returngis / issueops-advanced

0 stars 0 forks source link

⚓️ Create an Azure Kubernetes Service #39

Closed 0GiS0 closed 1 day ago

0GiS0 commented 2 days ago

Kubernetes Name

issueopsrequestk8s

Resource Group

advanced-issueops-request-k8s

Region

westeurope

github-actions[bot] commented 2 days ago

:tada: Issue validated successfully!

github-actions[bot] commented 2 days ago

Run ID: 12094702431

github-actions[bot] commented 2 days ago

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Validation Output ``` Success! The configuration is valid. ```

Terraform Plan 📖success

Show Plan ``` terraform Acquiring state lock. This may take a few moments... Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # azurerm_kubernetes_cluster.k8s will be created + resource "azurerm_kubernetes_cluster" "k8s" { + current_kubernetes_version = (known after apply) + dns_prefix = "issueopsrequestk8s" + fqdn = (known after apply) + http_application_routing_zone_name = (known after apply) + id = (known after apply) + kube_admin_config = (sensitive value) + kube_admin_config_raw = (sensitive value) + kube_config = (sensitive value) + kube_config_raw = (sensitive value) + kubernetes_version = (known after apply) + location = "spaincentral" + name = "issueopsrequestk8s" + node_os_upgrade_channel = "NodeImage" + node_resource_group = (known after apply) + node_resource_group_id = (known after apply) + oidc_issuer_url = (known after apply) + portal_fqdn = (known after apply) + private_cluster_enabled = false + private_cluster_public_fqdn_enabled = false + private_dns_zone_id = (known after apply) + private_fqdn = (known after apply) + resource_group_name = "advanced-issueops-request-k8s" + role_based_access_control_enabled = true + run_command_enabled = true + sku_tier = "Free" + support_plan = "KubernetesOfficial" + workload_identity_enabled = false + auto_scaler_profile (known after apply) + default_node_pool { + kubelet_disk_type = (known after apply) + max_pods = (known after apply) + name = "default" + node_count = 1 + node_labels = (known after apply) + orchestrator_version = (known after apply) + os_disk_size_gb = (known after apply) + os_disk_type = "Managed" + os_sku = (known after apply) + scale_down_mode = "Delete" + type = "VirtualMachineScaleSets" + ultra_ssd_enabled = false + vm_size = "Standard_D2_v2" + workload_runtime = (known after apply) } + identity { + principal_id = (known after apply) + tenant_id = (known after apply) + type = "SystemAssigned" } + kubelet_identity (known after apply) + network_profile (known after apply) + windows_profile (known after apply) } # azurerm_resource_group.rg will be created + resource "azurerm_resource_group" "rg" { + id = (known after apply) + location = "spaincentral" + name = "advanced-issueops-request-k8s" } Plan: 2 to add, 0 to change, 0 to destroy. Changes to Outputs: + k8s_name = "issueopsrequestk8s" + location = "spaincentral" + resource_group_name = "advanced-issueops-request-k8s" Warning: Value for undeclared variable The root module does not declare a variable named "region" but a value was found in file "terraform.tfvars". If you meant to use this value, add a "variable" block to the configuration. To silence these warnings, use TF_VAR_... environment variables to provide certain "global" settings to all configurations in your organization. To reduce the verbosity of these warnings, use the -compact-warnings option. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: tfplan.out To perform exactly these actions, run the following command to apply: terraform apply "tfplan.out" Releasing state lock. This may take a few moments... ```

Pusher: @0GiS0, Action: issues, Working Directory: `, Workflow:☝🏻🚀 Request Infrastructure with Terraform and Issues`

0GiS0 commented 2 days ago

.approved