Closed github-actions[bot] closed 3 months ago
Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create ~ update in-place Terraform will perform the following actions: # module.network.aws_nat_gateway.nat_gw2 will be created + resource "aws_nat_gateway" "nat_gw2" { + allocation_id = "eipalloc-0be22ad45d6abe742" + association_id = (known after apply) + connectivity_type = "public" + id = (known after apply) + network_interface_id = (known after apply) + private_ip = (known after apply) + public_ip = (known after apply) + secondary_private_ip_address_count = (known after apply) + secondary_private_ip_addresses = (known after apply) + subnet_id = (known after apply) + tags = { + "Environment" = "staging" + "Git_branch" = "main" + "Git_repo" = "terraform-resources" + "Name" = "staging-nat-gw2" + "Squad" = "DevOps" + "Terraform" = "true" } + tags_all = { + "Environment" = "staging" + "Git_branch" = "main" + "Git_repo" = "terraform-resources" + "Name" = "staging-nat-gw2" + "Squad" = "DevOps" + "Terraform" = "true" } } # module.network.aws_route_table.private_route_table will be updated in-place ~ resource "aws_route_table" "private_route_table" { id = "rtb-050c6b17a03e5b963" ~ route = [ - { - carrier_gateway_id = "" - cidr_block = "0.0.0.0/0" - core_network_arn = "" - destination_prefix_list_id = "" - egress_only_gateway_id = "" - gateway_id = "" - ipv6_cidr_block = "" - local_gateway_id = "" - nat_gateway_id = "nat-0cb3da366f63689a2" - network_interface_id = "" - transit_gateway_id = "" - vpc_endpoint_id = "" - vpc_peering_connection_id = "" }, + { + carrier_gateway_id = "" + cidr_block = "0.0.0.0/0" + core_network_arn = "" + destination_prefix_list_id = "" + egress_only_gateway_id = "" + gateway_id = "nat-0cb3da366f63689a2" + ipv6_cidr_block = "" + local_gateway_id = "" + nat_gateway_id = "" + network_interface_id = "" + transit_gateway_id = "" + vpc_endpoint_id = "" + vpc_peering_connection_id = "" }, ] tags = { "Environment" = "staging" "Git_branch" = "main" "Git_repo" = "terraform-resources" "Name" = "staging-private-rt" "Squad" = "DevOps" "Terraform" = "true" } # (5 unchanged attributes hidden) } # module.network.aws_route_table_association.rt_ass_priv[0] will be created + resource "aws_route_table_association" "rt_ass_priv" { + id = (known after apply) + route_table_id = "rtb-050c6b17a03e5b963" + subnet_id = "subnet-032d207d76b6f6713" } # module.network.aws_route_table_association.rt_ass_priv[1] will be created + resource "aws_route_table_association" "rt_ass_priv" { + id = (known after apply) + route_table_id = "rtb-050c6b17a03e5b963" + subnet_id = (known after apply) } # module.network.aws_route_table_association.rt_ass_pub[0] will be created + resource "aws_route_table_association" "rt_ass_pub" { + id = (known after apply) + route_table_id = "rtb-0da85063319d398d4" + subnet_id = "subnet-0fc04399430bed56f" } # module.network.aws_route_table_association.rt_ass_pub[1] will be created + resource "aws_route_table_association" "rt_ass_pub" { + id = (known after apply) + route_table_id = "rtb-0da85063319d398d4" + subnet_id = (known after apply) } # module.network.aws_subnet.private_subnet[1] will be created + resource "aws_subnet" "private_subnet" { + arn = (known after apply) + assign_ipv6_address_on_creation = false + availability_zone = "eu-west-1b" + availability_zone_id = (known after apply) + cidr_block = "172.18.35.0/24" + enable_dns64 = false + enable_resource_name_dns_a_record_on_launch = false + enable_resource_name_dns_aaaa_record_on_launch = false + id = (known after apply) + ipv6_cidr_block_association_id = (known after apply) + ipv6_native = false + map_public_ip_on_launch = false + owner_id = (known after apply) + private_dns_hostname_type_on_launch = (known after apply) + tags = { + "Environment" = "staging" + "Git_branch" = "main" + "Git_repo" = "terraform-resources" + "Name" = "staging-private_subnet-1" + "Squad" = "DevOps" + "Terraform" = "true" } + tags_all = { + "Environment" = "staging" + "Git_branch" = "main" + "Git_repo" = "terraform-resources" + "Name" = "staging-private_subnet-1" + "Squad" = "DevOps" + "Terraform" = "true" } + vpc_id = "vpc-0cf85985e41958bbf" } # module.network.aws_subnet.public_subnet[1] will be created + resource "aws_subnet" "public_subnet" { + arn = (known after apply) + assign_ipv6_address_on_creation = false + availability_zone = "eu-west-1b" + availability_zone_id = (known after apply) + cidr_block = "172.18.34.0/24" + enable_dns64 = false + enable_resource_name_dns_a_record_on_launch = false + enable_resource_name_dns_aaaa_record_on_launch = false + id = (known after apply) + ipv6_cidr_block_association_id = (known after apply) + ipv6_native = false + map_public_ip_on_launch = false + owner_id = (known after apply) + private_dns_hostname_type_on_launch = (known after apply) + tags = { + "Environment" = "staging" + "Git_branch" = "main" + "Git_repo" = "terraform-resources" + "Name" = "staging-public_subnet-1" + "Squad" = "DevOps" + "Terraform" = "true" } + tags_all = { + "Environment" = "staging" + "Git_branch" = "main" + "Git_repo" = "terraform-resources" + "Name" = "staging-public_subnet-1" + "Squad" = "DevOps" + "Terraform" = "true" } + vpc_id = "vpc-0cf85985e41958bbf" } Plan: 7 to add, 1 to change, 0 to destroy.
Workflow is pending manual review. URL: https://github.com/networkthor/cicd-lesson1/actions/runs/10098107644
Required approvers: [networkthor]
Respond "approved", "approve", "lgtm", "yes" to continue workflow or "denied", "deny", "no" to cancel.
approved
All approvers have approved, continuing workflow and closing this issue.
Workflow is pending manual review. URL: https://github.com/networkthor/cicd-lesson1/actions/runs/10098107644
Required approvers: [networkthor]
Respond "approved", "approve", "lgtm", "yes" to continue workflow or "denied", "deny", "no" to cancel.