082 STDERR terraform: > x-stainless-package-version: 5.8.2: @caller=github.com/cloudflare/terraform-provider-cloudflare/internal/logging/logging.go:64 tf_req_id=2ed1ee53-c912-d8cb-c038-e82b3b2ff86c tf_rpc=ReadResource @module=cloudflare tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_resource_type=cloudflare_zone timestamp="2025-08-05T11:57:16.081+0200" | |
| 11:57:16.844 STDERR terraform: 2025-08-05T11:57:16.844+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.8.2: | |
| 11:57:16.844 STDERR terraform: < HTTP/2.0 200 OK | |
| 11:57:16.844 STDERR terraform: < cf-cache-status: DYNAMIC | |
| 11:57:16.844 STDERR terraform: < cf-ray: 96a56de7ddbb5b8a-VIE | |
| 11:57:16.844 STDERR terraform: < cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 | |
| 11:57:16.844 STDERR terraform: < vary: accept-encoding | |
| 11:57:16.844 STDERR terraform: < api-version: 2025-08-05 | |
| 11:57:16.844 STDERR terraform: < cf-auditlog-id: 019879a9-ed01-7f52-a0ec-65620d31d381 | |
| 11:57:16.844 STDERR terraform: < x-content-type-options: nosniff | |
| 11:57:16.845 STDERR terraform: < date: Tue, 05 Aug 2025 09:57:16 GMT | |
| 11:57:16.845 STDERR terraform: < content-type: application/json | |
| 11:57:16.845 STDERR terraform: < server: cloudflare | |
| 11:57:16.845 STDERR terraform: < pragma: no-cache | |
| 11:57:16.845 STDERR terraform: < x-frame-options: SAMEORIGIN | |
| 11:57:16.845 STDERR terraform: < expires: Sun, 25 Jan 1981 05:00:00 GMT | |
| 11:57:16.845 STDERR terraform: < set-cookie: __cflb=0H28vgHxwvgAQtjUGU4yFBDJQfw1pfzuEAaPmd4m74q; SameSite=Lax; path=/; expires=Tue, 05-Aug-25 12:27:17 GMT; HttpOnly | |
| 11:57:16.845 STDERR terraform: < set-cookie: __cf_bm=CFgjicHe3rkSvM4OTu5E73_FN_0BnrLyFy.ri9UTzqg-1754387836-1.0.1.1-29DiqYCeM3Lh8bMUg6fIqmyRBt2Em5R8FZUbJFwnFc.DuZ7Je9WkC0_aefqtM57U_TZaE9.Cp7cXGJx2214pBaEujwTBv4vXVk_fdnghC6Q; path=/; expires=Tue, 05-Aug-25 10:27:16 GMT; domain=.api.cloudflare.com; HttpOnly; Secure; SameSite=None | |
| 11:57:16.845 STDERR terraform: < set-cookie: _cfuvid=ubL1GKJqOv6TkUpVOjhzHIkPpmiRQh_MvSFPUFCFfp0-1754387836839-0.0.1.1-604800000; path=/; domain=.api.cloudflare.com; HttpOnly; Secure; SameSite=None | |
| 11:57:16.845 STDERR terraform: < strict-transport-security: max-age=31536000 | |
| 11:57:16.845 STDERR terraform: < | |
| 11:57:16.845 STDERR terraform: {"result":{"id":"our-zone-id","name":"ourzone.example.com","status":"active","paused":false,"type":"full","development_mode":0,"name_servers":["liv.ns.cloudflare.com","max.ns.cloudflare.com"],"original_name_servers":["dns6.itsfogo.com","dns3.itsfogo.com","dns2.itsbogo.com","dns5.itsfogo.com","dns1.itsbogo.com","dns4.itsfogo.com","dns2.itsfogo.com","dns1.itsfogo.com"],"original_registrar":"nom iq ltd com laude (id: )","original_dnshost":null,"modified_on":"2025-08-05T09:44:20.978536Z","created_on":"2025-07-06T13:42:05.098482Z","activated_on":"2025-07-07T13:36:01.727377Z","vanity_name_servers":[],"vanity_name_servers_ips":null,"meta":{"step":4,"custom_certificate_quota":1,"page_rule_quota":100,"phishing_detected":false},"owner":{"id":"our-account-id","type":"organization","name":"our-account-name"},"account":{"id":"our-account-id","name":"our-account-name"},"tenant":{"id":null,"name":null},"tenant_unit":{"id":null},"permissions":["#waf:read","#waf:edit","#access:edit","#access:read","#zone:read","#zone_settings:read","#zone_settings:edit","#dns_records:read","#dns_records:edit","#page_shield:read","#ssl:read","#page_shield:edit","#zone:edit","#ssl:edit","#logs:edit","#logs:read"],"plan":{"id":"94f3b7b768b0458b56d2cac4fe5ec0f9","name":"Enterprise Website","price":0,"currency":"USD","frequency":"","is_subscribed":true,"can_subscribe":true,"legacy_id":"enterprise","legacy_discount":false,"externally_managed":true}},"success":true,"errors":[],"messages":[]} | |
| 11:57:16.846 STDERR terraform: : @module=cloudflare tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_resource_type=cloudflare_zone @caller=github.com/cloudflare/terraform-provider-cloudflare/internal/logging/logging.go:92 tf_req_id=2ed1ee53-c912-d8cb-c038-e82b3b2ff86c tf_rpc=ReadResource timestamp="2025-08-05T11:57:16.844+0200" | |
| 11:57:16.858 STDOUT terraform: module.non_prod_zone["ourzone.example.com"].cloudflare_zone_dns_settings.cf_dns_settings: Refreshing state... | |
| 11:57:16.860 STDERR terraform: 2025-08-05T11:57:16.860+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.8.2: | |
| 11:57:16.860 STDERR terraform: GET /client/v4/zones/our-zone-id/dns_settings HTTP/1.1 | |
| 11:57:16.860 STDERR terraform: > x-stainless-arch: x64 | |
| 11:57:16.860 STDERR terraform: > authorization: [redacted] | |
| 11:57:16.860 STDERR terraform: > x-stainless-retry-count: 0 | |
| 11:57:16.860 STDERR terraform: > user-agent: terraform-provider-cloudflare/5.8.2 terraform-plugin-framework/1.15.0 terraform/1.12.2 | |
| 11:57:16.860 STDERR terraform: > x-stainless-os: Linux | |
| 11:57:16.860 STDERR terraform: > x-stainless-lang: Terraform | |
| 11:57:16.860 STDERR terraform: > x-stainless-runtime: terraform-plugin-framework | |
| 11:57:16.860 STDERR terraform: > x-stainless-runtime-version: 1.15.0 | |
| 11:57:16.861 STDERR terraform: > accept: application/json | |
| 11:57:16.861 STDERR terraform: > x-stainless-package-version: 5.8.2: tf_req_id=f1009e49-c084-b8c5-2504-0a977a9e8a60 tf_rpc=ReadResource tf_resource_type=cloudflare_zone_dns_settings @caller=github.com/cloudflare/terraform-provider-cloudflare/internal/logging/logging.go:64 @module=cloudflare tf_provider_addr=registry.terraform.io/cloudflare/cloudflare timestamp="2025-08-05T11:57:16.860+0200" | |
| 11:57:17.585 STDERR terraform: 2025-08-05T11:57:17.585+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.8.2: | |
| 11:57:17.585 STDERR terraform: < HTTP/2.0 200 OK | |
| 11:57:17.585 STDERR terraform: < date: Tue, 05 Aug 2025 09:57:17 GMT | |
| 11:57:17.585 STDERR terraform: < cf-ray: 96a56dec69005b8a-VIE | |
| 11:57:17.585 STDERR terraform: < vary: Accept-Encoding | |
| 11:57:17.585 STDERR terraform: < set-cookie: __cflb=0H28vgHxwvgAQtjUGU4yFBDJQfw1pfzuEAaPmd4m74q; SameSite=Lax; path=/; expires=Tue, 05-Aug-25 12:27:18 GMT; HttpOnly | |
| 11:57:17.586 STDERR terraform: < set-cookie: __cf_bm=WhHfWSZ7iO0fVOB1EinljaH6eAOVeiJewt9lSD7XJiM-1754387837-1.0.1.1-gTt2TsjBwd_pwMNmcOjZIKK2pOy.JMEup2qz5IAnISrZ7oLY9g.8tAmwUahqV5SzIr7Z6szSg.O1Mug6fVBJeGu61LpEmFLcio5BewedKnY; path=/; expires=Tue, 05-Aug-25 10:27:17 GMT; domain=.api.cloudflare.com; HttpOnly; Secure; SameSite=None | |
