Coder Social home page Coder Social logo

Comments (4)

Mongey avatar Mongey commented on August 20, 2024

This should work.
I haven't tested it myself, but, I don't see why it wouldn't. The acceptance tests in CI for this repo are using the ca_cert = "${file(blah)}" which would suggest that passing in a raw string should be fine.
can you post some logs? TF_DEBUG=1 terraform plan

from terraform-provider-kafka.

lorddaren avatar lorddaren commented on August 20, 2024

I am not sure how much of the log you needed so I tried to find the most relevant information.

019/12/09 07:01:30 [TRACE] EvalWriteState: writing current state object for vault_pki_secret_backend_cert.ca
2019/12/09 07:01:30 [TRACE] <root>: eval: *terraform.EvalWriteDiff
2019/12/09 07:01:30 [TRACE] EvalWriteDiff: recorded Create change for vault_pki_secret_backend_cert.ca
2019/12/09 07:01:30 [TRACE] dag/walk: visiting "provider.kafka"
2019/12/09 07:01:30 [TRACE] vertex "provider.kafka": starting visit (*terraform.NodeApplyableProvider)
2019/12/09 07:01:30 [TRACE] vertex "provider.kafka": evaluating
2019/12/09 07:01:30 [TRACE] [walkPlan] Entering eval tree: provider.kafka
2019/12/09 07:01:30 [TRACE] <root>: eval: *terraform.EvalSequence
2019/12/09 07:01:30 [TRACE] <root>: eval: *terraform.EvalInitProvider
2019/12/09 07:01:30 [TRACE] dag/walk: visiting "provider.vault (close)"
2019/12/09 07:01:30 [TRACE] vertex "provider.vault (close)": starting visit (*terraform.graphNodeCloseProvider)
2019/12/09 07:01:30 [TRACE] vertex "provider.vault (close)": evaluating
2019/12/09 07:01:30 [TRACE] [walkPlan] Entering eval tree: provider.vault (close)
2019/12/09 07:01:30 [TRACE] <root>: eval: *terraform.EvalCloseProvider
2019-12-09T07:01:30.172-0700 [INFO]  plugin: configuring client automatic mTLS
2019-12-09T07:01:30.208-0700 [DEBUG] plugin: starting plugin: path=/Users/user/.terraform.d/plugins/darwin_amd64/terraform-provider-kafka args=[/Users/user/.terraform.d/plugins/darwin_amd64/terraform-provider-kafka]
2019-12-09T07:01:30.214-0700 [DEBUG] plugin: plugin started: path=/Users/user/.terraform.d/plugins/darwin_amd64/terraform-provider-kafka pid=19543
2019-12-09T07:01:30.214-0700 [DEBUG] plugin: waiting for RPC address: path=/Users/user/.terraform.d/plugins/darwin_amd64/terraform-provider-kafka
2019-12-09T07:01:30.234-0700 [INFO]  plugin.terraform-provider-kafka: configuring server automatic mTLS: timestamp=2019-12-09T07:01:30.234-0700
2019-12-09T07:01:30.268-0700 [DEBUG] plugin.terraform-provider-kafka: plugin address: address=/var/folders/24/9s0qhkd15bjgvm39ww5j0wph8j742y/T/plugin279087282 network=unix timestamp=2019-12-09T07:01:30.268-0700
2019-12-09T07:01:30.268-0700 [DEBUG] plugin: using plugin: version=5
2019/12/09 07:01:30 [TRACE] BuiltinEvalContext: Initialized "kafka" provider for provider.kafka
