Altinn / altinn-platform

Altinn Platform infrastructure
7 stars 1 forks source link

iac test central monitoring #1010

Closed bengtfredh closed 1 month ago

bengtfredh commented 1 month ago

Description

Related Issue(s)

Verification

github-actions[bot] commented 1 month ago

Terraform environment prod

Format and Style 🖌success

Initialization ⚙️success

Validation 🤖success

Validation Output ``` Success! The configuration is valid. ```

Plan 📖success

Show Plan ``` [Lines containing Refreshing state removed] [Maybe further truncated see logs for complete plan output] Acquiring state lock. This may take a few moments... data.azuread_application_published_app_ids.well_known: Reading... data.azuread_application_published_app_ids.well_known: Read complete after 0s [id=appIds] data.azuread_client_config.current: Reading... data.azuread_client_config.current: Read complete after 0s [id=cd0026d8-283b-4a55-9bfa-d0ef4a8ba21c-f03f7579-5f39-4d7f-bcea-8e5cb6d7aca4-02b17d28-7ec8-4084-92ce-d26051fa4998] data.azuread_service_principal.msgraph: Reading... data.azuread_directory_object.current: Reading... data.azuread_directory_object.current: Read complete after 0s [id=02b17d28-7ec8-4084-92ce-d26051fa4998] data.azuread_service_principal.msgraph: Read complete after 1s [id=b9d7b3d8-a063-4e34-89d9-15db56e22d42] data.azuread_service_principal.current[0]: Reading... data.azuread_service_principal.current[0]: Read complete after 0s [id=02b17d28-7ec8-4084-92ce-d26051fa4998] data.azurerm_role_definition.storage_blob_data_owner: Reading... data.azurerm_role_definition.reader: Reading... data.azurerm_role_definition.contributor: Reading... data.azurerm_resource_group.tfstate: Reading... data.azurerm_role_definition.storage_blob_reader_data_access: Reading... data.azurerm_subscription.current: Reading... data.azurerm_role_definition.storage_blob_data_owner: Read complete after 0s [id=/providers/Microsoft.Authorization/roleDefinitions/b7e6dc6d-f1e8-4753-8033-0f276bb0955b] data.azurerm_role_definition.user_access_administrator: Reading... data.azurerm_role_definition.contributor: Read complete after 0s [id=/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c] data.azurerm_role_definition.reader: Read complete after 0s [id=/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7] data.azurerm_role_definition.user_access_administrator: Read complete after 0s [id=/providers/Microsoft.Authorization/roleDefinitions/18d7d88d-d35e-4fb5-a5c3-7773c20a72d9] data.azurerm_subscription.current: Read complete after 0s [id=/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2] data.azurerm_role_definition.storage_blob_reader_data_access: Read complete after 0s [id=/providers/Microsoft.Authorization/roleDefinitions/c12c1c16-33a1-487b-954d-41c89c60f349] data.azurerm_resource_group.tfstate: Read complete after 1s [id=/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/resourceGroups/terraform-rg] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create ~ update in-place Terraform will perform the following actions: # azuread_application.reader will be updated in-place ~ resource "azuread_application" "reader" { id = "/applications/f2259af8-0975-4e83-925f-3ccdf18da571" tags = [] # (26 unchanged attributes hidden) - required_resource_access { - resource_app_id = "00000003-0000-0000-c000-000000000000" -> null - resource_access { - id = "9a5d68dd-52b0-4cc2-bd40-abcf44ac3a30" -> null - type = "Role" -> null } - resource_access { - id = "5b567255-7703-4780-807c-7be8301ae99b" -> null - type = "Role" -> null } } # (6 unchanged blocks hidden) } # azuread_application_api_access.example_msgraph will be created + resource "azuread_application_api_access" "example_msgraph" { + api_client_id = "00000003-0000-0000-c000-000000000000" + application_id = "/applications/005b1c70-6fa7-4205-9fa1-8b7a53713238" + id = (known after apply) + role_ids = [ + "1bfefb4e-e0b5-418b-a88f-73c46d2cc8e9", + "62a82d76-70ea-41e2-9197-370581804d09", ] } # azurerm_app_configuration.state will be updated in-place ~ resource "azurerm_app_configuration" "state" { id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/resourceGroups/terraform-rg/providers/Microsoft.AppConfiguration/configurationStores/altinnterraformappconf02" name = "altinnterraformappconf02" ~ tags = { - "costcenter" = "altinn3" - "createdAt" = "09-07-2024 09:55:43 UTC" - "createdBy" = "Bengt Rino Fredh" - "modifiedAt" = "15-10-2024 06:57:23 UTC" - "modifiedBy" = "GitHub: Altinn/altinn-platform - Reader" - "repository" = "github.com/Altinn/altinn-platform" - "solution" = "platform" } -> (known after apply) # (12 unchanged attributes hidden) } # azurerm_storage_account.backend will be updated in-place ~ resource "azurerm_storage_account" "backend" { id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/resourceGroups/terraform-rg/providers/Microsoft.Storage/storageAccounts/altinnterraformstorage02" name = "altinnterraformstorage02" ~ tags = { - "costcenter" = "altinn3" - "createdAt" = "09-07-2024 09:55:43 UTC" - "createdBy" = "Bengt Rino Fredh" - "modifiedAt" = "15-10-2024 06:57:23 UTC" - "modifiedBy" = "GitHub: Altinn/altinn-platform - Reader" - "repository" = "github.com/Altinn/altinn-platform" - "solution" = "platform" } -> (known after apply) # (96 unchanged attributes hidden) # (1 unchanged block hidden) } Plan: 1 to add, 3 to change, 0 to destroy. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: tfplan.out To perform exactly these actions, run the following command to apply: terraform apply "tfplan.out" Releasing state lock. This may take a few moments... ```
Context Values
Pusher @bengtfredh
Action pull_request
Working Directory ./infrastructure/products
State File github.com/altinn/altinn-platform/environments/prod/products.tfstate
Plan File github.com_altinn_altinn-platform_environments_prod_products.tfstate.tfplan
github-actions[bot] commented 1 month ago

