Closed jasonpaige closed 1 week ago
This plan contains resource delete operation. Please check the plan result very carefully!
Plan: 8 to add, 2 to change, 4 to destroy.
Plan: 3 to add, 2 to change, 0 to destroy.
Plan Result (aat)
:warning: Resource Deletion will happen
This plan contains resource delete operation. Please check the plan result very carefully!
Change Result (Click me)
```hcl # azurerm_dashboard_grafana.dashboard-grafana10[0] will be created + resource "azurerm_dashboard_grafana" "dashboard-grafana10" { + api_key_enabled = true + auto_generated_domain_name_label_scope = "TenantReuse" + deterministic_outbound_ip_enabled = true + endpoint = (known after apply) + grafana_major_version = "10" + grafana_version = (known after apply) + id = (known after apply) + location = "uksouth" + name = "dtsse-grafana10-aat" + outbound_ip = (known after apply) + public_network_access_enabled = true + resource_group_name = "dtsse-aat" + sku = "Standard" + tags = { + "application" = "core" + "autoShutdown" = "true" + "builtFrom" = "https://github.com/HMCTS/dtsse-shared-infrastructure.git" + "businessArea" = "CFT" + "contactSlackChannel" = "#reform-swe" + "environment" = "staging" + "managedBy" = "DTS Software Engineering" } + zone_redundancy_enabled = true + identity { + principal_id = (known after apply) + tenant_id = (known after apply) + type = "SystemAssigned" } } # module.alert-action-group.azurerm_resource_group_template_deployment.action-group will be updated in-place ~ resource "azurerm_resource_group_template_deployment" "action-group" { id = "/subscriptions/1c4f0704-a29e-403d-b719-b90c34ef14c9/resourceGroups/dtsse-aat/providers/Microsoft.Resources/deployments/DTSSE_Alert" name = "DTSSE_Alert" tags = {} ~ template_content = jsonencode( ~ { ~ outputs = { ~ actionGroupId = { ~ type = "String" -> "string" # (1 unchanged attribute hidden) } } ~ parameters = { ~ actionGroupName = { ~ type = "String" -> "string" } ~ emailReceiverAddress = { ~ type = "String" -> "string" # (1 unchanged attribute hidden) } ~ emailReceiverName = { ~ type = "String" -> "string" # (1 unchanged attribute hidden) } ~ location = { ~ type = "String" -> "string" # (1 unchanged attribute hidden) } ~ shortName = { ~ type = "String" -> "string" } } # (3 unchanged attributes hidden) } ) # (6 unchanged attributes hidden) } # module.postgresql[0].data.azuread_group.db_admin will be read during apply # (depends on a resource or a module with changes pending) <= data "azuread_group" "db_admin" { + assignable_to_role = (known after apply) + auto_subscribe_new_members = (known after apply) + behaviors = (known after apply) + description = (known after apply) + display_name = "DTS Platform Operations" + dynamic_membership = (known after apply) + external_senders_allowed = (known after apply) + hide_from_address_lists = (known after apply) + hide_from_outlook_clients = (known after apply) + id = (known after apply) + mail = (known after apply) + mail_enabled = (known after apply) + mail_nickname = (known after apply) + members = (known after apply) + object_id = (known after apply) + onpremises_domain_name = (known after apply) + onpremises_group_type = (known after apply) + onpremises_netbios_name = (known after apply) + onpremises_sam_account_name = (known after apply) + onpremises_security_identifier = (known after apply) + onpremises_sync_enabled = (known after apply) + owners = (known after apply) + preferred_language = (known after apply) + provisioning_options = (known after apply) + proxy_addresses = (known after apply) + security_enabled = true + theme = (known after apply) + types = (known after apply) + visibility = (known after apply) + writeback_enabled = (known after apply) } # module.postgresql[0].data.azuread_service_principal.mi_name[0] will be read during apply # (depends on a resource or a module with changes pending) <= data "azuread_service_principal" "mi_name" { + account_enabled = (known after apply) + alternative_names = (known after apply) + app_role_assignment_required = (known after apply) + app_role_ids = (known after apply) + app_roles = (known after apply) + application_id = (known after apply) + application_tenant_id = (known after apply) + client_id = (known after apply) + description = (known after apply) + display_name = (known after apply) + feature_tags = (known after apply) + features = (known after