Running with gitlab-runner 14.2.0 (58ba2b95)
  on Froggit-Runner-froggit-prd-gitlab-runner-gqzzeorc V5jqswK4
section_start:1644591700:prepare_executor
Preparing the "docker" executor
Using Docker executor with image registry.gitlab.com/gitlab-org/terraform-images/stable:latest ...
Pulling docker image registry.gitlab.com/gitlab-org/terraform-images/stable:latest ...
Using docker image sha256:faef5c6c20b5a2d785b093b74513e47fde830fba993ca8d36bb170d5946faec3 for registry.gitlab.com/gitlab-org/terraform-images/stable:latest with digest registry.gitlab.com/gitlab-org/terraform-images/stable@sha256:7f666f9f50df4b24bbb240ebee18d042ac3a19e5924786483d6d3967d482889c ...
section_end:1644591709:prepare_executor
section_start:1644591709:prepare_script
Preparing environment
Running on runner-v5jqswk4-project-341-concurrent-0 via 8b4a2daf3c05...
section_end:1644591711:prepare_script
section_start:1644591711:get_sources
Getting source from Git repository
Fetching changes with git depth set to 50...
Reinitialized existing Git repository in /builds/bejean-developpement/infraascode/elasticcloudwithgcp/.git/
Checking out d16d09f4 as feature/elastic-conference...
Removing manifests/elastic/.terraform/
Removing manifests/gke/.terraform.lock.hcl
Removing manifests/gke/.terraform/
Removing manifests/gke/gcp-sa.json
Removing pscConnectionId.env

Skipping Git submodules setup
section_end:1644591712:get_sources
section_start:1644591712:restore_cache
Restoring cache
Checking cache for elastic...
No URL provided, cache will not be downloaded from shared cache server. Instead a local version of cache will be extracted. 
Successfully extracted cache
Checking cache for gke...
No URL provided, cache will not be downloaded from shared cache server. Instead a local version of cache will be extracted. 
Successfully extracted cache
section_end:1644591715:restore_cache
section_start:1644591715:step_script
Executing "step_script" stage of the job script
Using docker image sha256:faef5c6c20b5a2d785b093b74513e47fde830fba993ca8d36bb170d5946faec3 for registry.gitlab.com/gitlab-org/terraform-images/stable:latest with digest registry.gitlab.com/gitlab-org/terraform-images/stable@sha256:7f666f9f50df4b24bbb240ebee18d042ac3a19e5924786483d6d3967d482889c ...
$ cd $TF_ROOT_GKE # collapsed multi-line command
$ gitlab-terraform init # collapsed multi-line command

Initializing the backend...

Successfully configured the backend "http"! Terraform will automatically
use this backend unless the backend configuration changes.

Initializing provider plugins...
- Finding hashicorp/google versions matching "4.3.0"...
- Installing hashicorp/google v4.3.0...
- Installed hashicorp/google v4.3.0 (signed by HashiCorp)

Terraform has created a lock file .terraform.lock.hcl to record the provider
selections it made above. Include this file in your version control repository
so that Terraform can guarantee to make the same selections by default when
you run "terraform init" in the future.

Terraform has been successfully initialized!

Initializing provider plugins...
- Reusing previous version of hashicorp/google from the dependency lock file
- Using previously-installed hashicorp/google v4.3.0

Terraform has been successfully initialized!
Success! The configuration is valid.


Initializing the backend...

Successfully configured the backend "http"! Terraform will automatically
use this backend unless the backend configuration changes.

Initializing provider plugins...
- Reusing previous version of hashicorp/google from the dependency lock file
- Using previously-installed hashicorp/google v4.3.0

Terraform has been successfully initialized!

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # google_compute_firewall.allow_from_iap_to_instances will be created
  + resource "google_compute_firewall" "allow_from_iap_to_instances" {
      + creation_timestamp = (known after apply)
      + destination_ranges = (known after apply)
      + direction          = (known after apply)
      + enable_logging     = (known after apply)
      + id                 = (known after apply)
      + name               = "fw-vpc-allow-ssh-from-iap"
      + network            = "vpc-network-gke"
      + priority           = 1000
      + project            = "[MASKED]"
      + self_link          = (known after apply)
      + source_ranges      = [
          + "35.235.240.0/20",
        ]

      + allow {
          + ports    = [
              + "22",
            ]
          + protocol = "tcp"
        }
    }

  # google_compute_firewall.fw_http will be created
  + resource "google_compute_firewall" "fw_http" {
      + creation_timestamp = (known after apply)
      + destination_ranges = (known after apply)
      + direction          = (known after apply)
      + disabled           = false
      + enable_logging     = (known after apply)
      + id                 = (known after apply)
      + name               = "fw-vpc-allow-http"
      + network            = "vpc-network-gke"
      + priority           = 1000
      + project            = "[MASKED]"
      + self_link          = (known after apply)
      + source_ranges      = [
          + "0.0.0.0/0",
        ]
      + target_tags        = [
          + "http-server",
        ]