| 11:57:17.586 STDERR terraform: < set-cookie: _cfuvid=Db7LTLAIH46quNDSbjpYM7kUQm.c4nKnJ7Amdx3wJrQ-1754387837581-0.0.1.1-604800000; path=/; domain=.api.cloudflare.com; HttpOnly; Secure; SameSite=None | |
| 11:57:17.586 STDERR terraform: < api-version: 2025-08-05 | |
| 11:57:17.586 STDERR terraform: < cf-auditlog-id: 019879a9-efd2-77eb-8484-328c4115aa4b | |
| 11:57:17.586 STDERR terraform: < server: cloudflare | |
| 11:57:17.586 STDERR terraform: < content-type: application/json | |
| 11:57:17.586 STDERR terraform: < cf-cache-status: DYNAMIC | |
| 11:57:17.586 STDERR terraform: < | |
| 11:57:17.586 STDERR terraform: {"result":{"nameservers":{"type":"cloudflare.standard"},"foundation_dns":false,"multi_provider":false,"secondary_overrides":false,"soa":{"mname":null,"rname":"dns.cloudflare.com","refresh":10000,"retry":2400,"expire":604800,"min_ttl":60,"ttl":3600},"ns_ttl":86400,"zone_mode":"standard","internal_dns":{"reference_zone_id":null},"flatten_all_cnames":false},"success":true,"errors":[],"messages":[]} | |
| 11:57:17.586 STDERR terraform: : @module=cloudflare tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=f1009e49-c084-b8c5-2504-0a977a9e8a60 tf_rpc=ReadResource @caller=github.com/cloudflare/terraform-provider-cloudflare/internal/logging/logging.go:92 tf_resource_type=cloudflare_zone_dns_settings timestamp="2025-08-05T11:57:17.585+0200" | |
| 11:57:17.592 INFO terraform: TF_LOG: provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.8.2/linux_amd64/terraform-provider-cloudflare_v5.8.2 id=76885 | |
| 11:57:17.595 INFO terraform: TF_LOG: backend/local: plan operation completed | |
| 11:57:17.595 INFO terraform: TF_LOG: backend/local: writing plan output to: tfplan | |
| 11:57:17.682 STDOUT terraform: Terraform used the selected providers to generate the following execution | |
| 11:57:17.682 STDOUT terraform: plan. Resource actions are indicated with the following symbols: | |
| 11:57:17.682 STDOUT terraform: ~ update in-place | |
| 11:57:17.682 STDOUT terraform: Terraform will perform the following actions: | |
| 11:57:17.682 STDOUT terraform: # module.non_prod_zone["ourzone.example.com"].cloudflare_zone_dns_settings.cf_dns_settings will be updated in-place | |
| 11:57:17.682 STDOUT terraform: ~ resource "cloudflare_zone_dns_settings" "cf_dns_settings" { | |
| 11:57:17.682 STDOUT terraform: ~ soa = { | |
| 11:57:17.682 STDOUT terraform: + mname = "" | |
| 11:57:17.682 STDOUT terraform: # (6 unchanged attributes hidden) | |
| 11:57:17.682 STDOUT terraform: } | |
| 11:57:17.682 STDOUT terraform: # (9 unchanged attributes hidden) | |
| 11:57:17.682 STDOUT terraform: } | |
| 11:57:17.682 STDOUT terraform: Plan: 0 to add, 1 to change, 0 to destroy. | |
| 11:57:17.682 STDOUT terraform: | |
| 11:57:17.682 STDOUT terraform: | |
| 11:57:17.682 STDOUT terraform: ───────────────────────────────────────────────────────────────────────────── | |
| 11:57:17.682 STDOUT terraform: Saved the plan to: tfplan | |
