returngis / issueops-advanced

0 stars 0 forks source link

⚓️ Create an Azure Kubernetes Service #61

Open 0GiS0 opened 9 hours ago

0GiS0 commented 9 hours ago

Kubernetes Name

returngisaks

Resource Group

youtube-demo-issueops-aks

Region

francecentral

github-actions[bot] commented 9 hours ago

:tada: Issue validated successfully!

github-actions[bot] commented 9 hours ago

Run ID: 12115181184

github-actions[bot] commented 9 hours ago

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Validation Output ``` Success! The configuration is valid. ```

Terraform Plan 📖success

Show Plan ``` terraform Acquiring state lock. This may take a few moments... Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # azurerm_kubernetes_cluster.k8s will be created + resource "azurerm_kubernetes_cluster" "k8s" { + current_kubernetes_version = (known after apply) + dns_prefix = "returngisaks" + fqdn = (known after apply) + http_application_routing_zone_name = (known after apply) + id = (known after apply) + kube_admin_config = (sensitive value) + kube_admin_config_raw = (sensitive value) + kube_config = (sensitive value) + kube_config_raw = (sensitive value) + kubernetes_version = (known after apply) + location = "francecentral" + name = "returngisaks" + node_os_upgrade_channel = "NodeImage" + node_resource_group = (known after apply) + node_resource_group_id = (known after apply) + oidc_issuer_url = (known after apply) + portal_fqdn = (known after apply) + private_cluster_enabled = false + private_cluster_public_fqdn_enabled = false + private_dns_zone_id = (known after apply) + private_fqdn = (known after apply) + resource_group_name = "youtube-demo-issueops-aks" + role_based_access_control_enabled = true + run_command_enabled = true + sku_tier = "Free" + support_plan = "KubernetesOfficial" + workload_identity_enabled = false + auto_scaler_profile (known after apply) + default_node_pool { + kubelet_disk_type = (known after apply) + max_pods = (known after apply) + name = "default" + node_count = 1 + node_labels = (known after apply) + orchestrator_version = (known after apply) + os_disk_size_gb = (known after apply) + os_disk_type = "Managed" + os_sku = (known after apply) + scale_down_mode = "Delete" + type = "VirtualMachineScaleSets" + ultra_ssd_enabled = false + vm_size = "Standard_D2_v2" + workload_runtime = (known after apply) } + identity { + principal_id = (known after apply) + tenant_id = (known after apply) + type = "SystemAssigned" } + kubelet_identity (known after apply) + network_profile (known after apply) + windows_profile (known after apply) } # azurerm_resource_group.rg will be created + resource "azurerm_resource_group" "rg" { + id = (known after apply) + location = "francecentral" + name = "youtube-demo-issueops-aks" } Plan: 2 to add, 0 to change, 0 to destroy. Changes to Outputs: + k8s_name = "returngisaks" + location = "francecentral" + resource_group_name = "youtube-demo-issueops-aks" ───────────────────────────────────────────────────────────────────────────── Saved the plan to: tfplan.out To perform exactly these actions, run the following command to apply: terraform apply "tfplan.out" Releasing state lock. This may take a few moments... ```

Pusher: @0GiS0, Action: issues, Working Directory: `, Workflow:☝🏻🚀 Request Infrastructure with Terraform and Issues`

0GiS0 commented 9 hours ago

.approved