      + allow {
          + ports    = [
              + "80",
            ]
          + protocol = "tcp"
        }
    }

  # google_compute_firewall.fw_https will be created
  + resource "google_compute_firewall" "fw_https" {
      + creation_timestamp = (known after apply)
      + destination_ranges = (known after apply)
      + direction          = (known after apply)
      + disabled           = false
      + enable_logging     = (known after apply)
      + id                 = (known after apply)
      + name               = "fw-vpc-allow-https"
      + network            = "vpc-network-gke"
      + priority           = 1000
      + project            = "[MASKED]"
      + self_link          = (known after apply)
      + source_ranges      = [
          + "0.0.0.0/0",
        ]
      + target_tags        = [
          + "https-server",
        ]

      + allow {
          + ports    = [
              + "443",
            ]
          + protocol = "tcp"
        }
    }

  # google_compute_global_address.static_ip will be created
  + resource "google_compute_global_address" "static_ip" {
      + address            = (known after apply)
      + creation_timestamp = (known after apply)
      + id                 = (known after apply)
      + name               = "gke-frontend"
      + project            = "[MASKED]"
      + self_link          = (known after apply)
    }

  # google_compute_global_address.vpc_private_ip_address will be created
  + resource "google_compute_global_address" "vpc_private_ip_address" {
      + address            = (known after apply)
      + address_type       = "INTERNAL"
      + creation_timestamp = (known after apply)
      + id                 = (known after apply)
      + name               = "vpc-private-ip-gke"
      + network            = (known after apply)
      + prefix_length      = 16
      + project            = "[MASKED]"
      + purpose            = "VPC_PEERING"
      + self_link          = (known after apply)
    }

  # google_compute_network.vpc_network will be created
  + resource "google_compute_network" "vpc_network" {
      + auto_create_subnetworks         = false
      + delete_default_routes_on_create = false
      + gateway_ipv4                    = (known after apply)
      + id                              = (known after apply)
      + mtu                             = 1460
      + name                            = "vpc-network-gke"
      + project                         = "[MASKED]"
      + routing_mode                    = "GLOBAL"
      + self_link                       = (known after apply)
    }

  # google_compute_router.router will be created
  + resource "google_compute_router" "router" {
      + creation_timestamp = (known after apply)
      + id                 = (known after apply)
      + name               = "router-vpc-name"
      + network            = (known after apply)
      + project            = "[MASKED]"
      + region             = "europe-west1"
      + self_link          = (known after apply)

      + bgp {
          + advertise_mode = "DEFAULT"
          + asn            = 64514
        }
    }

  # google_compute_router_nat.cloud_nat will be created
  + resource "google_compute_router_nat" "cloud_nat" {
      + enable_endpoint_independent_mapping = true
      + icmp_idle_timeout_sec               = 30
      + id                                  = (known after apply)
      + min_ports_per_vm                    = 64
      + name                                = "cloud-nat-vpc-name"
      + nat_ip_allocate_option              = "AUTO_ONLY"
      + project                             = "[MASKED]"
      + region                              = "europe-west1"
      + router                              = "router-vpc-name"
      + source_subnetwork_ip_ranges_to_nat  = "ALL_SUBNETWORKS_ALL_IP_RANGES"
      + tcp_established_idle_timeout_sec    = 1200
      + tcp_transitory_idle_timeout_sec     = 30
      + udp_idle_timeout_sec                = 30

      + log_config {
          + enable = false
          + filter = "ERRORS_ONLY"
        }
    }

  # google_compute_subnetwork.vpc_subnetwork will be created
  + resource "google_compute_subnetwork" "vpc_subnetwork" {
      + creation_timestamp         = (known after apply)
      + external_ipv6_prefix       = (known after apply)
      + fingerprint                = (known after apply)
      + gateway_address            = (known after apply)
      + id                         = (known after apply)
      + ip_cidr_range              = "192.168.100.0/24"
      + ipv6_cidr_range            = (known after apply)
      + name                       = "vpc-subnetwork-gke"
      + network                    = (known after apply)
      + private_ip_google_access   = true
      + private_ipv6_google_access = (known after apply)
      + project                    = "[MASKED]"
      + purpose                    = (known after apply)
      + region                     = "europe-west1"
      + secondary_ip_range         = [
          + {
              + ip_cidr_range = "10.0.0.0/14"
              + range_name    = "pods"
            },
          + {
              + ip_cidr_range = "10.4.0.0/19"
              + range_name    = "services"
            },
        ]
      + self_link                  = (known after apply)
      + stack_type                 = (known after apply)
    }

  # google_container_cluster.cluster will be created
  + resource "google_container_cluster" "cluster" {
      + cluster_ipv4_cidr           = (known after apply)
      + datapath_provider           = (known after apply)
      + default_max_pods_per_node   = 20
      + enable_binary_authorization = false
      + enable_intranode_visibility = (known after apply)
      + enable_kubernetes_alpha     = false
      + enable_legacy_abac          = false
      + enable_shielded_nodes       = true
      + endpoint                    = (known after apply)
      + id                          = (known after apply)
      + initial_node_count          = 1
      + label_fingerprint           = (known after apply)
      + location                    = "europe-west1"
      + logging_service             = "logging.googleapis.com/kubernetes"
      + master_version              = (known after apply)
      + monitoring_service          = (known after apply)
      + name                        = "gke"
      + network                     = (known after apply)
      + networking_mode             = "VPC_NATIVE"
      + node_locations              = (known after apply)
      + node_version                = (known after apply)
      + operation                   = (known after apply)
      + private_ipv6_google_access  = (known after apply)
      + project                     = "[MASKED]"
      + remove_default_node_pool    = true
      + self_link                   = (known after apply)
      + services_ipv4_cidr          = (known after apply)
      + subnetwork                  = (known after apply)
      + tpu_ipv4_cidr_block         = (known after apply)

      + addons_config {
          + cloudrun_config {
              + disabled           = (known after apply)
              + load_balancer_type = (known after apply)
            }

          + horizontal_pod_autoscaling {
              + disabled = (known after apply)
            }

          + http_load_balancing {
              + disabled = (known after apply)
            }

          + network_policy_config {
              + disabled = (known after apply)
            }
        }

      + authenticator_groups_config {
          + security_group = (known after apply)
        }

      + cluster_autoscaling {
          + enabled = (known after apply)

          + auto_provisioning_defaults {
              + oauth_scopes    = (known after apply)
              + service_account = (known after apply)
            }

          + resource_limits {
              + maximum       = (known after apply)
              + minimum       = (known after apply)
              + resource_type = (known after apply)
            }
        }

      + confidential_nodes {
          + enabled = (known after apply)
        }

      + database_encryption {
          + key_name = (known after apply)
          + state    = (known after apply)
        }

      + default_snat_status {
          + disabled = false
        }

      + ip_allocation_policy {
          + cluster_ipv4_cidr_block       = (known after apply)
          + cluster_secondary_range_name  = "pods"
          + services_ipv4_cidr_block      = (known after apply)
          + services_secondary_range_name = "services"
        }

      + logging_config {
          + enable_components = (known after apply)
        }

      + master_auth {
          + client_certificate     = (known after apply)
          + client_key             = (sensitive value)
          + cluster_ca_certificate = (known after apply)

          + client_certificate_config {
              + issue_client_certificate = (known after apply)
            }
        }

      + monitoring_config {
          + enable_components = (known after apply)
        }

      + network_policy {
          + enabled  = (known after apply)
          + provider = (known after apply)
        }

      + node_config {
          + disk_size_gb      = (known after apply)
          + disk_type         = (known after apply)
          + guest_accelerator = (known after apply)
          + image_type        = (known after apply)
          + labels            = (known after apply)
          + local_ssd_count   = (known after apply)
          + machine_type      = (known after apply)
          + metadata          = (known after apply)
          + min_cpu_platform  = (known after apply)
          + node_group        = (known after apply)
          + oauth_scopes      = (known after apply)
          + preemptible       = (known after apply)
          + service_account   = (known after apply)
          + tags              = (known after apply)
          + taint             = (known after apply)

          + gcfs_config {
              + enabled = (known after apply)
            }

          + shielded_instance_config {
              + enable_integrity_monitoring = (known after apply)
              + enable_secure_boot          = (known after apply)
            }

          + workload_metadata_config {
              + mode = (known after apply)
            }
        }

      + node_pool {
          + initial_node_count          = (known after apply)
          + instance_group_urls         = (known after apply)
          + managed_instance_group_urls = (known after apply)
          + max_pods_per_node           = (known after apply)
          + name                        = (known after apply)
          + name_prefix                 = (known after apply)
          + node_count                  = (known after apply)
          + node_locations              = (known after apply)
          + version                     = (known after apply)

          + autoscaling {
              + max_node_count = (known after apply)
              + min_node_count = (known after apply)
            }

          + management {
              + auto_repair  = (known after apply)
              + auto_upgrade = (known after apply)
            }

          + node_config {
              + disk_size_gb      = (known after apply)
              + disk_type         = (known after apply)
              + guest_accelerator = (known after apply)
              + image_type        = (known after apply)
              + labels            = (known after apply)
              + local_ssd_count   = (known after apply)
              + machine_type      = (known after apply)
              + metadata          = (known after apply)
              + min_cpu_platform  = (known after apply)
              + node_group        = (known after apply)
              + oauth_scopes      = (known after apply)
              + preemptible       = (known after apply)
              + service_account   = (known after apply)
              + tags              = (known after apply)
              + taint             = (known after apply)