| 11:57:17.682 STDOUT terraform: To perform exactly these actions, run the following command to apply: | |
| 11:57:17.682 STDOUT terraform: terraform apply "tfplan" | |
| 11:57:17.682 INFO terraform: TF_LOG: backend-s3: Attempting to unlock remote state (DynamoDB only)...: tf_backend.lock.id=082f0e40-8e77-e356-45e9-dd613e72bb0f tf_backend.operation=Unlock tf_backend.req_id=943ae7b6-3995-0f82-3994-280a82397da3 tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate | |
| 11:57:17.682 STDERR terraform: http.request.body= | |
| 11:57:17.682 STDERR terraform: | {"ConsistentRead":true,"Key":{"LockID":{"S":"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate"}},"ProjectionExpression":"LockID, Info","TableName":"tfstate-1234567890"} | |
| 11:57:17.683 STDERR terraform: net.peer.name=dynamodb.eu-west-1.amazonaws.com http.request_content_length=220 http.request.header.authorization="AWS4-HMAC-SHA256 Credential=ASIA************4C7T/20250805/eu-west-1/dynamodb/aws4_request, SignedHeaders=accept-encoding;amz-sdk-invocation-id;amz-sdk-request;content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=*****" http.request.header.x_amz_security_token="*****" | |
| 11:57:17.731 STDERR terraform: http.response.body= | |
| 11:57:17.731 STDERR terraform: | {"Item":{"LockID":{"S":"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate"},"Info":{"S":"{\"ID\":\"082f0e40-8e77-e356-45e9-dd613e72bb0f\",\"Operation\":\"OperationTypePlan\",\"Info\":\"\",\"Who\":\"myuser@mymachine\",\"Version\":\"1.12.2\",\"Created\":\"2025-08-05T09:57:14.62124728Z\",\"Path\":\"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate\"}"}}} | |
| 11:57:17.732 STDERR terraform: http.response.header.content_type=application/x-amz-json-1.0 http.response.header.connection=keep-alive | |
| 11:57:17.732 STDERR terraform: http.request.body= | |
| 11:57:17.732 STDERR terraform: | {"Key":{"LockID":{"S":"tfstate-1234567890/bucketpath/terraform-cf-issue-minimal-poc.tfstate"}},"TableName":"tfstate-1234567890"} | |
| 11:57:17.732 STDERR terraform: http.request.header.amz_sdk_invocation_id=70715afe-3583-4843-8642-abe4c2bb8f3e http.request.header.amz_sdk_request="attempt=1; max=5" http.request.header.x_amz_date=20250805T095717Z http.request.header.x_amz_target=DynamoDB_20120810.DeleteItem http.request.header.accept_encoding=identity http.request.header.content_type=application/x-amz-json-1.0 | |
| 11:57:17.776 STDERR terraform: http.response.body= | |
| 11:57:17.777 STDERR terraform: | {} | |
| 11:57:17.777 STDERR terraform: http.duration=44 http.status_code=200 http.response.header.x_amz_crc32=2745614147 http.response.header.server=Server http.response.header.date="Tue, 05 Aug 2025 09:57:17 GMT" http.response_content_length=2 http.response.header.content_type=application/x-amz-json-1.0 | |
| 11:57:17.776 INFO terraform: TF_LOG: backend-s3: Unlocked remote state (DynamoDB only): tf_backend.lock.id=082f0e40-8e77-e356-45e9-dd613e72bb0f tf_backend.operation=Unlock tf_backend.req_id=943ae7b6-3995-0f82-3994-280a82397da3 tf_backend.s3.bucket=tfstate-1234567890 tf_backend.s3.path=bucketpath/terraform-cf-issue-minimal-poc.tfstate |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment