jasoncabot / demo-tf-infra-request

A demo project to show how you can use GitHub Actions to fulfill infrastructure provisioning requests with Terraform
MIT License
0 stars 0 forks source link

Please can I have an AKS environment #1

Closed jasoncabot-ms closed 3 years ago

jasoncabot-ms commented 3 years ago

Application Information

Application Name: demo-app-10 Business Justification: Because I want it

Technical Information

Host Environment Type:

jasoncabot-ms commented 3 years ago

Yeah this looks good to me, go ahead

github-actions[bot] commented 3 years ago

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Plan 📖success

Terraform Validation 🤖success

Show Validation ``` terraform validate -no-color Success! The configuration is valid. ```
Show Plan ``` terraform plan -no-color Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # azurerm_kubernetes_cluster.aks will be created + resource "azurerm_kubernetes_cluster" "aks" { + dns_prefix = (known after apply) + fqdn = (known after apply) + id = (known after apply) + kube_admin_config = (known after apply) + kube_admin_config_raw = (sensitive value) + kube_config = (known after apply) + kube_config_raw = (sensitive value) + kubernetes_version = (known after apply) + location = "uksouth" + name = (known after apply) + node_resource_group = (known after apply) + private_cluster_enabled = (known after apply) + private_dns_zone_id = (known after apply) + private_fqdn = (known after apply) + private_link_enabled = (known after apply) + resource_group_name = "demo-app-10" + sku_tier = "Free" + addon_profile { + aci_connector_linux { + enabled = (known after apply) + subnet_name = (known after apply) } + azure_policy { + enabled = (known after apply) } + http_application_routing { + enabled = (known after apply) + http_application_routing_zone_name = (known after apply) } + ingress_application_gateway { + effective_gateway_id = (known after apply) + enabled = (known after apply) + gateway_id = (known after apply) + gateway_name = (known after apply) + ingress_application_gateway_identity = (known after apply) + subnet_cidr = (known after apply) + subnet_id = (known after apply) } + kube_dashboard { + enabled = (known after apply) } + oms_agent { + enabled = (known after apply) + log_analytics_workspace_id = (known after apply) + oms_agent_identity = (known after apply) } } + auto_scaler_profile { + balance_similar_node_groups = (known after apply) + empty_bulk_delete_max = (known after apply) + expander = (known after apply) + max_graceful_termination_sec = (known after apply) + max_node_provisioning_time = (known after apply) + max_unready_nodes = (known after apply) + max_unready_percentage = (known after apply) + new_pod_scale_up_delay = (known after apply) + scale_down_delay_after_add = (known after apply) + scale_down_delay_after_delete = (known after apply) + scale_down_delay_after_failure = (known after apply) + scale_down_unneeded = (known after apply) + scale_down_unready = (known after apply) + scale_down_utilization_threshold = (known after apply) + scan_interval = (known after apply) + skip_nodes_with_local_storage = (known after apply) + skip_nodes_with_system_pods = (known after apply) } + default_node_pool { + max_pods = (known after apply) + name = "default" + node_count = 1 + orchestrator_version = (known after apply) + os_disk_size_gb = 30 + os_disk_type = "Ephemeral" + type = "VirtualMachineScaleSets" + vm_size = "Standard_D2s_v3" + vnet_subnet_id = (known after apply) } + identity { + principal_id = (known after apply) + tenant_id = (known after apply) + type = "SystemAssigned" } + kubelet_identity { + client_id = (known after apply) + object_id = (known after apply) + user_assigned_identity_id = (known after apply) } + network_profile { + dns_service_ip = (known after apply) + docker_bridge_cidr = (known after apply) + load_balancer_sku = "standard" + network_mode = (known after apply) + network_plugin = "azure" + network_policy = "azure" + outbound_type = "loadBalancer" + pod_cidr = (known after apply) + service_cidr = (known after apply) + load_balancer_profile { + effective_outbound_ips = (known after apply) + idle_timeout_in_minutes = (known after apply) + managed_outbound_ip_count = (known after apply) + outbound_ip_address_ids = (known after apply) + outbound_ip_prefix_ids = (known after apply) + outbound_ports_allocated = (known after apply) } } + role_based_access_control { + enabled = true } + windows_profile { + admin_password = (sensitive value) + admin_username = (known after apply) } } # azurerm_resource_group.example will be created + resource "azurerm_resource_group" "example" { + id = (known after apply) + location = "uksouth" + name = "demo-app-10" } # azurerm_subnet.aks will be created + resource "azurerm_subnet" "aks" { + address_prefix = (known after apply) + address_prefixes = [ + "10.240.0.0/16", ] + enforce_private_link_endpoint_network_policies = false + enforce_private_link_service_network_policies = false + id = (known after apply) + name = "aks" + resource_group_name = "demo-app-10" + virtual_network_name = "private-network" } # azurerm_virtual_network.vnet will be created + resource "azurerm_virtual_network" "vnet" { + address_space = [ + "10.0.0.0/8", ] + guid = (known after apply) + id = (known after apply) + location = "uksouth" + name = "private-network" + resource_group_name = "demo-app-10" + subnet = (known after apply) + vm_protection_enabled = false } # random_pet.primary will be created + resource "random_pet" "primary" { + id = (known after apply) + length = 2 + separator = "-" } Plan: 5 to add, 0 to change, 0 to destroy. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: /home/runner/work/demo-tf-infra-request/demo-tf-infra-request/issue-1.plan To perform exactly these actions, run the following command to apply: terraform apply "/home/runner/work/demo-tf-infra-request/demo-tf-infra-request/issue-1.plan" ```

Approver: @jasoncabot-ms, App Name: demo-app-10, Workflow: Environment Creation Workflow

github-actions[bot] commented 3 years ago

Terraform Initialization ⚙️success

Terraform Apply 📖success

Show Apply ``` terraform apply -no-color -auto-approve /home/runner/work/demo-tf-infra-request/demo-tf-infra-request/issue-1.plan random_pet.primary: Creating... random_pet.primary: Creation complete after 0s [id=decent-gecko] azurerm_resource_group.example: Creating... azurerm_resource_group.example: Creation complete after 1s [id=/subscriptions/04fe963c-dced-4688-9372-1be7f86c986f/resourceGroups/demo-app-10] azurerm_virtual_network.vnet: Creating... azurerm_virtual_network.vnet: Creation complete after 9s [id=/subscriptions/04fe963c-dced-4688-9372-1be7f86c986f/resourceGroups/demo-app-10/providers/Microsoft.Network/virtualNetworks/private-network] azurerm_subnet.aks: Creating... azurerm_subnet.aks: Creation complete after 5s [id=/subscriptions/04fe963c-dced-4688-9372-1be7f86c986f/resourceGroups/demo-app-10/providers/Microsoft.Network/virtualNetworks/private-network/subnets/aks] azurerm_kubernetes_cluster.aks: Creating... azurerm_kubernetes_cluster.aks: Still creating... [10s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [20s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [30s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [40s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [50s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [1m0s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [1m10s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [1m20s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [1m30s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [1m40s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [1m50s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [2m0s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [2m10s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [2m20s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [2m30s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [2m40s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [2m50s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [3m0s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [3m10s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [3m20s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [3m30s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [3m40s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [3m50s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [4m0s elapsed] azurerm_kubernetes_cluster.aks: Still creating... [4m10s elapsed] azurerm_kubernetes_cluster.aks: Creation complete after 4m18s [id=/subscriptions/04fe963c-dced-4688-9372-1be7f86c986f/resourcegroups/demo-app-10/providers/Microsoft.ContainerService/managedClusters/aks-decent-gecko] Apply complete! Resources: 5 added, 0 changed, 0 destroyed. ```

Approver: @jasoncabot-ms, App Name: demo-app-10, Workflow: Environment Creation Workflow

jasoncabot-ms commented 3 years ago

All done - enjoy!