GSA-TTS / continuous-assessment-poc

Assessment results proof of concept
https://continuous_monitoring-staging.app.cloud.gov
Other
2 stars 0 forks source link

Initial deploy #1

Closed rahearn closed 1 week ago

github-actions[bot] commented 1 week ago

Terraform plan in terraform/staging

Plan: 2 to add, 0 to change, 0 to destroy. ```diff Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # module.database.cloudfoundry_service_instance.rds will be created + resource "cloudfoundry_service_instance" "rds" { + id = (known after apply) + name = "continuous_monitoring-rds-staging" + replace_on_params_change = false + replace_on_service_plan_change = false + service_plan = "5ed9f319-4c75-4851-9885-598a96b7febc" + space = "7137716e-43e5-4d59-8234-599ecaf58a6e" + tags = [] } # module.redis.cloudfoundry_service_instance.redis will be created + resource "cloudfoundry_service_instance" "redis" { + id = (known after apply) + name = "continuous_monitoring-redis-staging" + replace_on_params_change = false + replace_on_service_plan_change = false + service_plan = "39e035d8-f847-4bf5-a2ee-521c3118cc42" + space = "7137716e-43e5-4d59-8234-599ecaf58a6e" + tags = [] } Plan: 2 to add, 0 to change, 0 to destroy. ```

:white_check_mark: Plan applied in Deploy Staging #2

github-advanced-security[bot] commented 1 week ago

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.