2019/12/09 07:01:30 [TRACE] <root>: eval: terraform.EvalNoop
2019/12/09 07:01:30 [TRACE] <root>: eval: terraform.EvalNoop
2019/12/09 07:01:30 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/12/09 07:01:30 [TRACE] <root>: eval: *terraform.EvalSequence
2019/12/09 07:01:30 [TRACE] <root>: eval: *terraform.EvalGetProvider
2019/12/09 07:01:30 [TRACE] GRPCProvider: Close
2019-12-09T07:01:30.272-0700 [DEBUG] plugin: plugin process exited: path=/Users/user/Repos/work/terraform/pc/kafka/publisher/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.6.0_x4 pid=19537
2019-12-09T07:01:30.272-0700 [DEBUG] plugin: plugin exited
2019/12/09 07:01:30 [TRACE] [walkPlan] Exiting eval tree: provider.vault (close)
2019/12/09 07:01:30 [TRACE] vertex "provider.vault (close)": visit complete
2019/12/09 07:01:30 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/12/09 07:01:30 [TRACE] <root>: eval: *terraform.EvalSequence
2019/12/09 07:01:30 [TRACE] <root>: eval: *terraform.EvalConfigProvider
2019/12/09 07:01:30 [TRACE] buildProviderConfig for provider.kafka: using explicit config only
2019/12/09 07:01:30 [TRACE] GRPCProvider: GetSchema
2019/12/09 07:01:30 [TRACE] GRPCProvider: Configure
2019-12-09T07:01:30.331-0700 [DEBUG] plugin.terraform-provider-kafka: 2019/12/09 07:01:30 [DEBUG] configuring provider with Brokers @ &[kafka01.test.ostk.com:9093 kafka02.test.ostk.com:9093 kafka03.test.ostk.com]
2019-12-09T07:01:30.331-0700 [DEBUG] plugin.terraform-provider-kafka: 2019/12/09 07:01:30 [DEBUG] CA Cert:
2019-12-09T07:01:30.331-0700 [DEBUG] plugin.terraform-provider-kafka: 2019/12/09 07:01:30 
2019-12-09T07:01:30.331-0700 [DEBUG] plugin.terraform-provider-kafka: 2019/12/09 07:01:30 
2019-12-09T07:01:30.331-0700 [DEBUG] plugin.terraform-provider-kafka: 2019/12/09 07:01:30 
2019-12-09T07:01:30.331-0700 [DEBUG] plugin.terraform-provider-kafka: 2019/12/09 07:01:30 [DEBUG] Config @ &{0xc00000eb00 120    true true   plain}
2019-12-09T07:01:30.331-0700 [DEBUG] plugin.terraform-provider-kafka: 2019/12/09 07:01:30 [INFO] configuring bootstrap_servers &{0xc00000eb00 120    true true   plain}
2019-12-09T07:01:30.331-0700 [DEBUG] plugin.terraform-provider-kafka: 2019/12/09 07:01:30 [WARN] skipping TLS client config
2019-12-09T07:01:30.331-0700 [DEBUG] plugin.terraform-provider-kafka: 2019/12/09 07:01:30 [WARN] no CA file set skipping
2019/12/09 07:01:31 [ERR] Checkpoint error: Get https://checkpoint-api.hashicorp.com/v1/check/terraform?arch=amd64&os=darwin&signature=046d6602-aefe-a5fc-4e76-1e0c84663f5f&version=0.12.16: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)
2019-12-09T07:01:31.202-0700 [DEBUG] plugin.terraform-provider-kafka: 2019/12/09 07:01:31 [ERROR] Error connecting to kafka kafka: client has run out of available brokers to talk to (Is your cluster reachable?)