              + gcfs_config {
                  + enabled = (known after apply)
                }

              + shielded_instance_config {
                  + enable_integrity_monitoring = (known after apply)
                  + enable_secure_boot          = (known after apply)
                }

              + workload_metadata_config {
                  + mode = (known after apply)
                }
            }

          + upgrade_settings {
              + max_surge       = (known after apply)
              + max_unavailable = (known after apply)
            }
        }

      + private_cluster_config {
          + enable_private_nodes   = true
          + master_ipv4_cidr_block = "172.16.0.0/28"
          + peering_name           = (known after apply)
          + private_endpoint       = (known after apply)
          + public_endpoint        = (known after apply)

          + master_global_access_config {
              + enabled = (known after apply)
            }
        }

      + release_channel {
          + channel = (known after apply)
        }

      + workload_identity_config {
          + workload_pool = "[MASKED].svc.id.goog"
        }
    }

  # google_container_node_pool.node_pool will be created
  + resource "google_container_node_pool" "node_pool" {
      + cluster                     = "gke"
      + id                          = (known after apply)
      + initial_node_count          = (known after apply)
      + instance_group_urls         = (known after apply)
      + location                    = "europe-west1"
      + managed_instance_group_urls = (known after apply)
      + max_pods_per_node           = (known after apply)
      + name                        = "gke-preemptible-nodes"
      + name_prefix                 = (known after apply)
      + node_count                  = 1
      + node_locations              = (known after apply)
      + operation                   = (known after apply)
      + project                     = "[MASKED]"
      + version                     = (known after apply)

      + management {
          + auto_repair  = (known after apply)
          + auto_upgrade = (known after apply)
        }

      + node_config {
          + disk_size_gb      = 50
          + disk_type         = "pd-ssd"
          + guest_accelerator = (known after apply)
          + image_type        = "cos"
          + labels            = {
              + "cputype"     = "e2"
              + "disktype"    = "ssd"
              + "preemptible" = "true"
            }
          + local_ssd_count   = (known after apply)
          + machine_type      = "e2-custom-6-6144"
          + metadata          = (known after apply)
          + oauth_scopes      = [
              + "https://www.googleapis.com/auth/cloud-platform",
            ]
          + preemptible       = true
          + service_account   = (known after apply)
          + taint             = (known after apply)

          + shielded_instance_config {
              + enable_integrity_monitoring = (known after apply)
              + enable_secure_boot          = (known after apply)
            }

          + workload_metadata_config {
              + mode = (known after apply)
            }
        }

      + upgrade_settings {
          + max_surge       = (known after apply)
          + max_unavailable = (known after apply)
        }
    }

  # google_service_networking_connection.vpc_private_vpc_connection will be created
  + resource "google_service_networking_connection" "vpc_private_vpc_connection" {
      + id                      = (known after apply)
      + network                 = (known after apply)
      + peering                 = (known after apply)
      + reserved_peering_ranges = [
          + "vpc-private-ip-gke",
        ]
      + service                 = "servicenetworking.googleapis.com"
    }

Plan: 12 to add, 0 to change, 0 to destroy.
section_end:1644591725:step_script
section_start:1644591725:archive_cache
Saving cache for successful job
Creating cache elastic...
/builds/bejean-developpement/infraascode/elasticcloudwithgcp/manifests/elastic/.terraform: found 12 matching files and directories 
Archive is up to date!                             
Created cache
Creating cache gke...
/builds/bejean-developpement/infraascode/elasticcloudwithgcp/manifests/gke/.terraform: found 9 matching files and directories 
No URL provided, cache will be not uploaded to shared cache server. Cache will be stored only locally. 
Created cache
section_end:1644591729:archive_cache
section_start:1644591729:upload_artifacts_on_success
Uploading artifacts for successful job
Uploading artifacts...
/builds/bejean-developpement/infraascode/elasticcloudwithgcp/manifests/gke/plan.cache: found 1 matching files and directories 
Uploading artifacts as "archive" to coordinator... ok  id=28174 responseStatus=201 Created token=3a1xtUfB
Uploading artifacts...
/builds/bejean-developpement/infraascode/elasticcloudwithgcp/manifests/gke/plan.json: found 1 matching files and directories 
Uploading artifacts as "terraform" to coordinator... ok  id=28174 responseStatus=201 Created token=3a1xtUfB
section_end:1644591732:upload_artifacts_on_success
section_start:1644591732:cleanup_file_variables
Cleaning up file based variables
section_end:1644591732:cleanup_file_variables
Job succeeded