apply) + homepage_url = (known after apply) + id = (known after apply) + login_url = (known after apply) + logout_url = (known after apply) + notes = (known after apply) + notification_email_addresses = (known after apply) + oauth2_permission_scope_ids = (known after apply) + oauth2_permission_scopes = (known after apply) + object_id = "ca6d5085-485a-417d-8480-c3cefa29df31" + preferred_single_sign_on_mode = (known after apply) + redirect_uris = (known after apply) + saml_metadata_url = (known after apply) + saml_single_sign_on = (known after apply) + service_principal_names = (known after apply) + sign_in_audience = (known after apply) + tags = (known after apply) + type = (known after apply) } # module.postgresql[0].data.azurerm_client_config.current will be read during apply # (depends on a resource or a module with changes pending) <= data "azurerm_client_config" "current" { + client_id = (known after apply) + id = (known after apply) + object_id = (known after apply) + subscription_id = (known after apply) + tenant_id = (known after apply) } # module.postgresql[0].data.azurerm_subnet.pg_subnet[0] will be read during apply # (depends on a resource or a module with changes pending) <= data "azurerm_subnet" "pg_subnet" { + address_prefix = (known after apply) + address_prefixes = (known after apply) + default_outbound_access_enabled = (known after apply) + enforce_private_link_endpoint_network_policies = (known after apply) + enforce_private_link_service_network_policies = (known after apply) + id = (known after apply) + name = "postgresql" + network_security_group_id = (known after apply) + private_endpoint_network_policies = (known after apply) + private_endpoint_network_policies_enabled = (known after apply) + private_link_service_network_policies_enabled = (known after apply) + resource_group_name = "cft-aat-network-rg" + route_table_id = (known after apply) + service_endpoints = (known after apply) + virtual_network_name = "cft-aat-vnet" } # module.postgresql[0].data.azurerm_subscription.current will be read during apply # (depends on a resource or a module with changes pending) <= data "azurerm_subscription" "current" { + display_name = (known after apply) + id = (known after apply) + location_placement_id = (known after apply) + quota_id = (known after apply) + spending_limit = (known after apply) + state = (known after apply) + subscription_id = (known after apply) + tags = (known after apply) + tenant_id = (known after apply) } # module.postgresql[0].azurerm_postgresql_flexible_server.pgsql_server will be updated in-place ~ resource "azurerm_postgresql_flexible_server" "pgsql_server" { id = "/subscriptions/1c4f0704-a29e-403d-b719-b90c34ef14c9/resourceGroups/dtsse-dashboard-flexdb-data-aat/providers/Microsoft.DBforPostgreSQL/flexibleServers/dtsse-dashboard-flexdb-aat" name = "dtsse-dashboard-flexdb-aat" tags = { "application" = "core" "autoShutdown" = "true" "builtFrom" = "https://github.com/HMCTS/dtsse-shared-infrastructure.git" "businessArea" = "CFT" "contactSlackChannel" = "#reform-swe" "environment" = "staging" "managedBy" = "DTS Software Engineering" } # (17 unchanged attributes hidden) ~ authentication { ~ tenant_id = "531ff96d-0ae9-462a-8d2d-bec7c0b42082" -> (known after apply) # (2 unchanged attributes hidden) } # (2 unchanged blocks hidden) } # module.postgresql[0].azurerm_postgresql_flexible_server_active_directory_administrator.pgsql_adadmin must be replaced -/+ resource "azurerm_postgresql_flexible_server_active_directory_administrator" "pgsql_adadmin" { ~ id = "/subscriptions/1c4f0704-a29e-403d-b719-b90c34ef14c9/resourceGroups/dtsse-dashboard-flexdb-data-aat/providers/Microsoft.DBforPostgreSQL/flexibleServers/dtsse-dashboard-flexdb-aat/administrators/e7ea2042-4ced-45dd-8ae3-e051c6551789" -> (known after apply) ~ object_id = "e7ea2042-4ced-45dd-8ae3-e051c6551789" # forces replacement -> (known after apply) # forces replacement ~ tenant_id = "531ff96d-0ae9-462a-8d2d-bec7c0b42082" # forces replacement -> (known after apply) # forces replacement # (4 unchanged attributes hidden) } # module.postgresql[0].azurerm_postgresql_flexible_server_active_directory_administrator.pgsql_principal_admin[0] must be replaced -/+ resource "azurerm_postgresql_flexible_server_active_directory_administrator" "pgsql_principal_admin" { ~ id = "/subscriptions/1c4f0704-a29e-403d-b719-b90c34ef14c9/resourceGroups/dtsse-dashboard-flexdb-data-aat/providers/Microsoft.DBforPostgreSQL/flexibleServers/dtsse-dashboard-flexdb-aat/administrators/ca6d5085-485a-417d-8480-c3cefa29df31" -> (known after apply) ~ principal_name = "jenkins-cftptl-intsvc-mi" # forces replacement -> (known after apply) # forces replacement ~ tenant_id = "531ff96d-0ae9-462a-8d2d-bec7c0b42082" # forces replacement -> (known after apply) # forces replacement # (4 unchanged attributes hidden) } # module.postgresql[0].azurerm_postgresql_flexible_server_firewall_rule.pg_firewall_rules["grafana00"] will be created + resource "azurerm_postgresql_flexible_server_firewall_rule" "pg_firewall_rules" { + end_ip_address = "52.148.220.236" + id = (known after apply) + name = "grafana00" + server_id = "/subscriptions/1c4f0704-a29e-403d-b719-b90c34ef14c9/resourceGroups/dtsse-dashboard-flexdb-data-aat/providers/Microsoft.DBforPostgreSQL/flexibleServers/dtsse-dashboard-flexdb-aat" + start_ip_address = "52.148.220.236" } # module.postgresql[0].azurerm_postgresql_flexible_server_firewall_rule.pg_firewall_rules["grafana01"] will be created + resource "azurerm_postgresql_flexible_server_firewall_rule" "pg_firewall_rules" { + end_ip_address = "20.61.85.167" + id = (known after apply) + name = "grafana01" + server_id = "/subscriptions/1c4f0704-a29e-403d-b719-b90c34ef14c9/resourceGroups/dtsse-dashboard-flexdb-data-aat/providers/Microsoft.DBforPostgreSQL/flexibleServers/dtsse-dashboard-flexdb-aat" + start_ip_address = "20.61.85.167" } # module.postgresql[0].azurerm_postgresql_flexible_server_firewall_rule.pg_firewall_rules["grafana1"] will be destroyed # (because key ["grafana1"] is not in for_each map) - resource "azurerm_postgresql_flexible_server_firewall_rule" "pg_firewall_rules" { - end_ip_address = "52.148.220.236" -> null - id = "/subscriptions/1c4f0704-a29e-403d-b719-b90c34ef14c9/resourceGroups/dtsse-dashboard-flexdb-data-aat/providers/Microsoft.DBforPostgreSQL/flexibleServers/dtsse-dashboard-flexdb-aat/firewallRules/grafana1" -> null - name = "grafana1" -> null - server_id = "/subscriptions/1c4f0704-a29e-403d-b719-b90c34ef14c9/resourceGroups/dtsse-dashboard-flexdb-data-aat/providers/Microsoft.DBforPostgreSQL/flexibleServers/dtsse-dashboard-flexdb-aat" -> null - start_ip_address = "52.148.220.236" -> null } # module.postgresql[0].azurerm_postgresql_flexible_server_firewall_rule.pg_firewall_rules["grafana1000"] will be created + resource "azurerm_postgresql_flexible_server_firewall_rule" "pg_firewall_rules" { + end_ip_address = (known after apply) + id = (known after apply) + name = "grafana1000" + server_id = "/subscriptions/1c4f0704-a29e-403d-b719-b90c34ef14c9/resourceGroups/dtsse-dashboard-flexdb-data-aat/providers/Microsoft.DBforPostgreSQL/flexibleServers/dtsse-dashboard-flexdb-aat" + start_ip_address = (known after apply) } # module.postgresql[0].azurerm_postgresql_flexible_server_firewall_rule.pg_firewall_rules["grafana1001"] will be created + resource "azurerm_postgresql_flexible_server_firewall_rule" "pg_firewall_rules" { + end_ip_address = (known after apply) + id = (known after apply) + name = "grafana1001" + server_id = "/subscriptions/1c4f0704-a29e-403d-b719-b90c34ef14c9/resourceGroups/dtsse-dashboard-flexdb-data-aat/providers/Microsoft.DBforPostgreSQL/flexibleServers/dtsse-dashboard-flexdb-aat" + start_ip_address = (known after apply) } # module.postgresql[0].azurerm_postgresql_flexible_server_firewall_rule.pg_firewall_rules["grafana2"] will be destroyed # (because key ["grafana2"] is not in for_each map) - resource "azurerm_postgresql_flexible_server_firewall_rule" "pg_firewall_rules" { - end_ip_address = "20.61.85.167" -> null - id = "/subscriptions/1c4f0704-a29e-403d-b719-b90c34ef14c9/resourceGroups/dtsse-dashboard-flexdb-data-aat/providers/Microsoft.DBforPostgreSQL/flexibleServers/dtsse-dashboard-flexdb-aat/firewallRules/grafana2" -> null - name = "grafana2" -> null - server_id = "/subscriptions/1c4f0704-a29e-403d-b719-b90c34ef14c9/resourceGroups/dtsse-dashboard-flexdb-data-aat/providers/Microsoft.DBforPostgreSQL/flexibleServers/dtsse-dashboard-flexdb-aat" -> null - start_ip_address = "20.61.85.167" -> null } # module.postgresql[0].terraform_data.trigger_password_reset will be created + resource "terraform_data" "trigger_password_reset" { + id = (known after apply) + input = "" + output = (known after apply) } Plan: 8 to add, 2 to change, 4 to destroy. ```