from terraform-provider-kafka.

lorddaren avatar lorddaren commented on August 20, 2024

Here are some more logs on a terraform version 0.11.7

vault_pki_secret_backend_cert.stackstorm - *terraform.NodeValidatableResourceInstance
2019/12/09 07:14:33 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend_cert.stackstorm"
2019/12/09 07:14:33 [TRACE] dag/walk: walking "vault_pki_secret_backend_cert.stackstorm"
2019/12/09 07:14:33 [TRACE] vertex 'root.vault_pki_secret_backend_cert.stackstorm': walking
2019/12/09 07:14:33 [TRACE] vertex 'root.vault_pki_secret_backend_cert.stackstorm': evaluating
2019/12/09 07:14:33 [TRACE] [walkValidate] Entering eval tree: vault_pki_secret_backend_cert.stackstorm
2019/12/09 07:14:33 [TRACE] root: eval: *terraform.EvalSequence
2019/12/09 07:14:33 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/12/09 07:14:33 [TRACE] root: eval: *terraform.EvalGetProvider
2019/12/09 07:14:33 [TRACE] root: eval: *terraform.EvalInterpolate
2019/12/09 07:14:33 [TRACE] root: eval: *terraform.EvalValidateResource
2019/12/09 07:14:33 [ERROR] root: eval: *terraform.EvalValidateProvider, err: Warnings: ["ca_cert_file": [DEPRECATED] This parameter is now deprecated and will be removed in a later release, please use `ca_cert` instead. "client_cert_file": [DEPRECATED] This parameter is now deprecated and will be removed in a later release, please use `client_cert` instead. "client_key_file": [DEPRECATED] This parameter is now deprecated and will be removed in a later release, please use `client_key` instead.]. Errors: []
2019/12/09 07:14:33 [ERROR] root: eval: *terraform.EvalSequence, err: Warnings: ["ca_cert_file": [DEPRECATED] This parameter is now deprecated and will be removed in a later release, please use `ca_cert` instead. "client_cert_file": [DEPRECATED] This parameter is now deprecated and will be removed in a later release, please use `client_cert` instead. "client_key_file": [DEPRECATED] This parameter is now deprecated and will be removed in a later release, please use `client_key` instead.]. Errors: []
2019/12/09 07:14:33 [ERROR] root: eval: *terraform.EvalOpFilter, err: Warnings: ["ca_cert_file": [DEPRECATED] This parameter is now deprecated and will be removed in a later release, please use `ca_cert` instead. "client_cert_file": [DEPRECATED] This parameter is now deprecated and will be removed in a later release, please use `client_cert` instead. "client_key_file": [DEPRECATED] This parameter is now deprecated and will be removed in a later release, please use `client_key` instead.]. Errors: []
2019/12/09 07:14:33 [ERROR] root: eval: *terraform.EvalSequence, err: Warnings: ["ca_cert_file": [DEPRECATED] This parameter is now deprecated and will be removed in a later release, please use `ca_cert` instead. "client_cert_file": [DEPRECATED] This parameter is now deprecated and will be removed in a later release, please use `client_cert` instead. "client_key_file": [DEPRECATED] This parameter is now deprecated and will be removed in a later release, please use `client_key` instead.]. Errors: []
2019/12/09 07:14:33 [TRACE] [walkValidate] Exiting eval tree: provider.kafka

ation_name" references: []
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "var.replication_factor" references: []
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "var.topic" references: []
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "var.producer" references: []
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "var.vault_base" references: []
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "var.bootstrap_servers" references: []
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "var.partitions" references: []
2019/12/09 07:14:33 [TRACE] Graph after step *terraform.ReferenceTransformer:

var.application_name - *terraform.NodeRootVariable
var.bootstrap_servers - *terraform.NodeRootVariable
var.partitions - *terraform.NodeRootVariable
var.producer - *terraform.NodeRootVariable
var.replication_factor - *terraform.NodeRootVariable
var.topic - *terraform.NodeRootVariable
var.vault_backend - *terraform.NodeRootVariable
var.vault_base - *terraform.NodeRootVariable
var.vault_token - *terraform.NodeRootVariable
2019/12/09 07:14:33 [TRACE] Graph after step *terraform.TargetsTransformer:

var.application_name - *terraform.NodeRootVariable
var.bootstrap_servers - *terraform.NodeRootVariable
var.partitions - *terraform.NodeRootVariable
var.producer - *terraform.NodeRootVariable
var.replication_factor - *terraform.NodeRootVariable
var.topic - *terraform.NodeRootVariable
var.vault_backend - *terraform.NodeRootVariable
var.vault_base - *terraform.NodeRootVariable
var.vault_token - *terraform.NodeRootVariable
2019/12/09 07:14:33 [TRACE] Graph after step *terraform.CloseProviderTransformer:

