sourcefuse / terraform-aws-arc-db

Repo for managing the Database (RDS + Aurora) Terraform Module.
Apache License 2.0
2 stars 1 forks source link

Feature/refactoring for downstream #7

Closed jamescrowley321 closed 2 years ago

github-actions[bot] commented 2 years ago

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖`Success! The configuration is valid.

`

Terraform Plan 📖failure

Show Plan ``` terraform ```

Pusher: @jamescrowley321, Action: pull_request, Working Directory: `, Workflow:Terraform`

github-actions[bot] commented 2 years ago

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖`Success! The configuration is valid.

`

Terraform Plan 📖failure

Show Plan ``` terraform ```

Pusher: @jamescrowley321, Action: pull_request, Working Directory: `, Workflow:Terraform`

github-actions[bot] commented 2 years ago

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖`Success! The configuration is valid.

`

Terraform Plan 📖success

Show Plan ``` terraform module.ref_arch_db.random_password.db_admin_password: Refreshing state... [id=none] module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_rds_cluster_parameter_group.default[0]: Refreshing state... [id=refarch-dev-20220203181300972700000003] module.ref_arch_db.aws_kms_key.aurora_cluster_kms_key: Refreshing state... [id=3d273795-a9d4-46aa-8e8e-a22e494cca0e] module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_db_parameter_group.default[0]: Refreshing state... [id=refarch-dev-20220203181107297300000001] module.ref_arch_db.aws_iam_role.enhanced_monitoring: Refreshing state... [id=refarch-dev-enhanced-monitoring-role] module.ref_arch_db.aws_kms_alias.aurora_cluster_kms_key: Refreshing state... [id=alias/refarch-dev-aurora-cluster-kms-key] module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_security_group.default[0]: Refreshing state... [id=sg-0bd5c4fa00307f002] module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_db_subnet_group.default[0]: Refreshing state... [id=refarch-dev] module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_security_group_rule.egress[0]: Refreshing state... [id=sgrule-2635356762] module.ref_arch_db.aws_iam_role_policy_attachment.enhanced_monitoring: Refreshing state... [id=refarch-dev-enhanced-monitoring-role-20220203181110378300000002] module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_security_group_rule.ingress_security_groups[0]: Refreshing state... [id=sgrule-873971035] module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_rds_cluster.primary[0]: Refreshing state... [id=refarch-dev] module.ref_arch_db.aws_ssm_parameter.this["/refarch/dev/primary_cluster/cluster_admin_db_username"]: Refreshing state... [id=/refarch/dev/primary_cluster/cluster_admin_db_username] module.ref_arch_db.aws_ssm_parameter.this["/refarch/dev/primary_cluster/cluster_endpoint"]: Refreshing state... [id=/refarch/dev/primary_cluster/cluster_endpoint] module.ref_arch_db.aws_ssm_parameter.this["/refarch/dev/primary_cluster/cluster_admin_db_password"]: Refreshing state... [id=/refarch/dev/primary_cluster/cluster_admin_db_password] Note: Objects have changed outside of Terraform Terraform detected the following changes made outside of Terraform since the last "terraform apply": # module.ref_arch_db.aws_iam_role.enhanced_monitoring has been changed ~ resource "aws_iam_role" "enhanced_monitoring" { id = "refarch-dev-enhanced-monitoring-role" ~ managed_policy_arns = [ + "arn:aws:iam::aws:policy/service-role/AmazonRDSEnhancedMonitoringRole", ] name = "refarch-dev-enhanced-monitoring-role" + tags = {} # (8 unchanged attributes hidden) # (1 unchanged block hidden) } # module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_rds_cluster.primary[0] has been changed ~ resource "aws_rds_cluster" "primary" { + enabled_cloudwatch_logs_exports = [] id = "refarch-dev" tags = { "Creator" = "terraform" "Environment" = "dev" "Name" = "refarch-dev" "Namespace" = "refarch" "Project" = "sf_ref_arch" "Repo" = "terraform-aws-ref-arch-db" "Role" = "database" "Stage" = "dev" } # (39 unchanged attributes hidden) # (1 unchanged block hidden) } # module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_security_group.default[0] has been changed ~ resource "aws_security_group" "default" { ~ egress = [ + { + cidr_blocks = [ + "0.0.0.0/0", ] + description = "Allow outbound traffic" + from_port = 0 + ipv6_cidr_blocks = [] + prefix_list_ids = [] + protocol = "-1" + security_groups = [] + self = false + to_port = 0 }, ] id = "sg-0bd5c4fa00307f002" ~ ingress = [ + { + cidr_blocks = [] + description = "Allow inbound traffic from existing security groups" + from_port = 5432 + ipv6_cidr_blocks = [] + prefix_list_ids = [] + protocol = "tcp" + security_groups = [ + "sg-094031f122a304f1a", ] + self = false + to_port = 5432 }, ] name = "refarch-dev" tags = { "Creator" = "terraform" "Environment" = "dev" "Name" = "refarch-dev" "Namespace" = "refarch" "Project" = "sf_ref_arch" "Repo" = "terraform-aws-ref-arch-db" "Role" = "database" "Stage" = "dev" } # (6 unchanged attributes hidden) } # module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_security_group_rule.egress[0] has been changed ~ resource "aws_security_group_rule" "egress" { id = "sgrule-2635356762" + ipv6_cidr_blocks = [] + prefix_list_ids = [] # (8 unchanged attributes hidden) } # module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_security_group_rule.ingress_security_groups[0] has been changed ~ resource "aws_security_group_rule" "ingress_security_groups" { + cidr_blocks = [] id = "sgrule-873971035" + ipv6_cidr_blocks = [] + prefix_list_ids = [] # (8 unchanged attributes hidden) } Unless you have made equivalent changes to your configuration, or ignored the relevant attributes using ignore_changes, the following plan may include actions to undo or respond to these changes. ───────────────────────────────────────────────────────────────────────────── No changes. Your infrastructure matches the configuration. Your configuration already matches the changes detected above. If you'd like to update the Terraform state to match, create and apply a refresh-only plan: terraform apply -refresh-only ```