Terraform environment dev

Format and Style 🖌success

Initialization ⚙️success

Validation 🤖success

Validation Output ``` Success! The configuration is valid. ```

Plan 📖success

Show Plan ``` [Lines containing Refreshing state removed] [Maybe further truncated see logs for complete plan output] Acquiring state lock. This may take a few moments... data.azurerm_client_config.current: Reading... data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1mMDNmNzU3OS01ZjM5LTRkN2YtYmNlYS04ZTVjYjZkN2FjYTQ7b2JqZWN0SWQ9MDJiMTdkMjgtN2VjOC00MDg0LTkyY2UtZDI2MDUxZmE0OTk4O3N1YnNjcmlwdGlvbklkPTFjZThlOWFmLWMyZDYtNDRlNy05YzVlLTA5OWEzMDgwNTZmZTt0ZW5hbnRJZD1jZDAwMjZkOC0yODNiLTRhNTUtOWJmYS1kMGVmNGE4YmEyMWM=] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # azurerm_role_assignment.tf_grafana_admin will be created + resource "azurerm_role_assignment" "tf_grafana_admin" { + id = (known after apply) + name = (known after apply) + principal_id = "02b17d28-7ec8-4084-92ce-d26051fa4998" + principal_type = (known after apply) + role_definition_id = (known after apply) + role_definition_name = "Grafana Admin" + scope = "/subscriptions/1ce8e9af-c2d6-44e7-9c5e-099a308056fe/resourceGroups/altinn-monitor-test-rg/providers/Microsoft.Dashboard/grafana/altinn-grafana-test" + skip_service_principal_aad_check = true } Plan: 1 to add, 0 to change, 0 to destroy. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: tfplan.out To perform exactly these actions, run the following command to apply: terraform apply "tfplan.out" Releasing state lock. This may take a few moments... ```
Context Values
Pusher @bengtfredh
Action pull_request
Working Directory ./infrastructure/adminservices-test/altinn-monitor-test-rg
State File github.com/altinn/altinn-platform/environments/dev/altinn-monitor-test-rg.tfstate
Plan File github.com_altinn_altinn-platform_environments_dev_altinn-monitor-test-rg.tfstate.tfplan
github-actions[bot] commented 1 month ago

Terraform environment test

Format and Style 🖌success

Initialization ⚙️success

Validation 🤖success

Validation Output ``` Success! The configuration is valid. ```

Plan 📖success

Show Plan ``` [Lines containing Refreshing state removed] [Maybe further truncated see logs for complete plan output] Acquiring state lock. This may take a few moments... data.azurerm_client_config.current: Reading... data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1mMDNmNzU3OS01ZjM5LTRkN2YtYmNlYS04ZTVjYjZkN2FjYTQ7b2JqZWN0SWQ9MDJiMTdkMjgtN2VjOC00MDg0LTkyY2UtZDI2MDUxZmE0OTk4O3N1YnNjcmlwdGlvbklkPTFjZThlOWFmLWMyZDYtNDRlNy05YzVlLTA5OWEzMDgwNTZmZTt0ZW5hbnRJZD1jZDAwMjZkOC0yODNiLTRhNTUtOWJmYS1kMGVmNGE4YmEyMWM=] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # azurerm_role_assignment.tf_grafana_admin will be created + resource "azurerm_role_assignment" "tf_grafana_admin" { + id = (known after apply) + name = (known after apply) + principal_id = "02b17d28-7ec8-4084-92ce-d26051fa4998" + principal_type = (known after apply) + role_definition_id = (known after apply) + role_definition_name = "Grafana Admin" + scope = "/subscriptions/1ce8e9af-c2d6-44e7-9c5e-099a308056fe/resourceGroups/altinn-monitor-test-rg/providers/Microsoft.Dashboard/grafana/altinn-grafana-test" + skip_service_principal_aad_check = true } Plan: 1 to add, 0 to change, 0 to destroy. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: tfplan.out To perform exactly these actions, run the following command to apply: terraform apply "tfplan.out" Releasing state lock. This may take a few moments... ```
Context Values
Pusher @bengtfredh
Action push
Working Directory ./infrastructure/adminservices-test/altinn-monitor-test-rg
State File github.com/altinn/altinn-platform/environments/test/altinn-monitor-test-rg.tfstate
Plan File github.com_altinn_altinn-platform_environments_test_altinn-monitor-test-rg.tfstate.tfplan