var.application_name - *terraform.NodeRootVariable
var.bootstrap_servers - *terraform.NodeRootVariable
var.partitions - *terraform.NodeRootVariable
var.producer - *terraform.NodeRootVariable
var.replication_factor - *terraform.NodeRootVariable
var.topic - *terraform.NodeRootVariable
var.vault_backend - *terraform.NodeRootVariable
var.vault_base - *terraform.NodeRootVariable
var.vault_token - *terraform.NodeRootVariable
2019/12/09 072019/12/09 07:14:33 [DEBUG] Resource state not found for "vault_pki_secret_backend_cert.stackstorm": vault_pki_secret_backend_cert.stackstorm
2019/12/09 07:14:33 [DEBUG] Resource state not found for "kafka_topic.app": kafka_topic.app
2019/12/09 07:14:33 [TRACE] Graph after step *terraform.AttachStateTransformer:

kafka_topic.app - *terraform.NodePlannableResource
vault_pki_secret_backend_cert.stackstorm - *terraform.NodePlannableResource
Warning: provider.kafka: "ca_cert_file": [DEPRECATED] This parameter is now deprecated and will be removed in a later release, please use `ca_cert` instead.



2019/12/09 07:14:33 [DEBUG] resource vault_pki_secret_backend_cert.stackstorm using provider provider.vault
2019/12/09 07:14:33 [DEBUG] resource kafka_topic.app using provider provider.kafka
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "kafka_topic.app" references: [var.partitions var.replication_factor var.topic]
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "var.bootstrap_servers" references: []
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "var.replication_factor" references: []
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "var.partitions" references: []
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "var.topic" references: []
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "var.producer" references: []
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_token var.vault_base]
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.stackstorm" references: [var.vault_backend]
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "var.vault_base" references: []
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "var.vault_token" references: []
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "var.vault_backend" references: []
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "var.application_name" references: []
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "provider.kafka" references: [vault_pki_secret_backend_cert.stackstorm vault_pki_secret_backend_cert.stackstorm var.bootstrap_servers vault_pki_secret_backend_cert.stackstorm]
Warning: provider.kafka: "client_cert_file": [DEPRECATED] This parameter is now deprecated and will be removed in a later release, please use `client_cert` instead.



vault_backend - *terraform.NodeRootVariable
var.vault_base - *terraform.NodeRootVariable
var.vault_token - *terraform.NodeRootVariable
vault_pki_secret_backend_cert.stackstorm - *terraform.NodePlannableResource
  provider.vault - *terraform.NodeApplyableProvider
  var.vault_backend - *terraform.NodeRootVariable
Warning: provider.kafka: "client_key_file": [DEPRECATED] This parameter is now deprecated and will be removed in a later release, please use `client_key` instead.

ar.vault_backend - *terraform.NodeRootVariable
var.vault_base - *terraform.NodeRootVariable
var.vault_token - *terraform.NodeRootVariable
vault_pki_secret_backend_cert.stackstorm - *terraform.NodePlannableResource
  provider.vault - *terraform.NodeApplyableProvider
  var.vault_backend - *terraform.NodeRootVariable


Refreshing Terraform state in-memory prior to plan...
vers - *terraform.NodeRootVariable
var.partitions - *terraform.NodeRootVariable
var.producer - *terraform.NodeRootVariable
var.replication_factor - *terraform.NodeRootVariable
var.topic - *terraform.NodeRootVariable
var.vault_backend - *terraform.NodeRootVariable
var.vault_base - *terraform.NodeRootVariable
var.vault_token - *terraform.NodeRootVariable
vault_pki_secret_backend_cert.stackstorm - *terraform.NodePlannableResource
  provider.vault - *terraform.NodeApplyableProvider
  var.vault_backend - *terraform.NodeRootVariable
The refreshed state will be used to calculate this plan, but will not be
persisted to local or remote state storage.