Pusher: @jamescrowley321, Action: pull_request, Working Directory: `, Workflow:Terraform`

github-actions[bot] commented 2 years ago

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖`Success! The configuration is valid.

`

Terraform Plan 📖success

Show Plan ``` terraform module.ref_arch_db.random_password.db_admin_password: Refreshing state... [id=none] module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_db_parameter_group.default[0]: Refreshing state... [id=refarch-dev-20220203181107297300000001] module.ref_arch_db.aws_kms_key.aurora_cluster_kms_key: Refreshing state... [id=3d273795-a9d4-46aa-8e8e-a22e494cca0e] module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_rds_cluster_parameter_group.default[0]: Refreshing state... [id=refarch-dev-20220203181300972700000003] module.ref_arch_db.aws_iam_role.enhanced_monitoring: Refreshing state... [id=refarch-dev-enhanced-monitoring-role] module.ref_arch_db.aws_kms_alias.aurora_cluster_kms_key: Refreshing state... [id=alias/refarch-dev-aurora-cluster-kms-key] module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_security_group.default[0]: Refreshing state... [id=sg-0bd5c4fa00307f002] module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_db_subnet_group.default[0]: Refreshing state... [id=refarch-dev] module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_security_group_rule.ingress_security_groups[0]: Refreshing state... [id=sgrule-873971035] module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_security_group_rule.egress[0]: Refreshing state... [id=sgrule-2635356762] module.ref_arch_db.aws_iam_role_policy_attachment.enhanced_monitoring: Refreshing state... [id=refarch-dev-enhanced-monitoring-role-20220203181110378300000002] module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_rds_cluster.primary[0]: Refreshing state... [id=refarch-dev] module.ref_arch_db.aws_ssm_parameter.this["/refarch/dev/primary_cluster/cluster_admin_db_username"]: Refreshing state... [id=/refarch/dev/primary_cluster/cluster_admin_db_username] module.ref_arch_db.aws_ssm_parameter.this["/refarch/dev/primary_cluster/cluster_endpoint"]: Refreshing state... [id=/refarch/dev/primary_cluster/cluster_endpoint] module.ref_arch_db.aws_ssm_parameter.this["/refarch/dev/primary_cluster/cluster_admin_db_password"]: Refreshing state... [id=/refarch/dev/primary_cluster/cluster_admin_db_password] Note: Objects have changed outside of Terraform Terraform detected the following changes made outside of Terraform since the last "terraform apply": # module.ref_arch_db.aws_iam_role.enhanced_monitoring has been changed ~ resource "aws_iam_role" "enhanced_monitoring" { id = "refarch-dev-enhanced-monitoring-role" ~ managed_policy_arns = [ + "arn:aws:iam::aws:policy/service-role/AmazonRDSEnhancedMonitoringRole", ] name = "refarch-dev-enhanced-monitoring-role" + tags = {} # (8 unchanged attributes hidden) # (1 unchanged block hidden) } # module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_rds_cluster.primary[0] has been changed ~ resource "aws_rds_cluster" "primary" { + enabled_cloudwatch_logs_exports = [] id = "refarch-dev" tags = { "Creator" = "terraform" "Environment" = "dev" "Name" = "refarch-dev" "Namespace" = "refarch" "Project" = "sf_ref_arch" "Repo" = "terraform-aws-ref-arch-db" "Role" = "database" "Stage" = "dev" } # (39 unchanged attributes hidden) # (1 unchanged block hidden) } # module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_security_group.default[0] has been changed ~ resource "aws_security_group" "default" { ~ egress = [ + { + cidr_blocks = [ + "0.0.0.0/0", ] + description = "Allow outbound traffic" + from_port = 0 + ipv6_cidr_blocks = [] + prefix_list_ids = [] + protocol = "-1" + security_groups = [] + self = false + to_port = 0 }, ] id = "sg-0bd5c4fa00307f002" ~ ingress = [ + { + cidr_blocks = [] + description = "Allow inbound traffic from existing security groups" + from_port = 5432 + ipv6_cidr_blocks = [] + prefix_list_ids = [] + protocol = "tcp" + security_groups = [ + "sg-094031f122a304f1a", ] + self = false + to_port = 5432 }, ] name = "refarch-dev" tags = { "Creator" = "terraform" "Environment" = "dev" "Name" = "refarch-dev" "Namespace" = "refarch" "Project" = "sf_ref_arch" "Repo" = "terraform-aws-ref-arch-db" "Role" = "database" "Stage" = "dev" } # (6 unchanged attributes hidden) } # module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_security_group_rule.egress[0] has been changed ~ resource "aws_security_group_rule" "egress" { id = "sgrule-2635356762" + ipv6_cidr_blocks = [] + prefix_list_ids = [] # (8 unchanged attributes hidden) } # module.ref_arch_db.module.rds_cluster_aurora_postgres.aws_security_group_rule.ingress_security_groups[0] has been changed ~ resource "aws_security_group_rule" "ingress_security_groups" { + cidr_blocks = [] id = "sgrule-873971035" + ipv6_cidr_blocks = [] + prefix_list_ids = [] # (8 unchanged attributes hidden) } Unless you have made equivalent changes to your configuration, or ignored the relevant attributes using ignore_changes, the following plan may include actions to undo or respond to these changes. ───────────────────────────────────────────────────────────────────────────── No changes. Your infrastructure matches the configuration. Your configuration already matches the changes detected above. If you'd like to update the Terraform state to match, create and apply a refresh-only plan: terraform apply -refresh-only ```

Pusher: @jamescrowley321, Action: pull_request, Working Directory: `, Workflow:Terraform`