------------------------------------------------------------------------
2019-12-09T07:14:33.922-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: 2019/12/09 07:14:33 [DEBUG] Vault API Request Details:
2019-12-09T07:14:33.922-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: ---[ REQUEST ]---------------------------------------
2019-12-09T07:14:33.922-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: GET /v1/auth/token/lookup-self HTTP/1.1
2019-12-09T07:14:33.922-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: Host: 127.0.0.1:8200
2019-12-09T07:14:33.922-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: User-Agent: Go-http-client/1.1
2019-12-09T07:14:33.922-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: X-Vault-Token: <token>
2019-12-09T07:14:33.922-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: Accept-Encoding: gzip
2019-12-09T07:14:33.922-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:
2019-12-09T07:14:33.922-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:
2019-12-09T07:14:33.922-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: -----------------------------------------------------
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: 2019/12/09 07:14:33 [DEBUG] Vault API Response Details:
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: ---[ RESPONSE ]--------------------------------------
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: HTTP/1.1 200 OK
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: Content-Length: 483
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: Cache-Control: no-store
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: Content-Type: application/json
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: Date: Mon, 09 Dec 2019 14:14:33 GMT
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: X-Cache: MISS
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: {
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:  "request_id": "c4809569-dab6-4a28-ce86-d91d59b2fc80",
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:  "lease_id": "",
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:  "renewable": false,
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:  "lease_duration": 0,
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:  "data": {
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   "accessor": "031183a3-7dce-78d5-2b01-dedcfbe139a4",
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   "creation_time": 1502127331,
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   "creation_ttl": 0,
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   "display_name": "root",
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   "entity_id": "",
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   "expire_time": null,
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   "explicit_max_ttl": 0,
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   "id": "9385018b-f44f-a483-06eb-3b90cb8dbdfd",
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   "meta": null,
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   "num_uses": 0,
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   "orphan": true,
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   "path": "auth/token/root",
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   "policies": [
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:    "root"
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   ],
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   "ttl": 0,
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:   "type": "service"
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:  },
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:  "wrap_info": null,
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:  "warnings": null,
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:  "auth": null
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: }
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4:
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: -----------------------------------------------------
2019-12-09T07:14:33.941-0700 [DEBUG] plugin.terraform-provider-vault_v2.4.0_x4: 2019/12/09 07:14:33 [INFO] Using Vault token with the following policies: %!s(bool=true)
2019/12/09 07:14:33 [DEBUG] Resource state not found for "vault_pki_secret_backend_cert.stackstorm": vault_pki_secret_backend_cert.stackstorm
2019/12/09 07:14:33 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.stackstorm" references: []
2019-12-09T07:14:33.948-0700 [DEBUG] plugin.terraform-provider-kafka: 2019/12/09 07:14:33 [DEBUG] configuring provider with Brokers @ &[kafka01.test.ostk.com:9093 kafka02.test.ostk.com:9093 kafka03.test.ostk.com]
2019-12-09T07:14:33.948-0700 [DEBUG] plugin.terraform-provider-kafka: 2019/12/09 07:14:33 [DEBUG] Config @ &{0xc0002e57c0 120    true true   plain}
2019-12-09T07:14:33.948-0700 [DEBUG] plugin.terraform-provider-kafka: 2019/12/09 07:14:33 [INFO] configuring bootstrap_servers &{0xc0002e57c0 120    true true   plain}
2019-12-09T07:14:33.948-0700 [DEBUG] plugin.terraform-provider-kafka: 2019/12/09 07:14:33 [WARN] skipping TLS client config
2019-12-09T07:14:33.948-0700 [DEBUG] plugin.terraform-provider-kafka: 2019/12/09 07:14:33 [WARN] no CA file set skipping
2019/12/09 07:14:34 [ERROR] root: eval: *terraform.EvalConfigProvider, err: kafka: client has run out of available brokers to talk to (Is your cluster reachable?)

I noticed it complained about the deprecated pattern but I am not using the _file vault for the Kafka provider as noted in the original post.

from terraform-provider-kafka.

Mongey avatar Mongey commented on August 20, 2024

Can you try the latest version on master? I think some cleanup from #88 might have fixed this.

from terraform-provider-kafka.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.